Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Practical Single-Round Secure Wildcard Pattern Matching

    Secure pattern matching allows a client who holds a substring (pattern) to find all the substring’s locations appearing in the long string (text) stored in a server. Meanwhile, the server should not learn any ...

    Jun Xu, Shengnan Zhao, Chuan Zhao in ICT Systems Security and Privacy Protection (2024)

  2. No Access

    Chapter and Conference Paper

    An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV

    The intelligent Internet of Vehicles (IoV) can help alleviate road security issues. However, increasing requirements for data privacy make it difficult for centralized machine learning paradigms to collect suf...

    Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan in Information and Communications Security (2023)

  3. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  4. No Access

    Chapter and Conference Paper

    Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption

    With the rapid development of distributed machine learning and Internet of things, tons of distributed data created by devices are used for model training and what comes along is the concern of security and pr...

    Fengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma in Wireless Algorithms, Systems, and Applicat… (2022)

  5. No Access

    Chapter and Conference Paper

    Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis

    In many scenarios, people have a demand for deploying the artificial intelligence applications on the edge device of IoT. For some special applications, these embedded devices are always required real-time rep...

    Sihan He, Weibin Wu, Yanbin Li, Lu Zhou in Wireless Algorithms, Systems, and Applicat… (2022)

  6. No Access

    Chapter and Conference Paper

    A Lightweight Context-Based Android Malware Detection Scheme

    Mobile device coverage is increasing as the Internet develops faster and faster. Android is becoming the most popular operating system among smartphones, where it is also the most common target for malware. Fo...

    **nyu Yun, Zesheng Zhu, Liming Fang in 6th International Technical Conference on … (2022)

  7. No Access

    Chapter and Conference Paper

    FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks

    Electronic Identity (eID) is a solution toward solving the identity problem when deploying e-Government. Such solution should not only be secure, but also have to be robust enough under adversarial conditions....

    Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, Liming Fang in Provable and Practical Security (2022)

  8. Article

    Open Access

    Depressive symptoms and health service utilization among Chinese middle-aged and older adults: a national population-based longitudinal survey

    This study aimed to (1) examine the cross-sectional and longitudinal relationships between depressive symptoms and health services utilization among Chinese middle-aged and older adults; and (2) evaluate wheth...

    **g Guo, Dexia Kong, Liming Fang in International Journal of Mental Health Sys… (2021)

  9. Article

    Open Access

    A nomogram for predicting overall survival in patients with Ewing sarcoma: a SEER-based study

    Ewing sarcoma, the second most frequent bone tumor in children and adolescents, is often presented with localized disease or metastatic-related symptoms. In this study, we aim to construct and validate a nomog...

    Zhenggang Zhou, **yu Wang, Liming Fang, Jianlin Ma in BMC Musculoskeletal Disorders (2020)

  10. Article

    Open Access

    Mussel-Inspired Redox-Active and Hydrophilic Conductive Polymer Nanoparticles for Adhesive Hydrogel Bioelectronics

  11. A universal strategy was proposed to producing conductive, redox-active, and hydrophilic sulfonated lignin-conductive polymer nanoparticles (CP/LS NP...

  12. Donglin Gan, Tao Shuai, **ao Wang, Ziqiang Huang, Fuzeng Ren in Nano-Micro Letters (2020)

  13. Article

    Open Access

    Plant-inspired adhesive and tough hydrogel based on Ag-Lignin nanoparticles-triggered dynamic redox catechol chemistry

    Adhesive hydrogels have gained popularity in biomedical applications, however, traditional adhesive hydrogels often exhibit short-term adhesiveness, poor mechanical properties and lack of antibacterial ability...

    Donglin Gan, Wensi **ng, Lili Jiang, Ju Fang, Cancan Zhao in Nature Communications (2019)

  14. No Access

    Article

    A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

    The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertex...

    Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang in Designs, Codes and Cryptography (2018)

  15. No Access

    Article

    A proxy broadcast re-encryption for cloud data sharing

    Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a delegator’s ciphertext to a delegate’s ciphertext without learning anything about the underlying plaintext. PRE schemes have br...

    Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang in Multimedia Tools and Applications (2018)

  16. Article

    Open Access

    Effects of atomic-level nano-structured hydroxyapatite on adsorption of bone morphogenetic protein-7 and its derived peptide by computer simulation

    Hydroxyapatite (HA) is the principal inorganic component of bones and teeth and has been widely used as a bone repair material because of its good biocompatibility and bioactivity. Understanding the interactio...

    Qun Wang, Menghao Wang, **ong Lu, Kefeng Wang, Liming Fang in Scientific Reports (2017)

  17. Article

    Open Access

    Tough, self-healable and tissue-adhesive hydrogel with tunable multifunctionality

    An ideal hydrogel for biomedical engineering should mimic the intrinsic properties of natural tissue, especially high toughness and self-healing ability, in order to withstand cyclic loading and repair skin an...

    Lu Han, Liwei Yan, Kefeng Wang, Liming Fang, Hong** Zhang in NPG Asia Materials (2017)

  18. Article

    Open Access

    Self-assembled Biodegradable Nanoparticles and Polysaccharides as Biomimetic ECM Nanostructures for the Synergistic effect of RGD and BMP-2 on Bone Formation

    Producing biomimetic extracellular matrix (ECM) is an effective approach to improve biocompatibility of medical devices. In this study, biomimetic ECM nanostructures are constructed through layer-by-layer self...

    Zhenming Wang, Li Dong, Lu Han, Kefeng Wang, **ong Lu, Liming Fang in Scientific Reports (2016)

  19. No Access

    Article

    Graphene oxide and hyperbranched polymer-toughened hydrogels with improved absorption properties and durability

    Hyperbranched polymers or/and graphene oxide nanosheets were used to synthesize poly(acrylic acid)-based hybrid hydrogels with high water absorption ability, excellent mechanical properties, and environmental ...

    Yang Yu, Leandro Carvalho Xavier De Andrade, Liming Fang in Journal of Materials Science (2015)

  20. No Access

    Article

    On downstream transmissions in EPON Protocol over Coax (EPoC): An analysis of Coax framing approaches and other relevant considerations

    We present different mechanisms for downstream transmissions in the coax segment of Ethernet Passive Optical Network (EPON) Protocol over Coax (EPoC). EPoC is the transparent extension of EPON over a cable ope...

    Partha Bhaumik, Saigopal Thota, Kira Zhangli, Jim Chen in Photonic Network Communications (2014)

  21. No Access

    Article

    Fuzzy conditional proxy re-encryption

    Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...

    LiMing Fang, JianDong Wang, ChunPeng Ge, YongJun Ren in Science China Information Sciences (2013)

  22. No Access

    Article

    Processing and characterization of TLCP fibers reinforced by 1 wt% MWCNT

    A thermotropic liquid crystalline polymer (TLCP) blend with 1 wt% multiwall carbon nanotubes (MWCNTs) was prepared by melt compounding. Morphological observations of the blend show that the chemical-treated MW...

    Youhong Tang, Liming Fang, ** Gao in Journal of Materials Science (2012)

previous disabled Page of 2