Skip to main content

and
  1. Article

    Open Access

    Application of bi-directional evolutionary structural optimization to the design of an innovative pedestrian bridge

    With rapid advances in design methods and structural analysis techniques, computational generative design strategies have been adopted more widely in the field of architecture and engineering. As a performance...

    Ya** Lai, Yu Li, Yanchen Liu, Peixin Chen, Lijun Zhao, ** Li in AI in Civil Engineering (2024)

  2. No Access

    Article

    Electrodeposited Palladium Coating on Co Micro-Nano Cones Array for Low-Temperature Solid-State Bonding

    A low-temperature solid-state bonding technology using palladium-coated Co micro-nano cones array (MCA) and Sn-3.0Ag-0.5Cu (wt%) solder was investigated. The Pd modification layer on the surface of Co MCA redu...

    Jiunan **e, Hua Hu, Peixin Chen, Han Lei, Anmin Hu in Electronic Materials Letters (2024)

  3. No Access

    Article

    Effect of Co-W and Co-Fe-W Diffusion Barriers on the Reliability of the Solder/Cu Interface during Reflow Conditions

    Efficient diffusion barriers are necessary to prevent the formation of copper-tin intermetallic compounds (IMCs) in advanced packaging for Sn/Cu micro-bumps. This study investigated the interfacial properties ...

    Yuexiao Liu, Chongyang Li, Peixin Chen, **yang Liu in Electronic Materials Letters (2024)

  4. No Access

    Article

    Self-Healing of Kirkendall Voids and IMC Growth in the Interfacial Reaction of Novel Ni/Cu bi-layer Barrier and Solder

    Single Ni layer is often inserted as diffusion barrier between Cu pillar and Sn-based solder to avoid excessive growth of brittle intermetallic compounds (IMCs) and consequent Kirkendall voids (KVs) in microbu...

    Haokun Li, Chongyang Li, Peixin Chen, Rui **, Feifei Li in Electronic Materials Letters (2024)

  5. No Access

    Article

    Investigation of the first quasi-rectangular metro tunnel constructed by the 0-θ method

    Quasi-rectangular shield tunneling is a cutting-edge trenchless method for constructing metro tunnels with double tubes, owing to its advantages in saving underground space and reducing ground disturbance. How...

    Peinan Li, Xue Liu, ** Jiang, Xuehui Zhang in Frontiers of Structural and Civil Engineer… (2023)

  6. Article

    Open Access

    YAP1 expression is associated with survival and immunosuppression in small cell lung cancer

    Immunotherapy is considered a major breakthrough in the treatment of small cell lung cancer (SCLC), although its anti-tumor efficacy is limited. With a high degree of malignancy and high heterogeneity, SCLC is...

    Peixin Chen, Chenglong Sun, Hao Wang, Wencheng Zhao, Yan Wu in Cell Death & Disease (2023)

  7. Article

    Open Access

    cGAS-STING, an important pathway in cancer immunotherapy

    Cytosolic DNA sensing, the cyclic GMP-AMP synthase-stimulator of interferon genes (cGAS-STING) pathway, is an important novel role in the immune system. Multiple STING agonists were developed for cancer therap...

    Minlin Jiang, Peixin Chen, Lei Wang, Wei Li, Bin Chen in Journal of Hematology & Oncology (2020)

  8. No Access

    Article

    An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System

    Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients’ electronic medical records. Considering both the priva...

    Yilun Wu, **cheng Lu, **shu Su, Peixin Chen in Journal of Medical Systems (2016)

  9. No Access

    Chapter and Conference Paper

    A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups

    Cloud storage has become one of the integral parts of online life. However, the cloud storage brings in new kinds of data security issues as well. Authentication framework for both users and services provides ...

    Peixin Chen, **aofeng Wang, **shu Su in Algorithms and Architectures for Parallel … (2015)

  10. No Access

    Chapter and Conference Paper

    Removing Key Escrow from the LW-HIBE Scheme

    Hierarchical Identity-Based Encryption (HIBE) provides an efficient solution to the security problems existed in cloud storage. However, the key escrow problem, which is an inherent problem in HIBE, primarily ...

    Peixin Chen, **aofeng Wang, Baokang Zhao in Algorithms and Architectures for Parallel … (2015)

  11. No Access

    Chapter and Conference Paper

    RScam: Cloud-Based Anti-Malware via Reversible Sketch

    Cybercrime caused by malware becomes a persistent and damaging threat which makes the trusted security solution urgently demanded, especially for resource-constrained ends. The existing industry and academic a...

    Hao Sun, **aofeng Wang, **shu Su in Security and Privacy in Communication Netw… (2015)

  12. No Access

    Chapter and Conference Paper

    An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage

    Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this c...

    Peixin Chen, **aofeng Wang, **shu Su in Algorithms and Architectures for Parallel … (2015)

  13. No Access

    Article

    Improvement of surface cementitious properties of coarse fly ash by dehydration and rehydration processes

    Owing to poor bonding between coarse fly ash particles and hydration products, gap-graded blended cements with fly ash usually show lower compressive strengths than Portland cement. Surface cementitious proper...

    Tongsheng Zhang, Qijun Yu, Jiangxiong Wei in Journal of Thermal Analysis and Calorimetry (2012)

  14. No Access

    Article

    On finite rank operators in CSL algebras III

    In terms of the exactly nonzero partition, the reducible projection-system and correlation matrices, two characterizations for a rank three operator in a CSL algebra can be completely decomposed are given.

    Peixin Chen, Shijie Lu in Applied Mathematics-A Journal of Chinese Universities (2002)

  15. No Access

    Article

    Weakly algebraic reflexivity and strongly algebraic reflexivity

    Algebraic reflexivity introduced by Hadwin is related to linear interpolation. In this paper, the concepts of weakly algebraic reflexivity and strongly algebraic reflexivity which are also related to linear in...

    Changli Tao, Shijie Lu in Applied Mathematics-A Journal of Chinese Universities (2002)