Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Alantolactone enhances the sensitivity of melanoma to MAPK pathway inhibitors by targeting inhibition of STAT3 activation and down-regulating stem cell markers

    Mitogen-activated protein kinase inhibitors (MAPKi) were the first line drugs for advanced melanoma patients with BRAF mutation. Targeted therapies have significant therapeutic effects; however, drug resistanc...

    Kun Zhao, Qi Zhao, **nzhi Dai, Xue Wen, **ng Luo, Yi Duan in Cancer Cell International (2024)

  2. Article

    Open Access

    One-pot synthesis of stable antioxidant metal-ornamented polyphenol supramolecular assemblies for material engineering

    Natural polyphenols (NPPs) are of widespread interest in material engineering; however, only a small fraction of NPPs have been utilized in biomedical applications because of their poor solubility and instabil...

    Qiong Dai, Tong Shu, Huayan Yang, Lei Su, **aopeng Li, Xueji Zhang in NPG Asia Materials (2022)

  3. Article

    Open Access

    Association of vitamin D receptor gene polymorphisms with gestational diabetes mellitus-a case control study in Wuhan, China

    Gestational diabetes mellitus (GDM) increased risk of perinatal complications for both the women and the fetuses. The association between the vitamin D receptor (VDR) gene polymorphism and GDM has not been tho...

    Jianqiong Liu, Qiong Dai, Wei Li, Yan Guo, Anna Dai in BMC Pregnancy and Childbirth (2021)

  4. No Access

    Chapter and Conference Paper

    Multi-order Proximity Graph Structure Embedding

    Graph embedding methods convert the flexible graph structure into low-dimensional representations while maintaining the graph structure information. Most existing methods focus on learning low- or high-order g...

    Wang Zhang, Lei Jiang, Huailiang Peng in Collaborative Computing: Networking, Appli… (2021)

  5. No Access

    Chapter and Conference Paper

    Discriminative Representation Learning for Cross-Domain Sentiment Classification

    Cross-domain sentiment classification aims to solve the lack of labeled data in the target domain by using the knowledge of the source domain. Most existing approaches mainly focus on learning transferable fea...

    Shaokang Zhang, Lei Jiang, Huailiang Peng in Advances in Knowledge Discovery and Data M… (2021)

  6. No Access

    Chapter and Conference Paper

    HEAM: Heterogeneous Network Embedding with Automatic Meta-path Construction

    Heterogeneous information network (HIN) embedding is widely used in many real-world applications. Meta-path used in HINs can effectively extract semantic information among objects. However, the meta-path faces...

    Ruicong Shi, Tao Liang, Huailiang Peng in Knowledge Science, Engineering and Managem… (2020)

  7. No Access

    Chapter and Conference Paper

    An Interactive Two-Pass Decoding Network for Joint Intent Detection and Slot Filling

    Intent detection and slot filling are two closely related tasks for building a spoken language understanding (SLU) system. The joint methods for the two tasks focus on modeling the semantic correlations betwee...

    Huailiang Peng, Mengjun Shen, Lei Jiang in Natural Language Processing and Chinese Co… (2020)

  8. No Access

    Chapter and Conference Paper

    Category-Level Adversarial Network for Cross-Domain Sentiment Classification

    Cross-domain sentiment classification utilizes useful information in the source domain to improve the sentiment classification accuracy in the target domain which has few or no labeled data. Most existing meth...

    Shaokang Zhang, Huailiang Peng, Yanan Cao in Knowledge Science, Engineering and Managem… (2020)

  9. No Access

    Chapter and Conference Paper

    Improving Transformer with Sequential Context Representations for Abstractive Text Summarization

    Recent dominant approaches for abstractive text summarization are mainly RNN-based encoder-decoder framework, these methods usually suffer from the poor semantic representations for long sequences. In this pap...

    Tian Cai, Mengjun Shen, Huailiang Peng in Natural Language Processing and Chinese Co… (2019)

  10. No Access

    Chapter and Conference Paper

    High Performance Regular Expression Matching on FPGA

    Deep Packet Inspection (DPI) technology has been widely deployed in Network Intrusion Detection System (NIDS) to detect attacks and viruses. State-of-the-art NIDS uses Deterministic Finite Automata (DFA) to pe...

    Jiajia Yang, Lei Jiang, Xu Bai, Qiong Dai in Collaborative Computing: Networking, Appli… (2018)

  11. No Access

    Chapter and Conference Paper

    Password Recovery for ZIP Files Based on ARM-FPGA Cluster

    Password recovery of ZIP encrypted files is an important problem in computer forensics. The encryption is based on standard cryptographic algorithms as SHA1, HMAC and AES. The traditional methods such as dicti...

    Xu Bai, Lei Jiang, Jiajia Yang, Qiong Dai in Security, Privacy, and Anonymity in Comput… (2017)

  12. No Access

    Chapter and Conference Paper

    An FPGA-Based Algorithm to Accelerate Regular Expression Matching

    State-of-the-art Network Intrusion Detection Systems (NIDSs) use regular expressions (REs) to detect attacks or vulnerabilities. In order to keep up with the ever-increasing speed, more and more NIDSs need to ...

    Jiajia Yang, Lei Jiang, Xu Bai, Qiong Dai in Security, Privacy, and Anonymity in Comput… (2017)

  13. No Access

    Article

    KRAS polymorphisms are associated with survival of CRC in Chinese population

    rs12245, rs12587, rs9266, rs1137282, rs61764370, and rs712 of KRAS oncogene are characterized in the 3′UTR. The study highlights the important role of these polymorphisms playing in the susceptibility, oxalipl...

    Qiong Dai, Hui Lian Wei, Juan Huang, Tie Jun Zhou, Li Chai, Zhi-Hui Yang in Tumor Biology (2016)

  14. No Access

    Chapter and Conference Paper

    Triple-Bit Quantization with Asymmetric Distance for Nearest Neighbor Search

    Binary embedding is an effective way for nearest neighbor (NN) search as binary code is storage efficient and fast to compute. It tries to convert real-value signatures into binary codes while preserving simi...

    Han Deng, Hongtao **e, Wei Ma, Qiong Dai in Advances in Multimedia Information Process… (2016)

  15. Article

    Open Access

    Time trends and risk factor associated with premature birth and infants deaths due to prematurity in Hubei Province, China from 2001 to 2012

    The nutrition and epidemiologic transition has been associated with an increasing incidence of preterm birth in develo** countries, but data from large observational studies in China have been limited. Our s...

    Haiqing Xu, Qiong Dai, Yusong Xu, Zhengtao Gong in BMC Pregnancy and Childbirth (2015)

  16. No Access

    Article

    Fast approximate matching of binary codes with distinctive bits

    Although the distance between binary codes can be computed fast in Hamming space, linear search is not practical for large scale datasets. Therefore attention has been paid to the efficiency of performing appr...

    Chenggang Clarence Yan, Hongtao **e, Bing Zhang in Frontiers of Computer Science (2015)

  17. Article

    Open Access

    Trajectories of length, weight, and bone mineral density among preterm infants during the first 12 months of corrected age in China

    Limited evidence has been provided on the trajectories of length, weight, and bone mineral density (BMD) among preterm infants in early life in Asian countries.

    Zhiwei Zhao, Ming Ding, Zubin Hu, Qiong Dai, Ambika Satija, Aiqin Zhou in BMC Pediatrics (2015)

  18. No Access

    Article

    Application of Visible Hyperspectral Imaging for Prediction of Springiness of Fresh Chicken Meat

    Springiness is an important quality characteristic of chicken meat, related with muscle structure and contents of biochemical components, and has great influence on eating quality of chicken meat. Traditional ...

    Zhenjie **ong, Da-Wen Sun, Qiong Dai, Zhong Han, **n-An Zeng in Food Analytical Methods (2015)

  19. No Access

    Chapter and Conference Paper

    Enhancing Security and Robustness of P2P Caching System

    At present, P2P caching system is widely used to reduce P2P traffic, but the security is always ignored. In this paper, we discuss three potential security issues: content poison, illegal files diffusion and m...

    Huailiang Peng, Ma**g Su, Qiong Dai, Jianlong Tan in Trustworthy Computing and Services (2015)

  20. No Access

    Chapter and Conference Paper

    RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching

    Regular expression matching as a core component of deep packet inspection (DPI) is widely used in various kinds of modern network intrusion detection system (NIDS), traffic classification system and network mo...

    Qiu Tang, Lei Jiang, Qiong Dai, Ma**g Su in Applications and Techniques in Information… (2015)

previous disabled Page of 2