Skip to main content

and
  1. No Access

    Article

    Circ_0003159 upregulates LIFR expression through competitively binding to miR-221-3p/miR-222-3p to block gastric cancer development

    Gastric cancer (GC) remains a major cause of cancer-related deaths. Increasing studies suggest that cancer development is accompanied by the deregulation of circular RNAs. We investigated the function of circ_...

    Liansheng Zheng, Boshi Yan, Guoliang **, Weijie Han in Journal of Molecular Histology (2022)

  2. No Access

    Article

    An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...

    Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu in Multimedia Tools and Applications (2021)

  3. No Access

    Chapter and Conference Paper

    Identity Authentication Under Internet of Everything Based on Edge Computing

    With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud comput...

    Zixiao Kong, **gfeng Xue, Yong Wang in Trusted Computing and Information Security (2020)

  4. No Access

    Chapter and Conference Paper

    An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model

    Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive...

    Weijie Han, **gfeng Xue, Fuquan Zhang in Machine Learning for Cyber Security (2020)

  5. No Access

    Chapter and Conference Paper

    An Effective Remote Data Disaster Recovery Plan for the Space TT&C System

    The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery re...

    Weijie Han, **gfeng Xue, Fuquan Zhang, Zhonghui Sun in Machine Learning for Cyber Security (2020)

  6. No Access

    Chapter and Conference Paper

    Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning

    Cross-project software defect prediction solves the problem that traditional defect prediction can’t get enough data, but how to apply the model learned from the data of different mechanisms to the target data...

    Tianwei Lei, **gfeng Xue, Weijie Han in Machine Learning for Cyber Security (2020)

  7. No Access

    Chapter and Conference Paper

    A Malware Classification Method Based on the Capsule Network

    Malware has become a serious threat to network security. Traditional static analysis methods usually cannot effectively detect packers, obfuscations, and variants. Dynamic analysis is not efficient when dealin...

    Ziyu Wang, Weijie Han, Yue Lu, **gfeng Xue in Machine Learning for Cyber Security (2020)

  8. No Access

    Chapter and Conference Paper

    Detection of Malicious Domains in APT via Mining Massive DNS Logs

    With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C...

    Lu Huang, **gfeng Xue, Weijie Han, Zixiao Kong in Machine Learning for Cyber Security (2020)

  9. Article

    Open Access

    Potential of C1QTNF1-AS1 regulation in human hepatocellular carcinoma

    The aim of our study is to explore the regulation of C1QTNF1-AS1 on its target miR-221-3p/SOCS3 in human hepatocellular carcinoma (HCC). To explore the underlying molecular regulation of non-coding RNA for HCC, d...

    Weijie Han, Guofeng Yu, **anmei Meng, Hong Hong in Molecular and Cellular Biochemistry (2019)