Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Path signature-based XAI-enabled network time series classification

    Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks, and the mo...

    Le Sun, Yueyuan Wang, Yongjun Ren, Feng **a in Science China Information Sciences (2024)

  2. No Access

    Article

    Virtual human pose estimation in a fire education system for children with autism spectrum disorders

    Children with autism face challenges in areas like language and social skills, which hinder their ability to undergo regular fire training. Fire is one of the most common and dangerous disaster in real life, m...

    Yangyang Guo, Hongye Liu, Yao** Sun, Yongjun Ren in Multimedia Systems (2024)

  3. No Access

    Chapter and Conference Paper

    V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture

    Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...

    Qingguan Gao, Kaisheng Sun, Jiankuo Dong in Information Security and Cryptology (2024)

  4. Article

    Open Access

    Data storage mechanism of industrial IoT based on LRC sharding blockchain

    With the rapid development of Industry 4.0, the data security of Industrial Internet of Things in the Industry 4.0 environment has received widespread attention. Blockchain has the characteristics of decentral...

    Yongjun Ren, **nyu Liu, Pradip Kumar Sharma, Osama Alfarraj in Scientific Reports (2023)

  5. Article

    Evaluation of the immune protective effects of rEmMIC2 and rEmMIC3 from Eimeria magna in rabbits

    Eimeria magna is a common pathogen in rabbits, which results in lethargy, weight loss, diarrhea, and even death in severe cases after infection. The current method for preventing rabbit coccidiosis is to add anti...

    Hao Chen, Jiayan Pu, Jie **ao, **n Bai, Ruoyu Zheng, **aobin Gu in Parasitology Research (2023)

  6. No Access

    Article

    Blockchain-based trust establishment mechanism in the internet of multimedia things

    Through the application of powerful semiconductors and high-speed communication technologies such as 5G, large-scale or even ultra-large-scale Internet of Multimedia Things (IoMT) will soon appear. Secure comm...

    Yongjun Ren, Fujian Zhu, Kui Zhu, Pradip Kumar Sharma in Multimedia Tools and Applications (2021)

  7. Article

    Open Access

    LINC01287 facilitates proliferation, migration, invasion and EMT of colon cancer cells via miR-4500/MAP3K13 pathway

    Accumulated studies indicate that aberrant expression of long noncoding RNAs (lncRNAs) is associated with tumorigenesis and progression of colon cancer. In the present study, long intergenic non-protein coding...

    Dazhi Fu, Yongjun Ren, Chunxiao Wang, Lei Yu, Rui Yu in BMC Cancer (2021)

  8. No Access

    Chapter and Conference Paper

    Key Exposure Resistant Group Key Agreement Protocol

    With the development of the Internet and computer science, the demand for collaboration over the Internet is constantly increasing. The group key agreement (GKA) protocol has been a desirable candidate for thi...

    Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren in Provable and Practical Security (2021)

  9. Article

    Open Access

    An efficient method for meteorological nephogram recognition in cloud environment

    Nephogram could provide important information for meteorological business, and nephogram recognition is a kind of challenge in the meteorological industry. In this paper, a selective neural network ensemble me...

    Tao Li, Lei Wang, Yongjun Ren, **ang Li in EURASIP Journal on Wireless Communications… (2019)

  10. Article

    Open Access

    Comparative analysis of host resistance to Sarcoptes scabiei var. cuniculi in two different rabbit breeds

    Scabies, caused by infestation of the mite Sarcoptes scabiei, is one of the most severe ectoparasitic diseases in rabbits. Scabies seriously affects the commercial rabbit breeding, causing severe economic losses....

    Wenrui Wei, Yongjun Ren, Nengxing Shen, Hongyu Song, **g Xu in Parasites & Vectors (2019)

  11. No Access

    Article

    A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment

    Because of their unique electronic, magnetic and optical features, the rare earth has become an important strategic resource. Moreover, improving the exploitation of rare earth resources is very significant. T...

    Yongjun Ren, ** Wang, **ujuan Feng, Geumran Younn, Jeong-Uk Kim in Cluster Computing (2019)

  12. Article

    Open Access

    A chitinase-like protein from Sarcoptes scabiei as a candidate anti-mite vaccine that contributes to immune protection in rabbits

    Scabies is caused by Sarcoptes scabiei burrowing into the stratum corneum of the host’s skin and is detrimental to the health of humans and animals. Vaccines are an attractive alternative to replace the acaricide...

    Nengxing Shen, Haojie Zhang, Yongjun Ren, Ran He, **g Xu in Parasites & Vectors (2018)

  13. No Access

    Article

    Implicit authentication protocol and self-healing key management for WBANs

    In recent years, the rapid development of computer science and technology brings health care into the information era. As a typical representation, wireless body area networks (WBANs) has also promoted the dev...

    Jian Shen, Shaohua Chang, Qi Liu, Jun Shen in Multimedia Tools and Applications (2018)

  14. No Access

    Chapter and Conference Paper

    Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage

    With the rapid growth of cloud storage center, the cumulative volume of data reaches EB and even ZB from PB. As a result, both network size and the number of storage nodes continue to grow explosively, while t...

    Yongjun Ren, Lin Zhou, Yepeng Liu, **aorui Zhang in Cloud Computing and Security (2018)

  15. No Access

    Chapter and Conference Paper

    Digital Continuity Guarantee Based on Data Consistency in Cloud Storage

    Since the British National Archives put forward the concept of the digital continuity in 2007, Some developed countries have developed a digital continuity plan of action. At the same time, digital continuity ...

    Yongjun Ren, Yepeng Liu, Chengshan Qian in Cloud Computing and Security (2018)

  16. No Access

    Chapter and Conference Paper

    Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage

    Cloud storage is now a hot research topic in information technology, which has changed the technical architecture and implementation method of electronic record management. However, due to loss of physical con...

    Yongjun Ren, Linhui Kong, Yepeng Liu, ** Wang in Cloud Computing and Security (2018)

  17. No Access

    Chapter and Conference Paper

    Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment

    At present some developed countries have put forward their digital continuity action plans. And the digital continuity has also become a hot spot in the research of electronic records. However, the technology ...

    Jiang Xu, Jian Zhang, Yongjun Ren, Hye-** Kim in Cloud Computing and Security (2018)

  18. Article

    Open Access

    Expression and characterisation of a Sarcoptes scabiei protein tyrosine kinase as a potential antigen for scabies diagnosis

    Scabies is a disease that harms humans and other animals that is caused by the itch mite Sarcoptes scabiei burrowing into the stratum corneum of the skin. In the early stages of scabies, symptoms are often subcli...

    Nengxing Shen, Ran He, Yuqing Liang, **g Xu, Manli He, Yongjun Ren in Scientific Reports (2017)

  19. No Access

    Article

    Efficient data integrity auditing for storage security in mobile health cloud

    Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data...

    Yongjun Ren, Jian Shen, Yuhui Zheng, ** Wang in Peer-to-Peer Networking and Applications (2016)

  20. No Access

    Chapter and Conference Paper

    A RFID Based Localization Algorithm for Wireless Sensor Networks

    The localization technology takes an important role in real-time alarm and rapid response. In this paper, we propose a novel localization method for wireless sensor network which is based on Radio Frequency I...

    Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, **ngming Sun in Cloud Computing and Security (2016)

previous disabled Page of 2