Zobrazeno 1 - 10
of 474
pro vyhledávání: '"Chen Zhiyan"'
Publikováno v:
Frontiers in Pharmacology, Vol 15 (2024)
Background and aimPathological changes in the central nervous system (CNS) begin before the clinical symptoms of Alzheimer’s Disease (AD) manifest, with the hippocampus being one of the first affected structures. Current treatments fail to alter AD
Externí odkaz:
https://doaj.org/article/4faab178320d40a68716fd3c2013495d
Autor:
WANG Kun, ZHANG Qi, XU Fengzhuo, LI Haozhe, CHEN Xihao, CHEN Zhiyan, ZHOU Zijian, ZHANG Zhenyi, HUANG Jiang
Publikováno v:
Fushe yanjiu yu fushe gongyi xuebao, Vol 42, Iss 3, Pp 030402-030402 (2024)
The effects of 200 keV and 10 MeV electron-irradiation accelerators on the eradication of lasioderma serricorne and bacteria in tobacco and on the quality of tobacco leaf are investigated. By controlling the parameters of electron-beam irradiation, a
Externí odkaz:
https://doaj.org/article/6c35073866b044298acfac1502de81dc
Autor:
WANG Yuchao, LI Qian, ZENG Jian, TANG Shuaihao, ZHENG Huanran, XU Liang, CHEN Zhiyan, LEI Yongpeng
Publikováno v:
Cailiao gongcheng, Vol 50, Iss 1, Pp 56-66 (2022)
The electrocatalytic CO2 reduction reaction (CO2RR) can not only alleviate the negative effects caused by excessive CO2, but also produce the carbon-containing fuels to alleviate energy shortages. However, the reactive paths of CO2RR are relatively c
Externí odkaz:
https://doaj.org/article/1fa4173b53ee4f58abf54dce4f58123c
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier
Network Intrusion Detection Systems (NIDS) have been extensively investigated by monitoring real network traffic and analyzing suspicious activities. However, there are limitations in detecting specific types of attacks with NIDS, such as Advanced Pe
Externí odkaz:
http://arxiv.org/abs/2306.09451
Autor:
Chen, Zhiyan, Liu, Jinxin, Shen, Yu, Simsek, Murat, Kantarci, Burak, Mouftah, Hussein T., Djukic, Petar
Despite its technological benefits, Internet of Things (IoT) has cyber weaknesses due to the vulnerabilities in the wireless medium. Machine learning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance.
Externí odkaz:
http://arxiv.org/abs/2204.03433
Publikováno v:
In Journal of Psychiatric Research November 2024 179:300-305
Publikováno v:
In Asian Journal of Psychiatry September 2024 99
Autor:
Xu, Suhui, Zhou, Tianhao, Wang, Jiamin, Guo, Ge, Chen, Zhiyan, Li, Huaxiang, Yang, Zhenquan, Gao, Yajun
Publikováno v:
In Food Chemistry 15 January 2025 463 Part 3
Autor:
Chen, Zhiyan, Kantarci, Burak
Mobile Crowdsensing systems are vulnerable to various attacks as they build on non-dedicated and ubiquitous properties. Machine learning (ML)-based approaches are widely investigated to build attack detection systems and ensure MCS systems security.
Externí odkaz:
http://arxiv.org/abs/2202.07802
Autor:
Chen, Zhiyan1,2 (AUTHOR), Hao, Shuai1,2 (AUTHOR), Li, Haozhe1,3 (AUTHOR), Dong, Xiaohan1,2 (AUTHOR), Chen, Xihao1,3 (AUTHOR), Yuan, Jushigang1,3 (AUTHOR), Sidorenko, Alexander4 (AUTHOR), Huang, Jiang1,3 (AUTHOR) jhuang@hust.edu.cn, Gu, Yanlong1,2 (AUTHOR) klgyl@hust.edu.cn
Publikováno v:
Advanced Science. 8/14/2024, Vol. 11 Issue 30, p1-10. 10p.