Zobrazeno 1 - 10
of 335
pro vyhledávání: '"Chunming, Tang"'
Graphene-based dual-broadband terahertz absorber with independent frequency and amplitude tunability
Publikováno v:
AIP Advances, Vol 14, Iss 10, Pp 105007-105007-9 (2024)
In the design of metamaterials, combining two active materials is acknowledged as an effective strategy for independently manipulating multi-band terahertz wave absorption. However, maneuvering two active materials requires a dual-physical field that
Externí odkaz:
https://doaj.org/article/4dce36b3ffc44469b15a34be516338d9
Autor:
Chunming Tang, Yaoyao Jin, Min Wu, Feng Jia, Xiaowei Lu, Jinyu Li, Jie Wu, Senlin Zhu, Zhiji Wang, Di An, Wu Xiong, Yongjie Zhang, Huae Xu, Xufeng Chen
Publikováno v:
Materials Today Bio, Vol 28, Iss , Pp 101218- (2024)
Traumatic spinal cord injury (SCI) always leads to severe neurological deficits and permanent damage. Neuroinflammation is a vital process of SCI and have become a promising target for SCI treatment. However, the neuroinflammation-targeted therapy wo
Externí odkaz:
https://doaj.org/article/f1302032c58143c4baa449957cdc5db2
Publikováno v:
Fractal and Fractional, Vol 8, Iss 11, p 615 (2024)
Fractal scale-free structures are widely observed across a range of natural and synthetic systems, such as biological networks, internet architectures, and social networks, providing broad applications in the management of complex systems and the fac
Externí odkaz:
https://doaj.org/article/2b4109b7255841e08c6b7d6da8857001
Autor:
Kun Liu, Chunming Tang
Publikováno v:
AIMS Mathematics, Vol 8, Iss 12, Pp 28517-28539 (2023)
With the proliferation of data and machine learning techniques, there is a growing need to develop methods that enable collaborative training and prediction of sensitive data while preserving privacy. This paper proposes a new protocol for privacy-pr
Externí odkaz:
https://doaj.org/article/5f982aa0a0b94517b0c95db67cf47560
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-12 (2022)
Abstract With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired
Externí odkaz:
https://doaj.org/article/cc451d332a0c4de1bbc17555f03418d5
Publikováno v:
IET Information Security, Vol 16, Iss 1, Pp 41-50 (2022)
Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample s
Externí odkaz:
https://doaj.org/article/11bdbc61a3434842b9eead64542a82de
Autor:
Kun Liu, Chunming Tang
Publikováno v:
Complexity, Vol 2023 (2023)
Decision tree models are widely used for classification tasks in data mining. However, privacy becomes a significant concern when training data contain sensitive information from different parties. This paper proposes a novel framework for secure two
Externí odkaz:
https://doaj.org/article/9e660fa2d8dc4e4db1b0cceb357d31fe
Publikováno v:
Journal of Inequalities and Applications, Vol 2020, Iss 1, Pp 1-22 (2020)
Abstract In this paper, we first propose a new three-term conjugate gradient (CG) method, which is based on the least-squares technique, to determine the CG parameter, named LSTT. And then, we present two improved variants of the LSTT CG method, aimi
Externí odkaz:
https://doaj.org/article/a4f0d7d0e3234b0b9aea9538138185c6
Publikováno v:
IEEE Access, Vol 8, Pp 21644-21652 (2020)
Authentication is an important primitive of cryptography. With the rapid progress of network communication, the urgent data needs to ensure it integrity and privacy, therefore, the authentication of multi-receiver has a significant impact on the deve
Externí odkaz:
https://doaj.org/article/140e95a813af46f799599c8146300f88
Publikováno v:
Entropy, Vol 25, Iss 2, p 389 (2023)
Existing secure multiparty computation protocol from secret sharing is usually under this assumption of the fast network, which limits the practicality of the scheme on the low bandwidth and high latency network. A proven method is to reduce the comm
Externí odkaz:
https://doaj.org/article/db861b3830f341d69d0d901a8e3d1baf