Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Jidong Xiao"'
Publikováno v:
Frontiers in Endocrinology, Vol 13 (2022)
Breast cancer has become the malignant tumor with the highest incidence in women. Axillary lymph node dissection (ALND) is an effective method of maintaining regional control; however, it is associated with a significant risk of complications. Meanwh
Externí odkaz:
https://doaj.org/article/2db306e9fed44111ab32541b576e1dd4
Publikováno v:
IEEE Transactions on Cloud Computing. 10:1275-1286
Live migration of Virtual machines (VMs) has become a regular tool for edge and cloud operators to facilitate system maintenance, fault tolerance, and load balancing, with little impact on running instances. However, the potential security risks of l
Autor:
Yanwei, Luo, Xinye, Wang, Weihong, Niu, Yao, Zhou, Mengna, Li, Jinqi, Ma, Jing, Yang, Songqing, Fan, Zhaoyang, Zeng, Wei, Xiong, Xiaoling, Li, Guiyuan, Li, Jidong, Xiao, Ming, Zhou
Publikováno v:
Journal of Cancer. 13:1436-1448
Bromodomain-containing protein 7 (BRD7) was found to be down-expressed in nasopharyngeal carcinoma as well as breast cancer and to function as a potential tumor suppressor. BRD7 interacts with p53 and is required for p53-dependent oncogene-induced se
Publikováno v:
Zhong nan da xue xue bao. Yi xue ban = Journal of Central South University. Medical sciences. 47(8)
Ultrasound is a safe and timely diagnosis method commonly used for breast lesion, however it depends on the operator to a certain degree. As an emerging technology, artificial intelligence can be combined with ultrasound in depth to improve the intel
Publikováno v:
IEEE Transactions on Cloud Computing. 9:401-413
In a virtualized environment, it is not difficult to retrieve guest OS information from its hypervisor. However, it is very challenging to retrieve information in the reverse direction, i.e., retrieve the hypervisor information from within a guest OS
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:3807-3818
Recommender systems have been increasingly used in a variety of web services, providing a list of recommended items in which a user may have an interest. While important, recommender systems are vulnerable to various malicious attacks. In this paper,
Publikováno v:
DSN
When attackers compromise a computer system and obtain root control over the victim system, retaining that control and avoiding detection become their top priority. To achieve this goal, various rootkits have been developed. However, existing rootkit
Autor:
Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Jinghui Liao, Guojun Wang, Zhengyu Ning
Publikováno v:
DSN
Live kernel patching is an increasingly common trend in operating system distributions, enabling dynamic updates to include new features or to fix vulnerabilities without having to reboot the system. Patching the kernel at runtime lowers downtime and
Autor:
Graham Hill, Subroto Singha, Jidong Xiao, Golam Bashar (Mentor), Praneeth Babu Marella, Gaby G. Dagher
Publikováno v:
TPS-ISA
Consensus protocols are mechanisms that enable a group of entities to reach an agreement on a specific subject. In blockchain systems, consensus protocols are the cornerstone of achieving security and scalability. They not only enable nodes in the ne
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030372309
SecureComm (2)
SecureComm (2)
Nowadays, more and more web applications start to offer the multiple sign-in feature, allowing users to sign into multiple accounts simultaneously from the same browser. This feature significantly improves user experience. Unfortunately, if such a fe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c4e9a2c26e6a39ff4451407516da2af
https://doi.org/10.1007/978-3-030-37231-6_26
https://doi.org/10.1007/978-3-030-37231-6_26