Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Kailong Zhu"'
Autor:
Mingrui Du, Jintao Gu, Chenlin Liu, Nannan Liu, Zhe Yu, Chengpei Zhou, Wei Heng, Zhengcong Cao, Feilong Wei, Kailong Zhu, Yingwen Wang, Wei Zhang, Xiaochang Xue, Yong Zhang, Jixian Qian
Publikováno v:
Journal of Experimental & Clinical Cancer Research, Vol 41, Iss 1, Pp 1-18 (2022)
Abstract Background Osteosarcoma (OS) is a malignant bone tumor mostly occurring in children and adolescents, while chemotherapy resistance often develops and the mechanisms involved remain challenging to be fully investigated. Methods Genome-wide CR
Externí odkaz:
https://doaj.org/article/98f3abf100dd4751b0a5e17a857081dd
Publikováno v:
Applied Sciences, Vol 13, Iss 23, p 12556 (2023)
We propose CanaryExp, an exploitability evaluation solution for vulnerabilities among binary programs protected by StackGuard. CanaryExp devises three novel techniques, namely canary leakage proof of concept generation, canary leaking analysis time e
Externí odkaz:
https://doaj.org/article/478bb58d0af44537be06aad3d21bcc5b
Publikováno v:
Applied Sciences, Vol 13, Iss 21, p 11763 (2023)
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that
Externí odkaz:
https://doaj.org/article/3cf0ec4282c0491483a6005d0f7a1acb
Web applications encompass various aspects of daily life, including online shopping, e-learning, and internet banking. Once there is a vulnerability, it can cause severe societal and economic damage. Due to its ease of use, PHP has become the preferr
Externí odkaz:
http://arxiv.org/abs/2410.12351
Publikováno v:
Frontiers in Nutrition, Vol 9 (2022)
Several studies indicated that the gut microbiota might participate in the beneficial effect of inulin on obesity. However, the mechanisms involved were still largely unknown. Sixteen high-fat diets (HFDs)-induced obese C57BL/6 mice were converted to
Externí odkaz:
https://doaj.org/article/56783559b0c14678972ddbcc8af27881
Autor:
Wei Heng, Feilong Wei, Zhisheng Liu, Xiaodong Yan, Kailong Zhu, Fan Yang, Mingrui Du, Chengpei Zhou, Jixian Qian
Publikováno v:
Frontiers in Physiology, Vol 13 (2022)
Purpose: To evaluate the effects of physical exercise on neck and shoulder muscle strength and pain in military pilots.Method: Embase, PubMed, and Cochrane Library databases were searched studies published up to April 1, 2022. Studies that met the sc
Externí odkaz:
https://doaj.org/article/c8d3a324a49e4bc68b1aed32feabff96
Publikováno v:
Applied Sciences, Vol 13, Iss 16, p 9212 (2023)
Black-box web application scanning has been a popular technique to detect Cross-Site Scripting (XSS) vulnerabilities without prior knowledge of the application. However, several limitations lead to low efficiency of current black-box scanners, includ
Externí odkaz:
https://doaj.org/article/9dd491f7cc65454d93ea52a3cc0d8637
Publikováno v:
IEEE Access, Vol 9, Pp 51631-51645 (2021)
Applying neural network technology to binary similarity detection has become a promising search topic, and vulnerability detection is an important application field of binary similarity detection. When embedding binary code into matrix by neural netw
Externí odkaz:
https://doaj.org/article/c86d2c70901a4963a1a7b39c89a9b707
Publikováno v:
IEEE Access, Vol 8, Pp 78713-78725 (2020)
The number of use-after-free vulnerabilities has been increasing rapidly in recent years, which is a serious threat to computer systems. However, few effective mitigations exist for large-scale binary code. In this study, the authors propose a scalab
Externí odkaz:
https://doaj.org/article/9dcd5310323440de84900e6ac2901091
Publikováno v:
Applied Sciences, Vol 12, Iss 18, p 9350 (2022)
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhea
Externí odkaz:
https://doaj.org/article/24ead18135a6475c88ed4f7ed36ae985