Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Shijia Wei"'
Autor:
Shijia Wei, Jingyi Tan, Xueshan Huang, Kai Zhuang, Weijian Qiu, Mei Chen, Xiaoxia Ye, Minhua Wu
Publikováno v:
Journal of Translational Medicine, Vol 22, Iss 1, Pp 1-21 (2024)
Abstract Background Hepatocellular carcinoma (HCC) is the most common type of primary liver cancer and second leading cause of cancer-related deaths worldwide. The heightened mortality associated with HCC is largely attributed to its propensity for m
Externí odkaz:
https://doaj.org/article/af010ddbb7bd4d4da9f6baa7b29b486c
Publikováno v:
Eye and Vision, Vol 11, Iss 1, Pp 1-17 (2024)
Abstract Background Autophagy has recently been shown to be critical for protecting peripheral nerve regeneration. This study explored the impact of miR-542-3p on diabetic corneal nerve regeneration and epithelial healing through the regulation of au
Externí odkaz:
https://doaj.org/article/009ef2e179db4cdaba3adabc3012ea34
Autor:
Lauren Biernacki, Shijia Wei, Baris Kasikci, Mark Gallagher, Zhixing Xu, Sharad Malik, Mohit Tiwari, Misiker Tadesse Aga, Austin Harris, Todd Austin
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 17:1-38
There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understo
Autor:
Austin Harris, Tarunesh Verma, Shijia Wei, Lauren Biernacki, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari, Todd Austin
Publikováno v:
2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
Publikováno v:
MICRO
Micro-architecture units like caches are notorious for leaking secrets across security domains. An attacker program can contend for on-chip state or bandwidth and can even use speculative execution in processors to drive this contention; and protecti
Publikováno v:
HOST
High-assurance embedded systems are deployed for decades and expensive to re-certify – hence, each new attack is an unpatchable problem that can only be detected by monitoring out-of-band channels such as the system’s power trace or electromagnet
Autor:
BIERNACKI, LAUREN, GALLAGHER, MARK, ZHIXING XU, AGA, MISIKER TADESSE, HARRIS, AUSTIN, SHIJIA WEI, TIWARI, MOHIT, KASIKCI, BARIS, MALIK, SHARAD, AUSTIN, TODD
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems; Jul2021, Vol. 17 Issue 3, p1-38, 38p