Zobrazeno 1 - 10
of 533
pro vyhledávání: '"WANG Huibo"'
Autor:
ZHANG Shuang, WANG Anna, FU Kuiyuan, WANG Yuanyuan, LI Ying, LI Hui, ZHANG Jiantao, WANG Huibo, WANG Lili
Publikováno v:
Zhongguo shipin weisheng zazhi, Vol 36, Iss 6, Pp 729-734 (2024)
ObjectiveTo comprehend the epidemiological and molecular characteristics of diarrheagenic Escherichia coli (DEC) in a specific district of Beijing City from 2018 to 2022, aiming to provide evidence for the prevention and control of related dise
Externí odkaz:
https://doaj.org/article/f6a472beb439459d914b943279261aef
Publikováno v:
In Particuology November 2024 94:327-344
Environmentally degradable carbon dots for inhibiting P. globosa growth and reducing hemolytic toxin
Publikováno v:
In Environmental Pollution 1 September 2024 356
Publikováno v:
In Particuology August 2024 91:291-302
Autor:
Jiang, Xiao, You, Hongtao, Niu, Yixuan, Ding, Yudan, Chen, Zhengxin, Wang, Huibo, Xu, Yuan, Zhou, Peng, Wei, Li, Deng, Danni, Xue, Lian, Peng, Ya, Yang, Yilin, Fan, Ligang, Shao, Naiyuan
Publikováno v:
In Cancer Letters 1 July 2024 593
Publikováno v:
In Powder Technology 1 June 2024 442
Autor:
Wang, Feng, Jiang, Zhenming, Zhang, Yanyan, Zhang, Yanlei, Li, Jidao, Wang, Huibo, Jiang, Yinzhu, Xing, Guichuan, Liu, Hongchao, Tang, Yuxin
Publikováno v:
In eScience June 2024 4(3)
Autor:
Wang, Huicai, Zhu, Mengyu, Wang, Huibo, Li, Chunxin, Ren, Zejia, Zhang, Yanlei, Chen, Shi, Li, Heng, Chen, Danling, Bai, Zhengshuai, Zhang, Yanyan, Tang, Yuxin
Publikováno v:
In Energy Storage Materials March 2024 67
Intel SGX Guard eXtensions (SGX), a hardware-supported trusted execution environment (TEE), is designed to protect security-sensitive applications. However, since enclave applications are developed with memory unsafe languages such as C/C++, traditio
Externí odkaz:
http://arxiv.org/abs/2005.05996
Autor:
Wang, Pei, Ding, Yu, Sun, Mingshen, Wang, Huibo, Li, Tongxin, Zhou, Rundong, Chen, Zhaofeng, Jing, Yiming
The big data industry is facing new challenges as concerns about privacy leakage soar. One of the remedies to privacy breach incidents is to encapsulate computations over sensitive data within hardware-assisted Trusted Execution Environments (TEE). S
Externí odkaz:
http://arxiv.org/abs/2005.04367