Zobrazeno 1 - 10
of 540
pro vyhledávání: '"Wei Huo"'
Autor:
Wei Huo, Xuemei Wang
Publikováno v:
Heliyon, Vol 10, Iss 14, Pp e34272- (2024)
The work engagement of foreign language teachers enhances both their performance and the quality of instruction. Recent studies have highlighted the pivotal roles of emotional intelligence, job burnout, and self-efficacy in fostering teachers' work e
Externí odkaz:
https://doaj.org/article/18733161934043f3920c7f181488a5d0
Publikováno v:
Genes and Diseases, Vol 11, Iss 3, Pp 101108- (2024)
Externí odkaz:
https://doaj.org/article/1550c079ed574dcab6fa56e346982dd1
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)
Abstract Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness. Mutation-based greybox fu
Externí odkaz:
https://doaj.org/article/3d707a6e7739485cbc5cc724be9c6610
Publikováno v:
Dermatology and Therapy, Vol 13, Iss 6, Pp 1277-1288 (2023)
Abstract Introduction Stretch marks are common atrophic dermal scars with significant physical and psychological effects. Therefore, there is a need for effective cosmetics and procedures for stretch mark treatment. This study aimed to evaluate the e
Externí odkaz:
https://doaj.org/article/8f7d54950e2747128b7cced7864234fd
Publikováno v:
Frontiers in Public Health, Vol 11 (2023)
BackgroundThe developments in cosmetic sciences and technologies have generated a gap between the cosmetics and their users. Users including regular customers, clinicians, industry personnel, researchers, testing agencies, beauty salon workers, and m
Externí odkaz:
https://doaj.org/article/5e7dd68fa0ea494f8a938a4fc4db3444
Autor:
Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-21 (2022)
Abstract Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has gained popularity among all mainstream network device manufacturers. Yet it is challenging
Externí odkaz:
https://doaj.org/article/1561972d559449308be0da4db77bb71e
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-20 (2022)
Abstract Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explored first, which bytes of an inpu
Externí odkaz:
https://doaj.org/article/f98cf3837b324bffaf59462bc22c5f16
Publikováno v:
Clinical and Applied Thrombosis/Hemostasis, Vol 29 (2023)
Background: Hemorrhagic transformation (HT) is a common complication of intravenous thrombolysis (IVT) in patients with acute ischemic stroke (AIS) and may lead to neurological deterioration. This article discusses whether monocyte count to high-dens
Externí odkaz:
https://doaj.org/article/49d6696a2a4e42b2b563a680509304a9
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-21 (2021)
Abstract Codes of Open Source Software (OSS) are widely reused during software development nowadays. However, reusing some specific versions of OSS introduces 1-day vulnerabilities of which details are publicly available, which may be exploited and l
Externí odkaz:
https://doaj.org/article/f6cc90342e2e402388343571be8a1db1
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-22 (2021)
Abstract SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web s
Externí odkaz:
https://doaj.org/article/17695cb177434ffdaff646cd0b5f0d30