Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Yaoqi Jia"'
Publikováno v:
Sensors, Vol 17, Iss 3, p 464 (2017)
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in
Externí odkaz:
https://doaj.org/article/7738eb3c84724d789c1c3549b9a14c06
Autor:
Rufeng JIANG, Licheng CAO, Xiaoliang DENG, Yunlong HE, Yaoqi JIAO, Zigui CHEN, Tao LI, Qi ZHANG
Publikováno v:
地质科技通报, Vol 43, Iss 5, Pp 31-44 (2024)
Objective The first deepwater and deep-stratum gas field was recently discovered in the Baodao 21-1 area of the Qiongdongnan Basin, which is of great significance for petroleum exploration in the deep-water area of the South China Sea. Methods Based
Externí odkaz:
https://doaj.org/article/8017c477232c4f1698b0a2bbad9bee45
Autor:
Hongshi Cai, Jianfeng Liang, Yaoqi Jiang, Ziyi Wang, Hongyu Li, Wenjin Wang, Cheng Wang, Jinsong Hou
Publikováno v:
Journal of Experimental & Clinical Cancer Research, Vol 43, Iss 1, Pp 1-22 (2024)
Abstract Background Head and neck squamous carcinoma (HNSCC) is known for its high aggressiveness and susceptibility to cervical lymph node metastasis, which greatly contributes to its poor prognosis. During tumorigenesis, many types of cancer cells
Externí odkaz:
https://doaj.org/article/6c814693c3774616b4bf6c8602b58ec5
Publikováno v:
ICDCS
Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitives in unrestricted byzantine settings, research ha
Autor:
Sumayah Alrwais, Yiming Zhang, Ying Liu, Haixin Duan, Shuang Hao, Kai Chen, XiaoFeng Wang, Peiyuan Zong, Zhou Liu, Yaoqi Jia, Baojun Liu, Chaoyi Lu, Zaifeng Zhang
Publikováno v:
EuroS&P
Illicit traffic monetization is a type of Internet fraud that hijacks users' web requests and reroutes them to a traffic network (e.g., advertising network), in order to unethically gain monetary rewards. Despite its popularity among Internet fraudst
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 294-314 (2016)
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operato
Publikováno v:
Journal of High Speed Networks. 22:15-34
HTML5-based mobile applications (or apps) are built by using standard web technologies such as HTML5, JavaScript and CSS. Due to their cross-platform support, HTML5-based mobile apps are getting more and more popular. However, similar to traditional
Publikováno v:
Journal of High Speed Networks. 22:55-64
The application permission system is one of the key components of Android security. Developers often use it incorrectly and claim more permissions than necessary, due to limitations of developers' knowledge and development tools. When application's v
Autor:
Yaoqi Jia, Baojun Liu, Jianjun Chen, Jia Zhang, Tao Wan, Chao Zhang, Haixin Duan, Jian Jiang, Run Guo, Shuang Hao
Publikováno v:
SRDS
Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high availability and high performance, CDNs also provide security services such as anti-DoS and Web Application Firewalls to CDN-powered websites. However, the massive re
Publikováno v:
ICC
The similarity of the user interfaces (UIs) among Android apps is an important factor to indicate abnormal behaviors in Android apps. For example, phishing apps use UIs similar to those of their target apps to lure users to input sensitive informatio