Zobrazeno 1 - 10
of 192
pro vyhledávání: '"Yuefei ZHU"'
Autor:
Yongqiang Xiao, He Fang, Yuefei Zhu, Jie Zhou, Zhanzhan Dai, Hongxia Wang, Zhaofan Xia, Zhaoxu Tu, Kam W. Leong
Publikováno v:
Advanced Science, Vol 11, Iss 1, Pp n/a-n/a (2024)
Abstract Trauma and its associated complications, including dysregulated inflammatory responses, severe infection, and disseminated intravascular coagulation (DIC), continue to pose lethal threats worldwide. Following injury, cell‐free nucleic acid
Externí odkaz:
https://doaj.org/article/3db600dad1934bffbc31aa737418132d
Publikováno v:
网络与信息安全学报, Vol 9, Pp 81-93 (2023)
Protocol state machine active inference is a technique that relies on active automata learning.However, the abstraction of the alphabet and the construction of the mapper present critical challenges.Due to the diversity of messages of the same type,
Externí odkaz:
https://doaj.org/article/51a5e6f0aced45afb0a7a5e3e594a66a
Autor:
Chunying Liu, Shuangrong Ruan, Ying He, Xuejing Li, Yuefei Zhu, Honglan Wang, Hanwei Huang, Zhiqing Pang
Publikováno v:
Acta Pharmaceutica Sinica B, Vol 12, Iss 11, Pp 4235-4248 (2022)
Anti-virulence strategy has been considered as one of the most promising approaches to combat drug-resistant bacterial infections. Pore-forming toxins (PFTs) are the largest class of bacterial toxins, inflicting their virulence effect through creatin
Externí odkaz:
https://doaj.org/article/0720c0569a164f2a96f941fa803bf4be
Publikováno v:
Sensors, Vol 24, Iss 4, p 1314 (2024)
Addressing inherent limitations in distinguishing metrics relying solely on Euclidean distance, especially within the context of geo-indistinguishability (Geo-I) as a protection mechanism for location-based service (LBS) privacy, this paper introduce
Externí odkaz:
https://doaj.org/article/7174601f2d0a410f9ed0d8d13326d7f2
Autor:
Longlong Zhang, Yuefei Zhu, Xunbin Wei, Xing Chen, Yang Li, Ying Zhu, Jiaxuan Xia, Yiheng Huang, Yongzhuo Huang, Jianxin Wang, Zhiqing Pang
Publikováno v:
Acta Pharmaceutica Sinica B, Vol 12, Iss 8, Pp 3427-3447 (2022)
Platelets buoy up cancer metastasis via arresting cancer cells, enhancing their adhesion, and facilitating their extravasation through the vasculature. When deprived of intracellular and granular contents, platelet decoys could prevent metastatic tum
Externí odkaz:
https://doaj.org/article/47f1d184fb3b47eb939af8d7ed98770b
Autor:
Divya Bhansali, Tolulope Akinade, Tianyu Li, Yiling Zhong, Feng Liu, Hanyao Huang, Zhaoxu Tu, Elsie A. Devey, Yuefei Zhu, Dane D. Jensen, Kam W. Leong
Publikováno v:
Pharmaceutics, Vol 16, Iss 1, p 10 (2023)
Conventionally, nanocarriers are used to regulate the controlled release of therapeutic payloads. Increasingly, they can also be designed to have an intrinsic therapeutic effect. For example, a positively charged nanocarrier can bind damage-associate
Externí odkaz:
https://doaj.org/article/856e6845e7474eea95b44e0862643e64
Autor:
Xinping Kuai, Yuefei Zhu, Zheng Yuan, Shengyu Wang, Lin Lin, Xiaodan Ye, Yiping Lu, Yu Luo, Zhiqing Pang, Daoying Geng, Bo Yin
Publikováno v:
Acta Pharmaceutica Sinica B, Vol 12, Iss 2, Pp 967-981 (2022)
Tumor-targeted immunotherapy is a remarkable breakthrough, offering the inimitable advantage of specific tumoricidal effects with reduced immune-associated cytotoxicity. However, existing platforms suffer from low efficacy, inability to induce strong
Externí odkaz:
https://doaj.org/article/fa59dc6b559740a088a045e7f7d2584e
Autor:
Yubo He, Yuefei Zhu
Publikováno v:
PLoS ONE, Vol 18, Iss 4, p e0278138 (2023)
Directed greybox fuzzing guides fuzzers to explore specific objective code areas and has achieved good performance in some scenarios such as patch testing. However, if there are multiple objective code to explore, existing directed greybox fuzzers, s
Externí odkaz:
https://doaj.org/article/758a28b448a5470f8c32eea0d8a430da
Publikováno v:
网络与信息安全学报, Vol 7, Pp 93-104 (2021)
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path const
Externí odkaz:
https://doaj.org/article/8bf41f354ab9434d886f029ec356fcbd
Publikováno v:
网络与信息安全学报, Vol 7, Pp 114-130 (2021)
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data
Externí odkaz:
https://doaj.org/article/9e62c27ea9334d79b4bcce5034861c31