Zobrazeno 1 - 10
of 56
pro vyhledávání: '"Zelin Wan"'
Publikováno v:
IEEE Access, Vol 9, Pp 104773-104819 (2021)
Centrality metrics have been studied in the network science research. They have been used in various networks, such as communication, social, biological, geographic, or contact networks under different disciplines. In particular, centrality metrics h
Externí odkaz:
https://doaj.org/article/6943b7f60fd34f8aaf57ee95888f9120
Publikováno v:
IEEE Transactions on Network and Service Management. 19:112-129
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consisten
Autor:
Xiaofu Qiu, Zelin Wang, Hetian Chen, Yuhan Liang, Xiaoyu Jiang, Yujun Zhang, Jing Ma, Fangyuan Zhu, Tianxiang Nan, Zhen Chen, Di Yi
Publikováno v:
npj Spintronics, Vol 2, Iss 1, Pp 1-6 (2024)
Abstract The realization and control of exchange bias (EB) are highly desirable for spintronic applications. All-oxide heterostructures comprised of ferromagnetic and antiferromagnetic/multiferroic oxides provide an ideal platform to enable the elect
Externí odkaz:
https://doaj.org/article/58717ad0bd084adbb9412c309a664b33
Autor:
Shiyu Zuo, Chuo Li, Xiaolei Sun, Biping Deng, Yibing Zhang, Yajing Han, Zhuojun Ling, Jinlong Xu, Jiajia Duan, Zelin Wang, Xinjian Yu, Qinlong Zheng, Xiuwen Xu, Jiao Zong, Zhenglong Tian, Lingling Shan, Kaiting Tang, Huifang Huang, Yanzhi Song, Qing Niu, Dongming Zhou, Sizhou Feng, Zhongchao Han, Guoling Wang, Tong Wu, Jing Pan, Xiaoming Feng
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-20 (2024)
Abstract Chimeric antigen receptor (CAR) T cells show suboptimal efficacy in acute myeloid leukemia (AML). We find that CAR T cells exposed to myeloid leukemia show impaired activation and cytolytic function, accompanied by impaired antigen receptor
Externí odkaz:
https://doaj.org/article/44e53ade52754034b066beff90fa2b1b
Publikováno v:
IEEE Communications Surveys & Tutorials. 23:2460-2493
Defensive deception is a promising approach for cyber defense. Via defensive deception, a defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding some of its resources. Although defensive deception is garnering incr
Publikováno v:
IEEE Transactions on Network and Service Management. :1-1
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract The number of patents increases quickly, while more and more low-quality patents are emerging. It’s important to identify high-quality patents from massive data quickly and accurately for organizational R&D decision-making and patent layou
Externí odkaz:
https://doaj.org/article/a3799e821f66442ab39771228c8cbd9c
Publikováno v:
天地一体化信息网络, Vol 5, Pp 32-39 (2024)
The high dynamics of the topology structure, the high variability of the links between space and ground, and the highly limited network resource in the space-ground heterogeneous network pose significant challenges.To address these challenges, a spac
Externí odkaz:
https://doaj.org/article/2739f635c06f40ff8806419cf66494f0
Publikováno v:
Next Materials, Vol 4, Iss , Pp 100105- (2024)
The carbon nitride (C3N4) materials and hybrids have been acknowledged as promising photocatalysts for decades. The precise design and modulation of C3N4-based photocatalyst in defects and energy bands for further promotion is of importance but less
Externí odkaz:
https://doaj.org/article/a44697809f134af3b94c1ad2f6b43940
Publikováno v:
Remote Sensing, Vol 16, Iss 18, p 3433 (2024)
It is rare to conduct a comparative analysis of precipitation characteristics across regions based on long-term homogeneous active satellite observations. By collocating the Global Precipitation Measurement Dual-frequency Precipitation Radar (GPM DPR
Externí odkaz:
https://doaj.org/article/9c12578ce76747dc82b0e662b321b570