Search Results - "Cheng, Lanxin"
-
1
Orthodontic camouflage treatment for a patient with bilateral cleft lip and palate, bilateral crossbite, and microdontic maxillary lateral incisors
Published in European journal of medical research (13-02-2024)“…Cleft lip and palate is a congenital craniofacial anomaly that affects the lip and oral cavity. The management and orthodontic treatment of this anomaly is…”
Get full text
Journal Article -
2
Research progress on the three-dimensional finite element analysis of bite opening
Published in Kou qiang ji bing fang zhi = Journal of prevention and treatment for stomatological diseases (01-11-2022)“…Deep bite is a common clinical malocclusion that has a great impact on patients’ facial aesthetics and oral function. Bite opening is the key step in the…”
Get full text
Journal Article -
3
Analysis of methylation‐driven genes for predicting the prognosis of patients with head and neck squamous cell carcinoma
Published in Journal of cellular biochemistry (01-12-2019)“…To help provide evidence for prognosis prediction and personalized targeted therapy for patients with head and neck squamous cell carcinoma (HNSCC), we…”
Get full text
Journal Article -
4
The coordination of bimaxillary alveolar arch widths in subjects with normal occlusion or posterior crossbite: A CBCT retrospective study
Published in Orthodontics & craniofacial research (01-10-2024)“…Objectives To propose a method for evaluating the coordination of maxillomandibular alveolar arch in transverse dimension with cone‐beam computed tomography…”
Get full text
Journal Article -
5
A Self-Attention Mechanism-Based Model to Detect IPv6 Multi-Field Covert Channels
Published in IEEE transactions on cognitive communications and networking (29-06-2024)“…IPv6 covert channels have emerged as a novel type of network threat, which poses new challenges to network security. Multi-field covert channels make use of…”
Get full text
Journal Article -
6
Quality Guarantee System Framework of Cyberspace Security Postgraduate Education Based on Comprehensive View from the Perspective of New Engineering
Published in 2022 4th International Conference on Computer Science and Technologies in Education (CSTE) (01-05-2022)“…With the proposal of the major strategy of "network power" and the establishment of the first level discipline of "Cyberspace security", the training of…”
Get full text
Conference Proceeding -
7
DScan6: Fast IPv6 Address Scanning Technology Based on Cross-Kernel Asynchronously Sending and Receiving
Published in 2023 15th International Conference on Communication Software and Networks (ICCSN) (21-07-2023)“…Network address scanning is an important support for precise network governance, network situational analysis and network security management. IPv4…”
Get full text
Conference Proceeding -
8
Experimental Design of Router Debugging based Neighbor Cache States Change of IPv6 Nodes
Published in 2022 IEEE 8th International Conference on Computer and Communications (ICCC) (09-12-2022)“…Current IPv6 node neighbor cache teaching practices focus on theoretical introductions and graphical explanations, and lack targeted experiments on neighbor…”
Get full text
Conference Proceeding -
9
CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching
“…As the IPv6 protocol has been rapidly developed and applied, the security of IPv6 networks has become the focus of academic and industrial attention. Despite…”
Get full text
Conference Proceeding -
10
FACA: An effective method for detecting the survivability of large-scale IPv6 addresses
“…IPv6 address scanning is the basic technology of IPv6 network measurement and security. In recent years, there has been some researches focusing in address…”
Get full text
Conference Proceeding -
11
CGA Configuration Detection Method of IPv6 Nodes by Combining Active Probing with Passive Sniffing
Published in 2022 IEEE 22nd International Conference on Communication Technology (ICCT) (11-11-2022)“…To ensure the security of neighbor discovery messages and processes, IPv6 subnets are increasingly deploying secure neighbor discovery (SEND) mechanisms…”
Get full text
Conference Proceeding -
12
6FloodDetector: An IPv6 Flooding Behaviors Detection Technology Based on Eigenvalues and Thresholds
Published in 2022 IEEE 22nd International Conference on Communication Technology (ICCT) (11-11-2022)“…With the rapid deployment and application of IPv6, IPv6 network security incidents and threats are on the rise. Flooding is one of many serious security…”
Get full text
Conference Proceeding -
13
Hostname Correlation Based IPv6 Address Fast Scanning Technology of Windows Nodes
Published in 2022 IEEE 22nd International Conference on Communication Technology (ICCT) (11-11-2022)“…Rapid and accurate scanning of alive addresses within the IPv6 intranet is the basis and premise of IPv6 network asset management and security maintenance…”
Get full text
Conference Proceeding -
14
A Packet Fields Authenticity Check Based Detection Technology of IPv6 Spoofing Behaviors
Published in 2022 IEEE 22nd International Conference on Communication Technology (ICCT) (11-11-2022)“…With the increasing popularity of IPv6 network deployment and application, more and more security problems of the IPv6 protocol mechanism and protocol stack…”
Get full text
Conference Proceeding