Search Results - "Cheng, Lanxin"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Orthodontic camouflage treatment for a patient with bilateral cleft lip and palate, bilateral crossbite, and microdontic maxillary lateral incisors by Cheng, Lanxin, Xia, Kai, Sun, Wentian, Yu, Liyuan, Zhao, Zhihe, Liu, Jun

    Published in European journal of medical research (13-02-2024)
    “…Cleft lip and palate is a congenital craniofacial anomaly that affects the lip and oral cavity. The management and orthodontic treatment of this anomaly is…”
    Get full text
    Journal Article
  2. 2

    Research progress on the three-dimensional finite element analysis of bite opening by CHENG Lanxin, LIU Jun

    “…Deep bite is a common clinical malocclusion that has a great impact on patients’ facial aesthetics and oral function. Bite opening is the key step in the…”
    Get full text
    Journal Article
  3. 3

    Analysis of methylation‐driven genes for predicting the prognosis of patients with head and neck squamous cell carcinoma by Pan, Yihua, Song, Yidan, Cheng, Lanxin, Xu, Hongdan, Liu, Jun

    Published in Journal of cellular biochemistry (01-12-2019)
    “…To help provide evidence for prognosis prediction and personalized targeted therapy for patients with head and neck squamous cell carcinoma (HNSCC), we…”
    Get full text
    Journal Article
  4. 4

    The coordination of bimaxillary alveolar arch widths in subjects with normal occlusion or posterior crossbite: A CBCT retrospective study by Luo, Liangyu, Liu, Qing, Pan, Yihua, Song, Yidan, Li, Jiaojiao, Cheng, Lanxin, Zhao, Zhihe, Liu, Jun

    Published in Orthodontics & craniofacial research (01-10-2024)
    “…Objectives To propose a method for evaluating the coordination of maxillomandibular alveolar arch in transverse dimension with cone‐beam computed tomography…”
    Get full text
    Journal Article
  5. 5

    A Self-Attention Mechanism-Based Model to Detect IPv6 Multi-Field Covert Channels by Zhang, Liancheng, Wang, Jichang, Guo, Yi, Zhang, Hongtao, Cheng, Lanxin, Xia, Wenhao

    “…IPv6 covert channels have emerged as a novel type of network threat, which poses new challenges to network security. Multi-field covert channels make use of…”
    Get full text
    Journal Article
  6. 6

    Quality Guarantee System Framework of Cyberspace Security Postgraduate Education Based on Comprehensive View from the Perspective of New Engineering by Guo, Yi, Yan, Juwei, Zhang, Lianchenz, Du, Wenwen, Cheng, Lanxin

    “…With the proposal of the major strategy of "network power" and the establishment of the first level discipline of "Cyberspace security", the training of…”
    Get full text
    Conference Proceeding
  7. 7

    DScan6: Fast IPv6 Address Scanning Technology Based on Cross-Kernel Asynchronously Sending and Receiving by Hu, Ming, Zhang, Liancheng, Yang, Jianbo, Zhang, Hongtao, Cheng, Lanxin, Fang, Yakai

    “…Network address scanning is an important support for precise network governance, network situational analysis and network security management. IPv4…”
    Get full text
    Conference Proceeding
  8. 8

    Experimental Design of Router Debugging based Neighbor Cache States Change of IPv6 Nodes by Zhang, Liancheng, Du, Wenwen, Cheng, Lanxin, Guo, Yi, Ding, Wenbo, Ma, Xupan

    “…Current IPv6 node neighbor cache teaching practices focus on theoretical introductions and graphical explanations, and lack targeted experiments on neighbor…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10
  11. 11

    CGA Configuration Detection Method of IPv6 Nodes by Combining Active Probing with Passive Sniffing by Zhang, Liancheng, Sun, Jianping, Yan, Juwei, Guo, Yi, Cheng, Lanxin, Du, Wenwen

    “…To ensure the security of neighbor discovery messages and processes, IPv6 subnets are increasingly deploying secure neighbor discovery (SEND) mechanisms…”
    Get full text
    Conference Proceeding
  12. 12

    6FloodDetector: An IPv6 Flooding Behaviors Detection Technology Based on Eigenvalues and Thresholds by Zhang, Liancheng, Xia, Wenhao, Huang, Weibin, Du, Wenwen, Guo, Yi, Cheng, Lanxin

    “…With the rapid deployment and application of IPv6, IPv6 network security incidents and threats are on the rise. Flooding is one of many serious security…”
    Get full text
    Conference Proceeding
  13. 13

    Hostname Correlation Based IPv6 Address Fast Scanning Technology of Windows Nodes by Hu, Ming, Zhang, Liancheng, Guo, Yi, Cheng, Lanxin, Du, Wenwen, Ma, Xupan

    “…Rapid and accurate scanning of alive addresses within the IPv6 intranet is the basis and premise of IPv6 network asset management and security maintenance…”
    Get full text
    Conference Proceeding
  14. 14

    A Packet Fields Authenticity Check Based Detection Technology of IPv6 Spoofing Behaviors by Zhang, Liancheng, Xia, Wenhao, Song, Xinyu, Cheng, Lanxin, Du, Wenwen, Ma, Xupan

    “…With the increasing popularity of IPv6 network deployment and application, more and more security problems of the IPv6 protocol mechanism and protocol stack…”
    Get full text
    Conference Proceeding