Search Results - "He Yunhua"
-
1
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications
Published in IEEE access (01-01-2018)“…Crowdsensing applications utilize the pervasive smartphone users to collect large-scale sensing data efficiently. The quality of sensing data depends on the…”
Get full text
Journal Article -
2
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
Published in IEEE access (01-01-2018)“…In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering…”
Get full text
Journal Article -
3
A 3D Printed Paper-Based Thermally Driven Soft Robotic Gripper Inspired by Cabbage
Published in International journal of precision engineering and manufacturing (01-11-2019)“…Biologically inspired or mimetic approaches have been traditionally widely adopted in robotic creative design. Generally, the most considered source for…”
Get full text
Journal Article -
4
A survey: applications of blockchain in the Internet of Vehicles
Published in EURASIP journal on wireless communications and networking (07-04-2021)“…Blockchain technology has completely changed the area of cryptocurrency with a Peer-to-Peer system named Bitcoin. It can provide a distributed, transparent and…”
Get full text
Journal Article -
5
RING box protein-1(RBX1), a key component of SCF E3 ligase, induced multiple myeloma cell drug-resistance though suppressing p27
Published in Cancer biology & therapy (31-12-2023)“…Multiple myeloma (MM) is a clonal disease of plasma cells that remains, for the most part, incurable despite the advent of several novel therapeutics. The…”
Get full text
Journal Article -
6
Interactive design for additive manufacturing: a creative case of synchronous belt drive
Published in International journal on interactive design and manufacturing (01-08-2018)“…As a digital and direct manufacturing technology, additive manufacturing (AM) presents a powerful and unrestrained revolution for creative design. However the…”
Get full text
Journal Article -
7
Effects of SF6 decomposition components and concentrations on the discharge faults and insulation defects in GIS equipment
Published in Scientific reports (14-09-2020)“…Gas-insulated switchgear (GIS) is widely used across multiple electric stages and different power grid levels. However, the threat from several inevitable…”
Get full text
Journal Article -
8
Traffic anomaly detection algorithm for CAN bus using similarity analysis
Published in High-Confidence Computing (01-09-2024)“…Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus…”
Get full text
Journal Article -
9
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme
Published in EURASIP journal on wireless communications and networking (11-08-2021)“…Network slicing, as a key technique of 5G, provides a way that network operators can segment multiple virtual logic on the same physical network and each…”
Get full text
Journal Article -
10
A Triazine Membrane for Sustainable Acquisition of Au(III) from Wastewater
Published in Molecules (Basel, Switzerland) (01-05-2024)“…The recovery of Au(III) from solution using adsorbents in the form of granules or powders is challenging due to issues such as instability during the recovery…”
Get full text
Journal Article -
11
A trusted architecture for EV shared charging based on blockchain technology
Published in High-Confidence Computing (01-12-2021)“…With the development of the Energy Internet and the support of the subsidy policies of various countries, Electric Vehicles(EVs) have ushered in a golden…”
Get full text
Journal Article -
12
Destination Prediction-Based Scheduling Algorithms for Message Delivery in IoVs
Published in IEEE access (2020)“…Destination related applications are playing an important role in Internet of Vehicles(IoVs), which can provide people with convenience or business profit,…”
Get full text
Journal Article -
13
-
14
Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks
Published in IEEE access (2019)“…With the development of technology and the decreasing of manufacturing costs, unmanned aerial vehicle (UAV) is considered to be one of the most effective relay…”
Get full text
Journal Article -
15
Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization
Published in High-Confidence Computing (01-09-2024)“…Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization, decentralization, democratization, and…”
Get full text
Journal Article -
16
A verifiable and efficient cross-chain calculation model for charging pile reputation
Published in High-Confidence Computing (01-06-2024)“…To solve the current situation of low vehicle-to-pile ratio, charging pile (CP) operators incorporate private CPs into the shared charging system. However, the…”
Get full text
Journal Article -
17
Endocrine system-related adverse events associated with PD-1/PD-L1 inhibitors: data mining from the FDA adverse event reporting system
Published in Frontiers in medicine (16-04-2024)“…Various immune checkpoint inhibitors, such as programmed cell death protein-1 (PD-1) and its ligand (PD-L1), have been approved for use, but they have side…”
Get full text
Journal Article -
18
Segmented Trajectory Clustering-Based Destination Prediction in IoVs
Published in IEEE access (2020)“…Location-based services have important applications in IoVs, and especially the destination-related applications have attracted more and more attention. Due to…”
Get full text
Journal Article -
19
Pyruvate kinase isoform M2 (PKM2) participates in multiple myeloma cell proliferation, adhesion and chemoresistance
Published in Leukemia research (01-12-2015)“…Graphical abstract…”
Get full text
Journal Article -
20
Side-channel information leakage of encrypted video stream in video surveillance systems
Published in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (01-04-2016)“…Video surveillance has been widely adopted to ensure home security in recent years. Most video encoding standards such as H.264 and MPEG-4 compress the…”
Get full text
Conference Proceeding