Search Results - "Tao, Xiaoling"

Refine Results
  1. 1

    Blockchain-Based Data Preservation System for Medical Data by Li, Hongyu, Zhu, Liehuang, Shen, Meng, Gao, Feng, Tao, Xiaoling, Liu, Sheng

    Published in Journal of medical systems (01-08-2018)
    “…Medical care has become an indispensable part of people’s lives, with a dramatic increase in the volume of medical data (e.g., diagnosis certificates and…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Long non-coding RNA PRNCR1 promotes ovarian cancer cell proliferation, migration and invasion by targeting the miR-653-5p/ELF2 axis by Qi, Xing, Chen, Dejun, Yu, Weichang, Wang, Liming, Liu, Lu, Tao, Xiaoling

    Published in Molecular and cellular biochemistry (01-05-2022)
    “…Recent studies have shown that prostate cancer-associated long non-coding RNA, PRNCR1, plays crucial roles in the development of multiple human cancers…”
    Get full text
    Journal Article
  4. 4

    A parallel algorithm for network traffic anomaly detection based on Isolation Forest by Tao, Xiaoling, Peng, Yang, Zhao, Feng, Zhao, Peichao, Wang, Yong

    “…With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data…”
    Get full text
    Journal Article
  5. 5

    Assure deletion supporting dynamic insertion for outsourced data in cloud computing by Yang, Changsong, Liu, Yueling, Tao, Xiaoling

    “…With the rapid development of cloud computing, an increasing number of data owners are willing to employ cloud storage service. In cloud storage, the…”
    Get full text
    Journal Article
  6. 6

    Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing by Yang, Changsong, Tao, Xiaoling, Zhao, Feng, Wang, Yong

    Published in Chinese Journal of Electronics (01-03-2020)
    “…With the rapid development of cloud storage, an increasing number of data owners prefer to outsource their data to the cloud server, which can greatly reduce…”
    Get full text
    Journal Article
  7. 7

    Publicly verifiable data transfer and deletion scheme for cloud storage by Yang, Changsong, Tao, Xiaoling, Zhao, Feng

    “…With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage…”
    Get full text
    Journal Article
  8. 8

    A Dynamic Load Balancing Method of Cloud-Center Based on SDN by WANG Yong TAO Xiaoling HE Qian KUANG Yuwen

    Published in 中国通信(英文版) (01-02-2016)
    “…In order to balancing based on data achieve dynamic load flow level, in this paper, we apply SDN technology to the cloud data center, and propose a dynamic…”
    Get full text
    Journal Article
  9. 9

    An efficient method for network security situation assessment by Tao, Xiaoling, Kong, Kaichuan, Zhao, Feng, Cheng, Siyan, Wang, Sufang

    “…Network security situational assessment, the core task of network security situational awareness, can obtain security situation by comprehensively analyzing…”
    Get full text
    Journal Article
  10. 10

    Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing by Yang, Changsong, Liu, Yueling, Tao, Xiaoling, Zhao, Feng

    Published in IEEE access (2020)
    “…Cloud storage, one of the most attractive services offered by cloud computing, can provide users with boundless storage capacity. Thus, users can outsource…”
    Get full text
    Journal Article
  11. 11

    An insider user authentication method based on improved temporal convolutional network by Tao, Xiaoling, Yu, Yuelin, Fu, Lianyou, Liu, Jianxiang, Zhang, Yunhao

    Published in High-Confidence Computing (01-12-2023)
    “…With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational…”
    Get full text
    Journal Article
  12. 12

    Graph database-based network security situation awareness data storage method by Tao, Xiaoling, Liu, Yang, Zhao, Feng, Yang, Changsong, Wang, Yong

    “…With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network…”
    Get full text
    Journal Article
  13. 13

    SLA-aware resource scheduling algorithm for cloud storage by Wang, Yong, Tao, Xiaoling, Zhao, Feng, Tian, Bo, Vera Venkata Sai, Akshita Maradapu

    “…Cloud computing is a novel computing paradigm, which connects plenty of computing resources and storage resources via Internet. Cloud computing provides a…”
    Get full text
    Journal Article
  14. 14

    Paired observation on light-cured composite resin and nano-composite resin in dental caries repair by Xiaoling, Tao, Ashraf, Muhammad Aqeel, Yanyan, Zhao

    “…To compare the value of light-cured composite resin with that of nano-composite resin in dental caries repair. 88 patients taking dental caries repair in our…”
    Get full text
    Journal Article
  15. 15

    A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder by Tao, Xiaoling, Kong, Deyan, Wei, Yi, Wang, Yong

    Published in Information (Basel) (01-06-2016)
    “…Data fusion is usually performed prior to classification in order to reduce the input space. These dimensionality reduction techniques help to decline the…”
    Get full text
    Journal Article
  16. 16

    A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark by Wang, Yong, Ke, Wenlong, Tao, Xiaoling

    Published in Information (Basel) (15-02-2016)
    “…Currently, with the rapid increasing of data scales in network traffic classifications, how to select traffic features efficiently is becoming a big challenge…”
    Get full text
    Journal Article
  17. 17

    Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method by Xiaoling Tao, Liyan Liu, Feng Zhao, Yan Huang, Saide Zhu

    Published in Journal of universal computer science (01-01-2019)
    “…With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and…”
    Get full text
    Journal Article
  18. 18

    Towards Trustworthy 6G Networks: A Trust-based Consensus Scheme by Yang, Haochen, Yu, Yong, Zhu, Yixing, Tao, Xiaoling, Yu, Jiguo

    Published in IEEE network (23-10-2024)
    “…The complexity and heterogeneity of the Sixth Generation (6G) networks raise trust issues among network users. Implementing blockchain-based decentralized…”
    Get full text
    Journal Article
  19. 19

    Publicly verifiable outsourced data migration scheme supporting efficient integrity checking by Yang, Changsong, Zhao, Feng, Tao, Xiaoling, Wang, Yong

    “…With the rapid development of cloud storage, an increasing number of data owners prefer to store their large-scale data on the remote cloud for greatly…”
    Get full text
    Journal Article
  20. 20

    The Correlation between Depression during Pregnancy and Metabolic Syndrome by Wu, Qunli, Huang, Haiyan, Wang, Xiaojun, Tao, Xiaoling

    Published in Actas espanolas de psiquiatria (05-08-2024)
    “…In recent years, the incidence of depression during pregnancy has gradually increased, and the disorder of lipid metabolism in patients with depression is an…”
    Get full text
    Journal Article