Search Results - "Tao, Yunting"

Refine Results
  1. 1

    Secure Cloud-Aided Approximate Nearest Neighbor Search on High-Dimensional Data by Liu, Jia, Yinchai, Wang, Wei, Fengrui, Han, Qing, Tao, Yunting, Zhao, Liping, Li, Xinjin, Sun, Hongbo

    Published in IEEE access (2023)
    “…As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information…”
    Get full text
    Journal Article
  2. 2

    Endothelial protective genes induced by statin are mimicked by ERK5 activation as triggered by a drug combination of FTI-277 and GGTI-298 by Chu, Uyen B., Duellman, Tyler, Weaver, Sara J., Tao, Yunting, Yang, Jay

    Published in Biochimica et biophysica acta (01-07-2015)
    “…Statins are potent inhibitors of cholesterol biosynthesis and are clinically beneficial in preventing cardiovascular diseases, however, the therapeutic utility…”
    Get full text
    Journal Article
  3. 3

    Ponatinib Activates an Inflammatory Response in Endothelial Cells via ERK5 SUMOylation by Paez-Mayorga, Jesus, Chen, Andrew L, Kotla, Sivareddy, Tao, Yunting, Abe, Rei J, He, Emma D, Danysh, Brian P, Hofmann, Marie-Claude C, Le, Nhat-Tu

    Published in Frontiers in cardiovascular medicine (06-09-2018)
    “…Ponatinib is a multi-targeted third generation tyrosine kinase inhibitor (TKI) used in the treatment of chronic myeloid leukemia (CML) patients harboring the…”
    Get full text
    Journal Article
  4. 4
  5. 5

    The use of erenumab for migraine prophylaxis during pregnancy: A case report and narrative review by Vig, Sierra J., Garza, Julia, Tao, Yunting

    Published in Headache (01-11-2022)
    “…Objective To report a case of a woman who continued erenumab for migraine prophylaxis throughout her pregnancy and to review the literature for pregnancy…”
    Get full text
    Journal Article
  6. 6
  7. 7

    Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding by Tao, Yunting, Li, Yuqun, Kong, Fanyu, Shi, Yuliang, Yang, Ming, Yu, Jia, Zhang, Hanlin

    Published in Computers & security (01-09-2024)
    “…Face recognition is a biometric-based technology that identifies or verifies a person’s identity by analyzing and comparing patterns in their facial features…”
    Get full text
    Journal Article
  8. 8

    Secure outsourced decryption for FHE-based privacy-preserving cloud computing by Ma, Xirong, Li, Chuan, Hu, Yuchang, Tao, Yunting, Jiang, Yali, Li, Yanbin, Kong, Fanyu, Ge, Chunpeng

    “…The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing…”
    Get full text
    Journal Article
  9. 9

    Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things by Cui, Pengyu, Tao, Yunting, Zhen, Bin, Kong, Fanyu, Ge, Chunpeng, Ma, Chuan, Yu, Jia

    Published in IEEE internet of things journal (15-08-2024)
    “…With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding…”
    Get full text
    Journal Article
  10. 10

    EPPSA: Efficient Privacy-Preserving Statistical Aggregation Scheme for Edge Computing-Enhanced Wireless Sensor Networks by Tao, Yunting, Kong, Fanyu, Yu, Jia, Xu, Qiuliang

    Published in Security and communication networks (02-05-2022)
    “…In edge computing-enhanced wireless sensor networks (WSNs), multidimensional data aggregation can optimize the utilization of computation resources for data…”
    Get full text
    Journal Article
  11. 11

    Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers by Wang, Yinlong, Tao, Yunting, Kong, Fanyu, Gu, Zhaoquan, Yu, Jia, Zhang, Hanlin

    “…Large-scale matrix multiplication is a computational bottleneck in various applications including artificial intelligence and machine learning. Given the time…”
    Get full text
    Conference Proceeding
  12. 12
  13. 13

    Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System by Tao, Yunting, Kong, Fanyu, Shi, Yuliang, Yu, Jia, Zhang, Hanlin, Liu, Huiyi

    “…The proliferation of Internet of Things (IoT) devices has led to the generation of massive amounts of data that require efficient aggregation for analysis and…”
    Get full text
    Conference Proceeding
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20