Search Results - "Zhao, Xingwen"

Refine Results
  1. 1

    Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things by Zhao, Xingwen, Li, Dexin, Li, Hui

    Published in Sensors (Basel, Switzerland) (01-10-2022)
    “…Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design…”
    Get full text
    Journal Article
  2. 2

    A lightweight user authentication scheme for multi-gateway based wireless sensor networks using Rabin Cryptosystem by Zhao, Xingwen, Li, Dexin

    Published in IEEE access (01-01-2023)
    “…The existing authentication schemes in wireless sensor networks (WSNs) are mostly used in single-gateway mode. With the wide deployment of WSNs, the drawbacks…”
    Get full text
    Journal Article
  3. 3

    A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing by Cai, Jiayin, Zhang, Hongjie, Duo, Zhilin, Wang, Xuan, Zhao, Xingwen

    Published in IEEE access (2024)
    “…Relying on the low latency, high reliability, and large bandwidth of 5G networks, the Internet of Things (IoT) can more efficiently promote information…”
    Get full text
    Journal Article
  4. 4

    A Novel Method for Measuring the Attitude Angles of the Artillery Barrel Based on Monocular Vision by Zheng, Tianyu, Gong, Bingyu, Li, Xiangdong, Zhao, Xingwen, Zhang, Yanbo

    Published in IEEE access (2024)
    “…Aiming at the problems of low accuracy, low efficiency and weak versatility in artillery barrel attitude measurement, a specialized marker and a new…”
    Get full text
    Journal Article
  5. 5

    A three-dimensional measurement study of fracture displacement in Garden I femoral neck fracture: a retrospective study by Wang, Ying, Ma, Jianxiong, Bai, Haohao, Zhan, Hongqi, Lu, Bin, Sun, Lei, Jin, Hongzhen, Zhao, Xingwen, Wu, Yanfei, Chen, Jiahui, Ma, Xinlong

    Published in BMC musculoskeletal disorders (01-08-2023)
    “…Garden I femoral neck fractures are nondisplaced femoral neck fractures. Nonoperative treatment and in situ fixation are the preferred treatments. However, the…”
    Get full text
    Journal Article
  6. 6

    Novel insights into whey protein among Yak, Yellow Cattle, and Cattle-Yak milk by Li, Yufang, Li, Shijun, Zhao, Xingwen, Shi, Chongying, Chai, Yunmei, Huang, Aixiang, Shi, Yanan

    Published in Food Chemistry: X (30-06-2024)
    “…This study identified characteristic whey proteins from Zhongdian Yak (ZY), Diqing Yellow Cattle (DYC), and Cattle Yak (CY), revealing insights into their…”
    Get full text
    Journal Article
  7. 7

    Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks by Zhao, Xingwen, Li, Hui

    Published in IEEE access (01-01-2017)
    “…Content-centric networks are designed as potential candidates for future 5G networks and the Internet. In these kinds of networks, contents are queried,…”
    Get full text
    Journal Article
  8. 8

    Computer‐aided Design of Distal Femoral Osteotomy for the Valgus Knee and Effect of Correction Angle on Joint Loading by Finite Element Analysis by Wu, Yanfei, Jin, Xin, Zhao, Xingwen, Wang, Ying, Bai, Haohao, Lu, Bin, Tong, Xue, Ma, Jianxiong, Ma, Xinlong

    Published in Orthopaedic surgery (01-11-2022)
    “…Objective Lateral open‐wedge distal femoral osteotomy (DFO) has been used to treat valgus deformity of the knee, with good clinical outcomes. However, there is…”
    Get full text
    Journal Article
  9. 9

    The Osteoarthritis Natural Progress and Changes in Intraosseous Pressure of the Guinea Pig Model in Different Degeneration Stages by Wang, Shuo, Ma, Jianxiong, Zhao, Xingwen, Xue, Yuan, Liu, Wei, Huang, Hongchao, Zhang, Lei, Tian, Aixian, Ma, Xinlong

    Published in Orthopaedic surgery (01-11-2022)
    “…Objective Articular cartilage and subchondral bone changes during the pathological progress of knee osteoarthritis (KOA) is a key event marking the development…”
    Get full text
    Journal Article
  10. 10

    Key Evolving Attribute‐Based Signature Under Short Integer Solution Problem by Xiang, Xinyin, Li, Hui, Zhao, Xingwen

    Published in Chinese Journal of Electronics (01-09-2016)
    “…Key exposure is a severe threat in digital signature, the scheme will be compromised provided that the private key of the signature is revealed. To remove the…”
    Get full text
    Journal Article
  11. 11

    Blockchain-assisted searchable attribute-based encryption for e-health systems by Xiang, Xinyin, Zhao, Xingwen

    Published in Journal of systems architecture (01-03-2022)
    “…The Internet of Things (IoT) is becoming increasingly popular for transmitting massive data in a network. With a limited supply of IoT devices, utilizing cloud…”
    Get full text
    Journal Article
  12. 12

    Protective Effect of Hydroxytyrosol from Phyllanthus emblica Linn Leaves on Testicular Tissue Injury Induced by CS2 in Mice by Nan LI, Ruiting LI, Xingwen ZHAO, Lihong DENG, Hui PU, Yan JIANG

    Published in Shipin gongye ke-ji (01-09-2022)
    “…Objective: The protective effects of hydroxytyrosol from Phyllanthus emblica Linn leaves (PHT) on CS2-induced testicular injury in mice were studied. Methods:…”
    Get full text
    Journal Article
  13. 13

    Open set identification of malicious encrypted traffic based on multi-feature fusion by Zhao, Xingwen, Zhang, Han, Li, Hui, Chen, Xuangui

    “…In the current network environment, an increasing amount of malicious traffic is transmitted through encrypted channels, carrying control commands and data…”
    Get full text
    Journal Article
  14. 14

    Suppression of YAP Ameliorates Cartilage Degeneration in Ankle Osteoarthritis via Modulation of the Wnt/β-Catenin Signaling Pathway by Fan, Zhengrui, Zhao, Xingwen, Ma, Jianxiong, Zhan, Hongqi, Ma, Xinlong

    Published in Calcified tissue international (01-09-2024)
    “…Ankle osteoarthritis is a relatively understudied condition and the molecular mechanisms involved in its development are not well understood. This…”
    Get full text
    Journal Article
  15. 15

    Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments by Zhao, Xingwen, Gan, Luhui, Fan, Kai

    Published in IEEE internet of things journal (01-04-2024)
    “…As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to…”
    Get full text
    Journal Article
  16. 16

    Continuous leakage–resilient IBE in cloud computing by Xiang, Xinyin, Zhao, Xingwen

    “…Summary Cloud computing is an efficient tool in which cloud storage shares plenty of encrypted data with other data owners. In existing cloud computing…”
    Get full text
    Journal Article
  17. 17

    Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing by Li, Dexin, Zhao, Xingwen, Li, Hui, Fan, Kai

    Published in IEEE internet of things journal (01-12-2024)
    “…Considerable attention has been directed toward dynamic searchable symmetric encryption (DSSE) since it has the capability to both search and update the…”
    Get full text
    Journal Article
  18. 18

    Soft hypergraph regularized weighted low rank subspace clustering for hyperspectral image band selection by Xu, Jinhuan, Yan, Guang, Zhao, Xingwen, Ai, Mingshun, Li, Xiangdong, Liu, Pengfei

    Published in International journal of remote sensing (18-07-2022)
    “…Recently, the graph regularized low-rank representation (GLRR) has been introduced in Hyperspectral Image (HSI) to explore global structures information by…”
    Get full text
    Journal Article
  19. 19

    Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority by Zhao, Xingwen, Zhang, Fangguo

    Published in The Journal of systems and software (01-03-2012)
    “…► We present a new identity based broadcast encryption scheme. ► The scheme achieves weak blackbox accountability for authority. ► We give out detailed…”
    Get full text
    Journal Article
  20. 20

    Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems by Yan, Haonan, Li, Xiaoguang, Zhang, Wenjing, Wang, Rui, Li, Hui, Zhao, Xingwen, Li, Fenghua, Lin, Xiaodong

    “…Network intrusion detection systems (IDS) are often considered effective to thwart cyber attacks. Currently, state-of-the-art (SOTA) IDSs are mainly based on…”
    Get full text
    Journal Article