Search Results - "Zhao, Xingwen"
-
1
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
Published in Sensors (Basel, Switzerland) (01-10-2022)“…Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design…”
Get full text
Journal Article -
2
A lightweight user authentication scheme for multi-gateway based wireless sensor networks using Rabin Cryptosystem
Published in IEEE access (01-01-2023)“…The existing authentication schemes in wireless sensor networks (WSNs) are mostly used in single-gateway mode. With the wide deployment of WSNs, the drawbacks…”
Get full text
Journal Article -
3
A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing
Published in IEEE access (2024)“…Relying on the low latency, high reliability, and large bandwidth of 5G networks, the Internet of Things (IoT) can more efficiently promote information…”
Get full text
Journal Article -
4
A Novel Method for Measuring the Attitude Angles of the Artillery Barrel Based on Monocular Vision
Published in IEEE access (2024)“…Aiming at the problems of low accuracy, low efficiency and weak versatility in artillery barrel attitude measurement, a specialized marker and a new…”
Get full text
Journal Article -
5
A three-dimensional measurement study of fracture displacement in Garden I femoral neck fracture: a retrospective study
Published in BMC musculoskeletal disorders (01-08-2023)“…Garden I femoral neck fractures are nondisplaced femoral neck fractures. Nonoperative treatment and in situ fixation are the preferred treatments. However, the…”
Get full text
Journal Article -
6
Novel insights into whey protein among Yak, Yellow Cattle, and Cattle-Yak milk
Published in Food Chemistry: X (30-06-2024)“…This study identified characteristic whey proteins from Zhongdian Yak (ZY), Diqing Yellow Cattle (DYC), and Cattle Yak (CY), revealing insights into their…”
Get full text
Journal Article -
7
Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks
Published in IEEE access (01-01-2017)“…Content-centric networks are designed as potential candidates for future 5G networks and the Internet. In these kinds of networks, contents are queried,…”
Get full text
Journal Article -
8
Computer‐aided Design of Distal Femoral Osteotomy for the Valgus Knee and Effect of Correction Angle on Joint Loading by Finite Element Analysis
Published in Orthopaedic surgery (01-11-2022)“…Objective Lateral open‐wedge distal femoral osteotomy (DFO) has been used to treat valgus deformity of the knee, with good clinical outcomes. However, there is…”
Get full text
Journal Article -
9
The Osteoarthritis Natural Progress and Changes in Intraosseous Pressure of the Guinea Pig Model in Different Degeneration Stages
Published in Orthopaedic surgery (01-11-2022)“…Objective Articular cartilage and subchondral bone changes during the pathological progress of knee osteoarthritis (KOA) is a key event marking the development…”
Get full text
Journal Article -
10
Key Evolving Attribute‐Based Signature Under Short Integer Solution Problem
Published in Chinese Journal of Electronics (01-09-2016)“…Key exposure is a severe threat in digital signature, the scheme will be compromised provided that the private key of the signature is revealed. To remove the…”
Get full text
Journal Article -
11
Blockchain-assisted searchable attribute-based encryption for e-health systems
Published in Journal of systems architecture (01-03-2022)“…The Internet of Things (IoT) is becoming increasingly popular for transmitting massive data in a network. With a limited supply of IoT devices, utilizing cloud…”
Get full text
Journal Article -
12
Protective Effect of Hydroxytyrosol from Phyllanthus emblica Linn Leaves on Testicular Tissue Injury Induced by CS2 in Mice
Published in Shipin gongye ke-ji (01-09-2022)“…Objective: The protective effects of hydroxytyrosol from Phyllanthus emblica Linn leaves (PHT) on CS2-induced testicular injury in mice were studied. Methods:…”
Get full text
Journal Article -
13
Open set identification of malicious encrypted traffic based on multi-feature fusion
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-12-2024)“…In the current network environment, an increasing amount of malicious traffic is transmitted through encrypted channels, carrying control commands and data…”
Get full text
Journal Article -
14
Suppression of YAP Ameliorates Cartilage Degeneration in Ankle Osteoarthritis via Modulation of the Wnt/β-Catenin Signaling Pathway
Published in Calcified tissue international (01-09-2024)“…Ankle osteoarthritis is a relatively understudied condition and the molecular mechanisms involved in its development are not well understood. This…”
Get full text
Journal Article -
15
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments
Published in IEEE internet of things journal (01-04-2024)“…As cloud computing continues to gain popularity, various applications have been deployed under Industrial Internet of Things (IIoT) scenarios. In order to…”
Get full text
Journal Article -
16
Continuous leakage–resilient IBE in cloud computing
Published in International journal of communication systems (10-07-2018)“…Summary Cloud computing is an efficient tool in which cloud storage shares plenty of encrypted data with other data owners. In existing cloud computing…”
Get full text
Journal Article -
17
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing
Published in IEEE internet of things journal (01-12-2024)“…Considerable attention has been directed toward dynamic searchable symmetric encryption (DSSE) since it has the capability to both search and update the…”
Get full text
Journal Article -
18
Soft hypergraph regularized weighted low rank subspace clustering for hyperspectral image band selection
Published in International journal of remote sensing (18-07-2022)“…Recently, the graph regularized low-rank representation (GLRR) has been introduced in Hyperspectral Image (HSI) to explore global structures information by…”
Get full text
Journal Article -
19
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Published in The Journal of systems and software (01-03-2012)“…► We present a new identity based broadcast encryption scheme. ► The scheme achieves weak blackbox accountability for authority. ► We give out detailed…”
Get full text
Journal Article -
20
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems
Published in IEEE transactions on dependable and secure computing (01-01-2024)“…Network intrusion detection systems (IDS) are often considered effective to thwart cyber attacks. Currently, state-of-the-art (SOTA) IDSs are mainly based on…”
Get full text
Journal Article