Search Results - "Zheng, Shihui"
-
1
In Situ Living Cell Protein Analysis by Single-Step Mass Spectrometry
Published in Analytical chemistry (Washington) (06-03-2018)“…In situ living cell protein analysis would enable the structural identification and functional interrogation of intracellular proteins in native cellular…”
Get full text
Journal Article -
2
Matching different-structured advertising pictorial metaphors with verbalization forms: incongruity-based evoked response potentials evidence
Published in Frontiers in psychology (16-05-2023)“…Many studies emphasize the need of verbally representing pictorial metaphors, but few have empirically investigated whether and how the particular…”
Get full text
Journal Article -
3
-
4
Persistent Fault Analysis Against SM4 Implementations in Libraries Crypto++ and GMSSL
Published in IEEE access (2021)“…Compared to the injection of a transient fault, time synchronization and accuracy are not required for the injection process of a persistent fault. However,…”
Get full text
Journal Article -
5
Developments on Core Collections of Plant Genetic Resources: Do We Know Enough?
Published in Forests (29-04-2023)“…The core collection is a small subset that minimizes genetic redundancy while preserving the maximum genetic diversity of the entire population. Research on…”
Get full text
Journal Article -
6
CBOL: Cross-Bank Over-Loan Prevention, Revisited
Published in Entropy (Basel, Switzerland) (03-06-2020)“…With the development of credit businesses, privacy data leakage and data accuracy in loan transactions among different banks tend to be worrisome issues…”
Get full text
Journal Article -
7
RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service
Published in Entropy (Basel, Switzerland) (27-06-2020)“…As the blockchain 2.0 platform, Ethereum’s turing complete programming language and smart contract components make it play an important role in the…”
Get full text
Journal Article -
8
ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain
Published in IEEE access (2020)“…Anonymous cryptocurrency is a branch of cryptocurrency designed to protect users' privacy. Ring Confidential Transaction (RingCT) protocol is widely used in…”
Get full text
Journal Article -
9
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
Published in Cryptography (01-12-2020)“…In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides…”
Get full text
Journal Article -
10
Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters
Published in Entropy (Basel, Switzerland) (02-11-2020)“…Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the…”
Get full text
Journal Article -
11
Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling
Published in Journal of advanced computational intelligence and intelligent informatics (20-05-2019)“…The numerical control separation in the Software-Defined Network (SDN) allows the control plane to have the absolute management rights of the network. As a new…”
Get full text
Journal Article -
12
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography
Published in Journal of Applied Mathematics (01-01-2014)“…To resist known quantum algorithm attacks, several nonabelian algebraic structures mounted upon the stage of modern cryptography. Recently, Baba et al…”
Get full text
Journal Article -
13
The Phenotypic Variation in Moso Bamboo and the Selection of Key Traits
Published in Plants (Basel) (12-06-2024)“…This research aimed to explore the diverse phenotypic characteristics of moso bamboo in China and pinpoint essential characteristics of moso bamboo. In this…”
Get full text
Journal Article -
14
Hierarchical identity-based broadcast encryption scheme from LWE
Published in Journal of communications and networks (01-06-2014)“…A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In…”
Get full text
Journal Article -
15
A new impossible differential attack on SAFER ciphers
Published in Computers & electrical engineering (2010)“…This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al…”
Get full text
Journal Article -
16
How to Launch a Powerful Side-Channel Collision Attack?
Published in IEEE transactions on computers (2024)“…A cryptographic implementation produces very similar power leakages when fed with the same input. Side-channel collision attacks exploit these similarities to…”
Get full text
Journal Article -
17
A comprehensive therapeutic approach of traditional Chinese medicine for mild adolescent idiopathic scoliosis
Published in Asian journal of surgery (01-06-2024)Get full text
Journal Article -
18
Breaking Fault Attack Countermeasures With Side-Channel Information
Published in IEEE transactions on computers (01-05-2023)“…In the persistent fault-based collision attack (PFCA) (Zheng et al. 2021), the adversary captures the information that the intermediate states have collided…”
Get full text
Journal Article -
19
Concise RingCT Protocol Based on Linkable Threshold Ring Signature
Published in IEEE transactions on dependable and secure computing (01-09-2024)“…Ring Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency…”
Get full text
Journal Article -
20
NAMI-A preferentially reacts with the Sp1 protein: understanding the anti-metastasis effect of the drug
Published in Chemical communications (Cambridge, England) (30-01-2020)“…NAMI-A is highly reactive to Sp1, a tumor metastasis related protein, resulting in the perturbation of the protein structure and disruption of the DNA…”
Get more information
Journal Article