Search Results - "Zheng, Shihui"

Refine Results
  1. 1

    In Situ Living Cell Protein Analysis by Single-Step Mass Spectrometry by Li, Gongyu, Yuan, Siming, Zheng, Shihui, Liu, Yangzhong, Huang, Guangming

    Published in Analytical chemistry (Washington) (06-03-2018)
    “…In situ living cell protein analysis would enable the structural identification and functional interrogation of intracellular proteins in native cellular…”
    Get full text
    Journal Article
  2. 2

    Matching different-structured advertising pictorial metaphors with verbalization forms: incongruity-based evoked response potentials evidence by Cao, Shuo, Yue, Fang, Zheng, Shihui, Fu, Yang, Huang, Jing, Wang, Huili

    Published in Frontiers in psychology (16-05-2023)
    “…Many studies emphasize the need of verbally representing pictorial metaphors, but few have empirically investigated whether and how the particular…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Persistent Fault Analysis Against SM4 Implementations in Libraries Crypto++ and GMSSL by Guo, Qing, Ke, Zhenhan, Wang, Siyuan, Zheng, Shihui

    Published in IEEE access (2021)
    “…Compared to the injection of a transient fault, time synchronization and accuracy are not required for the injection process of a persistent fault. However,…”
    Get full text
    Journal Article
  5. 5

    Developments on Core Collections of Plant Genetic Resources: Do We Know Enough? by Rui Gu, Shaohui Fan, Songpo Wei, Jiarui Li, Shihui Zheng, Guanglu Liu

    Published in Forests (29-04-2023)
    “…The core collection is a small subset that minimizes genetic redundancy while preserving the maximum genetic diversity of the entire population. Research on…”
    Get full text
    Journal Article
  6. 6

    CBOL: Cross-Bank Over-Loan Prevention, Revisited by Hu, Xiaoya, Zhao, Hong, Zheng, Shihui, Wang, Licheng

    Published in Entropy (Basel, Switzerland) (03-06-2020)
    “…With the development of credit businesses, privacy data leakage and data accuracy in loan transactions among different banks tend to be worrisome issues…”
    Get full text
    Journal Article
  7. 7

    RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service by Zhao, Hong, Bai, Xue, Zheng, Shihui, Wang, Licheng

    Published in Entropy (Basel, Switzerland) (27-06-2020)
    “…As the blockchain 2.0 platform, Ethereum’s turing complete programming language and smart contract components make it play an important role in the…”
    Get full text
    Journal Article
  8. 8

    ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain by Duan, Junke, Gu, Lize, Zheng, Shihui

    Published in IEEE access (2020)
    “…Anonymous cryptocurrency is a branch of cryptocurrency designed to protect users' privacy. Ring Confidential Transaction (RingCT) protocol is widely used in…”
    Get full text
    Journal Article
  9. 9

    Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud by Zhou, Yunhong, Zheng, Shihui, Wang, Licheng

    Published in Cryptography (01-12-2020)
    “…In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides…”
    Get full text
    Journal Article
  10. 10

    Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters by Zhang, Yuan, Liu, Yuan, Guo, Yurong, Zheng, Shihui, Wang, Licheng

    Published in Entropy (Basel, Switzerland) (02-11-2020)
    “…Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the…”
    Get full text
    Journal Article
  11. 11

    Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling by Meng, Qingyue, Zheng, Shihui, Cai, Yongmei

    “…The numerical control separation in the Software-Defined Network (SDN) allows the control plane to have the absolute management rights of the network. As a new…”
    Get full text
    Journal Article
  12. 12

    Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography by Gu, Lize, Zheng, Shihui

    Published in Journal of Applied Mathematics (01-01-2014)
    “…To resist known quantum algorithm attacks, several nonabelian algebraic structures mounted upon the stage of modern cryptography. Recently, Baba et al…”
    Get full text
    Journal Article
  13. 13

    The Phenotypic Variation in Moso Bamboo and the Selection of Key Traits by Zheng, Shihui, Wei, Songpo, Li, Jiarui, Wang, Jingsheng, Deng, Ziyun, Gu, Rui, Fan, Shaohui, Liu, Guanglu

    Published in Plants (Basel) (12-06-2024)
    “…This research aimed to explore the diverse phenotypic characteristics of moso bamboo in China and pinpoint essential characteristics of moso bamboo. In this…”
    Get full text
    Journal Article
  14. 14

    Hierarchical identity-based broadcast encryption scheme from LWE by Yang, Chunli, Zheng, Shihui, Wang, Licheng, Lu, Xiuhua, Yang, Yixian

    Published in Journal of communications and networks (01-06-2014)
    “…A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In…”
    Get full text
    Journal Article
  15. 15

    A new impossible differential attack on SAFER ciphers by Zheng, Shihui, Wang, Licheng, Yang, Yixian

    “…This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al…”
    Get full text
    Journal Article
  16. 16

    How to Launch a Powerful Side-Channel Collision Attack? by Long, Jiangshan, Ou, Changhai, Ma, Yajun, Fan, Yifan, Chen, Hua, Zheng, Shihui

    Published in IEEE transactions on computers (2024)
    “…A cryptographic implementation produces very similar power leakages when fed with the same input. Side-channel collision attacks exploit these similarities to…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Breaking Fault Attack Countermeasures With Side-Channel Information by Zheng, Shihui, Xing, Ruihao, Lai, Junlong, Liu, Junkai, Wang, Haofeng, Ou, Changhai

    Published in IEEE transactions on computers (01-05-2023)
    “…In the persistent fault-based collision attack (PFCA) (Zheng et al. 2021), the adversary captures the information that the intermediate states have collided…”
    Get full text
    Journal Article
  19. 19

    Concise RingCT Protocol Based on Linkable Threshold Ring Signature by Duan, Junke, Zheng, Shihui, Wang, Wei, Wang, Licheng, Hu, Xiaoya, Gu, Lize

    “…Ring Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency…”
    Get full text
    Journal Article
  20. 20

    NAMI-A preferentially reacts with the Sp1 protein: understanding the anti-metastasis effect of the drug by Yuan, Siming, Chen, Siming, Wu, Han, Jiang, Huan, Zheng, Shihui, Zhang, Qianling, Liu, Yangzhong

    “…NAMI-A is highly reactive to Sp1, a tumor metastasis related protein, resulting in the perturbation of the protein structure and disruption of the DNA…”
    Get more information
    Journal Article