期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
1
作者 Jun Li Minqing Zhang +2 位作者 Ke Niu Yingnan Zhang xiaoyuan yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2085-2103,共19页
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio... Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios. 展开更多
关键词 Video steganography video steganalysis motion vector prediction motion vector difference advanced motion vector prediction local optimality
下载PDF
SFSDA:Secure and Flexible Subset Data Aggregation with Fault Tolerance for Smart Grid
2
作者 Dong Chen Tanping Zhou +3 位作者 Xu An Wang Zichao Song Yujie Ding xiaoyuan yang 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2477-2497,共21页
Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private data.Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a sin... Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private data.Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single value,preventing the leakage of personal data while ensuring its availability.Recently,a flexible subset data aggregation(FSDA)scheme based on the Pail-lier homomorphic encryption was first proposed by Zhang et al.Their scheme can dynamically adjust the size of each subset and obtain the aggregated data in the corresponding subset.In this paper,firstly,an efficient attack with both theorems proving and experimentative verification is launched.We find that in a specific scenario where the encrypted data constructed by a smart meter(SM)exceeds the size of one Paillier ciphertext,the malicious fog node(FN)may use the received ciphertext to obtain the reading of the SM.Secondly,to avoid the possibility of privacy disclosure under certain circumstances,additional hash functions are added to the individual encryption process.In addition,fault tolerance is very important to aggregation schemes in practical scenarios.In most of the current schemes,once some SMs failed,then they will not work.As far as we know,there is no multi-subset aggregation scheme both supports flexible subset data aggregation and fault tolerance.Finally,we construct the first secure flexible subset data aggregation(SFSDA)scheme with fault tolerance by combining the fault tolerance method with the flexible multi-subset aggregation,where FN enables the control server(CS)to finally decrypt the aggregated ciphertext by recovering equivalent ciphertexts when some SMs fail to submit their ciphertexts.Experiments show that our SFSDA scheme keeps the efficiency in implementing a flexible multi-subset aggregation function,and only has a small delay in implementing fault-tolerant data aggregation. 展开更多
关键词 Flexible subset aggregation fault tolerance privacy preservation smart grid
下载PDF
New Identity Based Proxy Re-Encryption Scheme from Lattices 被引量:2
3
作者 Liqiang Wu xiaoyuan yang +1 位作者 Minqing Zhang Longfei Liu 《China Communications》 SCIE CSCD 2019年第10期174-190,共17页
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based cryptography enjoys potential resistance to quantum analysis and low computational complexity. A multi-hop and unidirectional IB-PRE from lattices is presented. We split the functions of decryption and ciphertext transformation separately, and design the double private keys mechanism, where two keys are generated for each user, one key is used to decrypt the ciphertext by Pre-Image Sampling technique, and the other is used to generate the re-encryption key by Bonsai Trees technique. The generation of the re-encryption key is non-interactive and collusion resistant. Moreover, its IND-sID-CPA security over the decisional Learning With Errors (LWE) assumption under the standard model is proved. Compared with some previous IBPRE schemes from Bilinear Pairings, the format of transformed ciphertext in our scheme remains unchanged, furthermore, it can also resist quantum analysis. Compared with some existing IB-PRE schemes from lattices with similar properties, the space of the message in our scheme is a vector of length l and the encryption process remains a lower encryption blowup factor. At last, a proof-of-concept implementation is provided. 展开更多
关键词 IB-PRE LATTICES BONSAI trees COLLUSION RESISTANCE
下载PDF
Self-Assembled Nanomicelles of Affibody-Drug Conjugate with Excellent Therapeutic Property to Cure Ovary and Breast Cancers 被引量:1
4
作者 Xuelin Xia xiaoyuan yang +2 位作者 Wei Huang Xiaoxia Xia Deyue Yan 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第2期190-205,共16页
Affibody molecules are small nonimmunoglobulin affinity proteins,which can precisely target to some cancer cells with specific overexpressed molecular signatures.However,the relatively short in vivo half-life of them ... Affibody molecules are small nonimmunoglobulin affinity proteins,which can precisely target to some cancer cells with specific overexpressed molecular signatures.However,the relatively short in vivo half-life of them seriously limited their application in drug targeted delivery for cancer therapy.Here an amphiphilic affibody-drug conjugate is self-assembled into nanomicelles to prolong circulation time for targeted cancer therapy.As an example of the concept,the nanoagent was prepared through molecular self-assembly of the amphiphilic conjugate of Z_(HHR2:342)-Cys with auristatin E derivate,where the affibody used is capable of binding to the human epidermal growth factor receptor 2(HER2).Such a nanodrug not only increased the blood circulation time,but also enhanced the tumor targeting capacity(abundant affibody arms on the nanoagent surface) and the drug accumulation in tumor.As a result,this affibody-based nanoagent showed excellent antitumor activity in vivo to HER2-positive ovary and breast tumor models,which nearly eradicated both small solid tumors(about 100 mm^(3)) and large established tumors(exceed 500 mm^(3)).The relative tumor proliferation inhibition ratio reaches 99.8% for both models. 展开更多
关键词 Molecular self-assembly Affibody-drug conjugate Nanoagent Targeted cancer therapy
下载PDF
A MV-Based Steganographic Algorithm for H.264/AVC without Distortion 被引量:1
5
作者 Hongqiong Tang xiaoyuan yang +1 位作者 Yingnan Zhang Ke Niu 《Computers, Materials & Continua》 SCIE EI 2020年第6期1205-1219,共15页
H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC... H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm. 展开更多
关键词 Video steganography motion vector without distortion H.264/AVC
下载PDF
Research and Design of Reconfigurable Matrix Multiplication over Finite Field in VLIW Processor
6
作者 yang Su xiaoyuan yang Yuechuan Wei 《China Communications》 SCIE CSCD 2016年第10期222-232,共11页
Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined... Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined with the characteristics of VLIW processor and matrix multiplication of symmetric cipher algorithms, this paper extracted the reconfigurable elements and analyzed the principle of matrix multiplication, then designed the reconfigurable architecture of matrix multiplication of VLIW processor further, at last we put forward single instructions for matrix multiplication between 4×1 and 4×4 matrix or two 4×4 matrix over GF(2~8), through the instructions extension, the instructions could support larger dimension operations. The experiment shows that the instructions we designed supports different dimensions matrix multiplication and improves the processing speed of multiplication greatly. 展开更多
关键词 CRYPTOGRAPHY reconfigurable matrix multiplication research and design dedicated instruction VLIW processor
下载PDF
A Highly Effective DPA Attack Method Based on Genetic Algorithm
7
作者 Shuaiwei Zhang xiaoyuan yang +1 位作者 Weidong Zhong Yujuan Sun 《Computers, Materials & Continua》 SCIE EI 2018年第8期325-338,共14页
As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of ... As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of efforts in this area,which significantly improved the attack efficiency of DPA.However,most of these efforts were made based on the hypothesis that the gathered power consumption data from the target device were stable and low noise.If large deviation happens in part of the power consumption data sample,the efficiency of DPA attack will be reduced rapidly.In this work,a highly efficient method for DPA attack is proposed with the inspiration of genetic algorithm.Based on the designed fitness function,power consumption data that is stable and less noisy will be selected and the noisy ones will be eliminated.In this way,not only improves the robustness and efficiency of DPA attack,but also reduces the number of samples needed.With experiments on block cipher algorithms of DES and SM4,10%and 12.5%of the number of power consumption curves have been reduced in average with the proposed DPAG algorithm compared to original DPA attack respectively.The high efficiency and correctness of the proposed algorithm and novel model are proved by experiments. 展开更多
关键词 DPA EFFICIENCY noise genetic algorithm fitness function novel model
下载PDF
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits
8
作者 Fei Chen Yiliang Han +2 位作者 Di Jiang Xiaoce Li xiaoyuan yang 《国际计算机前沿大会会议论文集》 2016年第1期136-138,共3页
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computa... In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices. 展开更多
关键词 Social computing Public key CRYPTOSYSTEM ATTRIBUTE-BASED SIGNCRYPTION Outsourced computation MULTILINEAR MAPS Selective security
下载PDF
The New Attribute-Based Generalized Signcryption Scheme
9
作者 Yiliang Han Yincheng Bai +1 位作者 Dingyi Fang xiaoyuan yang 《国际计算机前沿大会会议论文集》 2015年第1期102-103,共2页
An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It sho... An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie- Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks. 展开更多
关键词 ATTRIBUTE-BASED ENCRYPTION GENERALIZED SIGNCRYPTION DIFFIE-HELLMAN ASSUMPTION Random oracle model Big data
下载PDF
A Ring Signature Based on LDGM Codes
10
作者 Mingye Liu Yiliang Han xiaoyuan yang 《国际计算机前沿大会会议论文集》 2015年第B12期39-41,共3页
McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.To decrease the key size of the original scheme,alternativ... McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.To decrease the key size of the original scheme,alternative codes have been adopted to replace Goppa codes.In this paper,we propose a ring signature using low-density generator-matrix codes.Our new scheme satisfies anonymity and existential unforgeability under chosen message attacks(EUFCMA).As for efficiency,the number of decoding operations has been reduced largely compared with ZLC ring signature,and the size of the public key is about 0.2%of the ZLC 展开更多
关键词 Post-quantum CRYPTOGRAPHY McEliece CRYPTOSYSTEM LOW-DENSITY generator-matrix code Ring SIGNATURE
下载PDF
A self-assembled affibody-PROTAC conjugate nanomedicine for targeted cancer therapy
11
作者 Qingrong Li xiaoyuan yang +5 位作者 Mengqiao Zhao Xuelin Xia Wenhui Gao Wei Huang Xiaoxia Xia Deyue Yan 《Nano Research》 SCIE EI CSCD 2024年第11期9954-9964,共11页
Proteolysis targeting chimeras (PROTACs) have recently emerged as promising therapeutic agents for cancer therapy. However, their clinical application is considerably hindered by the poor membrane permeability and ins... Proteolysis targeting chimeras (PROTACs) have recently emerged as promising therapeutic agents for cancer therapy. However, their clinical application is considerably hindered by the poor membrane permeability and insufficient tumor distribution of PROTACs. Here we proposed a nanoengineered targeting strategy to construct a self-assembled affibody-PROTAC conjugate nanomedicine (APCN) for tumor-specific delivery of PROTACs. As proof of concept, a hydrophobic PROTAC MZ1 (a bromodomain-containing protein 4 degrader) was selected to couple with a hydrophilic affibody ZHER2:342 (an affinity protein of human epidermal growth factor receptor 2, HER2) via a smart linker containing disulfide bond to form an amphiphilic ZHER2:342-MZ1 conjugate. It spontaneously self-assembled into nanoparticles (ZHER2:342-MZ1 APCN) in water. Upon the excellent targeting property of ZHER2:342 and HER2 receptor-mediated endocytosis, ZHER2:342-MZ1 APCN was accumulated in tumor sites and internalized by cancer cells effectively in vitro. Under the intracellular high level of glutathione (GSH), ZHER2:342-MZ1 APCN released MZ1 to specifically degrade bromodomain-containing protein 4 (BRD4) and subsequently induced BRD4 deficiency-mediated apoptosis of cancer cells. By the tail-vein injection, ZHER2:342-MZ1 APCN showed the outstanding tumor-specific targeting ability, drug accumulation capacity, enhanced BRD4 degradation and antitumor efficacy in vivo for an HER2-positive SKOV-3 tumor model. Such an affibody mediated nanoengineered strategy would facilitate the application of PROTACs for targeted cancer therapy. 展开更多
关键词 amphiphilic affibody-PROTAC conjugate BRD4 degradation NANOMEDICINE SELF-ASSEMBLY targeted cancer therapy
原文传递
Magnesium implants with alternating magnetic field-enhanced hydrogen release and proton depletion for anti-infection treatment and tissue repair
12
作者 Nailin yang xiaoyuan yang +9 位作者 Shuning Cheng Xiang Gao Shumin Sun Xuan Huang Jun Ge Zhihui Han Cheng Huang Yuanjie Wang Chong Cheng Liang Cheng 《Bioactive Materials》 SCIE CSCD 2024年第8期374-383,共10页
Implant-related osteomyelitis is a formidable hurdle in the clinical setting and is characterized by inflammation,infection,and consequential bone destruction.Therefore,effective reactive oxygen species(ROS)scavenging... Implant-related osteomyelitis is a formidable hurdle in the clinical setting and is characterized by inflammation,infection,and consequential bone destruction.Therefore,effective reactive oxygen species(ROS)scavenging,bacterial killing,and subsequent bone tissue repair are urgently needed for the treatment of difficult-to-heal osteomyelitis.Herein,we utilized the eddy-thermal effect of magnesium(Mg)implants under an alternating magnetic field(AMF)for the controlled release of H_(2)gas and ions(OH^(-)and Mg^(2+))for the treatment of osteomyelitis.H_(2)released by Mg rods under AMFs effectively scavenged cytotoxic ROS,exhibiting anti-inflammatory effects and consequently disrupting the environment of bacterial infections.In addition,the OH-hindered the energy metabolism of bacteria by effectively neutralizing protons within the microenvironment.Moreover,H_(2)impaired the permeability of bacterial membranes and expedited the damage induced by OH-.This synergistic AMF-induced H_(2)and proton depletion treatment approach not only killed both gram-negative and gram-positive bacteria but also effectively treated bacterial infections(abscesses and osteomyelitis).Moreover,Mg^(2+)released from the Mg rods enhanced and accelerated the process of bone osteogenesis.Overall,our work cleverly exploited the eddy-thermal effect and chemical activity of Mg implants under AMFs,aiming to eliminate the inflammatory environment and combat bacterial infections by the simultaneous release of H_(2),OH^(-),and Mg^(2+),thereby facilitating tissue regeneration.This therapeutic strategy achieved multiple benefits in one,thus presenting a promising avenue for clinical application. 展开更多
关键词 Magnesium implants Bacterial infection Alternating magnetic field Gas therapy Proton consumption ANTI-INFLAMMATORY
原文传递
具有涡流热效应的液态金属微球用于磁热增强的癌症栓塞-免疫联合治疗 被引量:2
13
作者 杨乃霖 孙兴伟 +9 位作者 周杨楷 杨笑远 尤嘉熙 虞泽鹏 葛隽 巩飞 肖志晟 靳勇 刘庄 程亮 《Science Bulletin》 SCIE EI CAS CSCD 2023年第16期1772-1783,M0004,共13页
肝细胞癌患者由于肝癌的高转移性和高复发率表现出预后差的特征.本文提出了一种通过磁热疗法(MHT)增强癌症免疫治疗联合经导管动脉栓塞(TAE)治疗肝癌肿瘤的有效策略.通过微流控技术制备的尺寸均匀液态金属微球(LM MSs),由于在交变磁场... 肝细胞癌患者由于肝癌的高转移性和高复发率表现出预后差的特征.本文提出了一种通过磁热疗法(MHT)增强癌症免疫治疗联合经导管动脉栓塞(TAE)治疗肝癌肿瘤的有效策略.通过微流控技术制备的尺寸均匀液态金属微球(LM MSs),由于在交变磁场下的涡流热效应表现出显著的磁感应加热能力,可同时作为MHT和TAE两种癌症治疗策略的有效药物.一方面,LM MSs优异的涡流磁热效应表现出高效的MHT治疗疗效.另一方面,LM MSs引发的MHT可以显著增强免疫系统激活,促进免疫细胞的浸润;与免疫检查点阻断(ICB)治疗联合后可以进一步刺激强大的免疫应答,从而抑制远端肿瘤的生长.此外,LM MSs-碘油栓塞剂在兔子原位肝癌模型中表现出优异的栓塞-磁热联合治疗效果.总之,该工作不仅证明了LM MSs可以作为有效的MHT试剂实现MHT-免疫联合治疗,而且还展示了TAE与MHT联合治疗在原位大型肝肿瘤治疗中的重要应用前景. 展开更多
关键词 癌症治疗 高复发率 TAE 微流控技术 液态金属 免疫细胞 免疫应答 交变磁场
原文传递
Highly efficient tumor-targeted nanomedicine assembled from affibody-drug conjugate for colorectal cancer therapy 被引量:1
14
作者 xiaoyuan yang Xuelin Xia +2 位作者 Wei Huang Xiaoxia Xia Deyue Yan 《Nano Research》 SCIE EI CSCD 2023年第4期5256-5264,共9页
Affibody is a new class of small non-immunoglobulin affinity proteins that possesses high affinity at the picomole level to several tumor overexpressed receptors.Owing to the simple framework,affibody is flexible for ... Affibody is a new class of small non-immunoglobulin affinity proteins that possesses high affinity at the picomole level to several tumor overexpressed receptors.Owing to the simple framework,affibody is flexible for modification with payload,but the relatively low molecular weight of this construction simultaneously results in short half-life time which hinders its application in cancer therapy.In this work,we prepared a nanomedicine self-assembled from the conjugate of affibody(ZPDGFRβ:09591,PDGFRβ:platelet-derived growth factor receptorβ)with monomethyl auristatin E(MMAE)through cathepsin B cleavable dipeptide linker for targeted colorectal cancer therapy.The nanoscale characteristics of ZPDGFRβ:09591-MMAE affibody-drug conjugate nanomedicine(ZPDGFRβ:09591-M ADCN)resulted in enhanced pharmacokinetics,improved drug accumulation,and promoted biosecurity performance than those of free drugs.As a result,ZPDGFRβ:09591-M ADCN exhibited excellent antitumor efficacy with tumor inhibition rates(TIR)over 99.0%in PDGFRβ-positive tumor models with small solid tumors(~150 mm^(3))or large established tumors(~500 mm^(3)),indicating that ZPDGFRβ:09591-MMAE ADCN is promising for the clinic application in colorectal cancer therapy. 展开更多
关键词 olecular self-assembly ZPDGFRβ:09591 affibody monomethyl auristatin E(MMAE) nanodrug targeted delivery
原文传递
The combination of eddy thermal effect of biodegradable magnesium with immune checkpoint blockade shows enhanced efficacy against osteosarcoma 被引量:1
15
作者 Jun Ge Nailin yang +11 位作者 Yuqi yang Hao Yu xiaoyuan yang Yingjie Wang Tianyi Wang Shuning Cheng Yuanjie Wang Zhihui Han Yun Teng Jun Zou Huilin yang Liang Cheng 《Bioactive Materials》 SCIE CSCD 2023年第7期73-85,共13页
Osteosarcoma(OS)patients have a poor prognosis due to its high degree of heterogeneity and high rate of metastasis.Magnetic hyperthermia therapy(MHT)combined with immunotherapy is an effective strategy to treat solid ... Osteosarcoma(OS)patients have a poor prognosis due to its high degree of heterogeneity and high rate of metastasis.Magnetic hyperthermia therapy(MHT)combined with immunotherapy is an effective strategy to treat solid and metastatic tumors.Here,we combined biodegradable magnesium(Mg)macroscale rods,which acted as an eddy thermo-magnetic agent under a low external alternating magnetic field,and immunotherapy to achieve a radical cure for OS.The eddy thermal effect(ETE)of the Mg rods(MgR)showed outstanding cytotoxic effects and enhanced the maturation of dendritic cells(DCs),and the mild MHT induced the immunogenic cell death(ICD)in the OS cells.Combined with immune checkpoint blockade(ICB)therapy,we obtained an excellent curative effect against OS,and a further evaluation demonstrated that the local MHT induced by the MgR increased T cells infiltration and the polarization of M1 macrophages.Interestingly,the biodegradable MgR also promoted bone osteogenesis.Our work highlighted the uneven ETE mediated by the biodegradable MgR induced a comprehensive immunologic activation in the OS tumor microenvironment(TME),which would inspire the application of MHT for the effective treatment of OS. 展开更多
关键词 OSTEOSARCOMA Eddy thermal effect Magnesium rods(MgR) Osteosarcoma therapy Tumor microenvironment(TME) immunotherapy
原文传递
急性闭角型青光眼慢性期行青光眼白内障联合术后房角功能观察 被引量:22
16
作者 楚莹莹 杨潇远 +2 位作者 朱海燕 李海军 董仰曾 《中华眼视光学与视觉科学杂志》 CAS CSCD 2020年第1期8-13,共6页
目的:探讨青光眼白内障联合手术治疗急性闭角型青光眼慢性期合并白内障患者术后房角功能。方法:回顾性系列病例分析。2017年11月至2018年3月在河南省人民医院青光眼中心收治的急性闭角型青光眼慢性期合并白内障患者37例(37眼)。患者为... 目的:探讨青光眼白内障联合手术治疗急性闭角型青光眼慢性期合并白内障患者术后房角功能。方法:回顾性系列病例分析。2017年11月至2018年3月在河南省人民医院青光眼中心收治的急性闭角型青光眼慢性期合并白内障患者37例(37眼)。患者为青光眼急性期发作后经药物治疗3~14 d,术前眼压高于21 mmHg(1 mmHg=0.133 kPa);房角关闭范围>2个象限;超声生物显微镜(UBM)示前房变浅,周边虹膜根部与小梁网贴附范围>2个象限;晶状体核混浊度≥Ⅲ级。所有患眼均行常规双切口小梁切除+超声乳化白内障吸除+人工晶状体植入+房角分离术,术中均未使用抗代谢药物,巩膜瓣常规可调节缝线密闭缝合。术前术后观察患者的最佳矫正视力(BCVA)、眼压、中央前房深度、前房角开放程度及滤过泡形成情况。采用Wilcoxon符号秩和检验、方差分析、配对t检验及Pearson相关分析对各项观察指标进行分析。结果:术后7 d时眼压为(18.8±1.7)mmHg,较术前明显下降(t=16.562,P<0.001),15例患者形成滤过泡。术后1个月眼压为(15.5±1.8)mmHg,较术前明显下降(t=20.529,P<0.001),仅有5例患者存在功能性滤过泡。术后半年,眼压为(14.9±2.4)mmHg,23例患者术后眼压<16 mmHg,14例患者术后眼压介于16~20 mmHg之间,较术前眼压明显下降(t=24.458,P<0.001);UBM示所有患者术后房角重新开放范围>2个象限,术后眼压与术前房角粘连程度无相关关系(r=0.016,P=0.926);术后中央前房深度较术前加深(t=-25.195,P<0.001);33例患者术后BCVA较术前提高,4例患者术后BCVA较前无改善,术前术后BCVA差异具有统计学意义(Z=-5.017,P<0.001);5例患者术后上方结膜可见功能性滤过泡形成,32例患者术后未见明显滤过泡,UBM也证实结膜下无有效滤过泡形成。结论:对于急性闭角型青光眼慢性期合并白内障患者,行双切口小梁切除+超声乳化白内障吸除+人工晶状体植入+房角分离术可有效降低眼压。眼压的下降很可能是房角区小梁网功能的恢复,而不是依赖于外滤过通道的建立。 展开更多
关键词 急性闭角型青光眼 慢性期 青光眼白内障联合手术 房角功能
原文传递
A Generative Method for Steganography by Cover Synthesis with Auxiliary Semantics 被引量:6
17
作者 Zhuo Zhang Guangyuan Fu +2 位作者 Rongrong Ni Jia Liu xiaoyuan yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第4期516-527,共12页
Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capac... Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capacity,it inevitably leaves traces of rewriting that can eventually be discovered by the enemy.The method of Steganography by Cover Synthesis(SCS)attempts to construct a natural stego image,so that the cover image is not modified;thus,it can overcome detection by a steganographic analyzer.Due to the difficulty in constructing natural stego images,the development of SCS is limited.In this paper,a novel generative SCS method based on a Generative Adversarial Network(GAN)for image steganography is proposed.In our method,we design a GAN model called Synthetic Semantics Stego Generative Adversarial Network(SSS-GAN)to generate stego images from secret messages.By establishing a mapping relationship between secret messages and semantic category information,category labels can generate pseudo-real images via the generative model.Then,the receiver can recognize the labels via the classifier network to restore the concealed information in communications.We trained the model on the MINIST,CIFAR-10,and CIFAR-100 image datasets.Experiments show the feasibility of this method.The security,capacity,and robustness of the method are analyzed. 展开更多
关键词 information hiding STEGANOGRAPHY STEGANOGRAPHY without modification STEGANOGRAPHY by COVER Synthesis(SCS) GENERATIVE adversarial networks
原文传递
Layered dissolving microneedles as a need-based delivery system to simultaneously alleviate skin and joint lesions in psoriatic arthritis 被引量:7
18
作者 Kaiyue Yu Xiuming Yu +7 位作者 Sisi Cao Yixuan Wang Yuanhao Zhai Fengdie yang xiaoyuan yang Yi Lu Chuanbin Wu Yuehong Xu 《Acta Pharmaceutica Sinica B》 SCIE CAS CSCD 2021年第2期505-519,共15页
Psoriatic arthritis(PsA)is a complicated psoriasis comorbidity with manifestations of psoriatic skin and arthritic joints,and tailoring specific treatment strategies for simultaneously delivering different drugs to di... Psoriatic arthritis(PsA)is a complicated psoriasis comorbidity with manifestations of psoriatic skin and arthritic joints,and tailoring specific treatment strategies for simultaneously delivering different drugs to different action sites in PsA remains challenging.We developed a need-based layered dissolving microneedle(MN)system loading immunosuppressant tacrolimus(TAC)and antiinflammatory diclofenac(DIC)in different layers of MNs,i.e.,TD-MN,which aims to specifically deliver TAC and DIC to skin and articular cavity,achieving simultaneous alleviation of psoriatic skin and arthritic joint lesions in PsA.In vitro and in vivo skin permeation demonstrated that the inter-layer retained TAC within the skin of~100μm,while the tip-layer delivered DIC up to~300μm into the articular cavity.TD-MN not only efficiently decreased the psoriasis area and severity index scores and recovered the thickened epidermis of imiquimod-induced psoriasis but also alleviated carrageenan/kaolin-induced arthritis even better than DIC injection through reducing joint swelling,muscle atrophy,and cartilage destruction.Importantly,TD-MN significantly inhibited the serum TNF-αand IL-17 A in psoriatic and arthritic rats.The results support that this approach represents a promising alternative to multi-administration of different drugs for comorbidity,providing a convenient and effective strategy for meeting the requirements of PsA treatment. 展开更多
关键词 Layered microneedles Need-based drug delivery Tacrolimus Diclofenac sodium Psoriasis Psoriatic arthritis
原文传递
Understanding association of spleen system with earth on Traditional Chinese Medicine theory 被引量:7
19
作者 xiaoyuan yang Chunhua Jia 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2013年第1期134-136,共3页
OBJECTIVE: The association of spleen system including both spleen and stomach with earth, one of the five elements, is a part of the theory of five elements. Practitioners of Traditional Chinese Medicine (TCM) used th... OBJECTIVE: The association of spleen system including both spleen and stomach with earth, one of the five elements, is a part of the theory of five elements. Practitioners of Traditional Chinese Medicine (TCM) used the theory as a reasoning tool to illustrate the Zang-Fu organs' physiological functions and the interaction among them.The exploration of how the theory of that spleen system is associated with earth was created may provide insights into how five-element theory is applied to TCM practice. METHODS: Using analogism as a method to explore the relationship between earth and spleen system inTCM. RESULTS: Chinese ancestors experienced and observed the features of earth from agricultural practice and used the knowledge for the explanation ofspleen system functions including physiological functions, pathological characteristics and for the treatment of related illnesses. CONCLUSION: The theory of the five elements in TCM is a kind of metaphor, which depends on observation and exploration of the natural world and experience of human beings. 展开更多
关键词 EARTH Spleen system METAPHOR COGNITION Source domain Target domain
原文传递
Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching 被引量:8
20
作者 Xiaoliang Che Tanping Zhou +3 位作者 Ningbo Li Haonan Zhou Zhenhua Chen xiaoyuan yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期564-578,共15页
The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and ke... The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and keys.In 2012,Lopez-Alt et al.proposed the first NTRU-type MKFHE scheme,the LTV12 scheme,using the key-switching and modulus-reduction techniques,whose security relies on two assumptions:the Ring Learning With Error (RLWE) assumption and the Decisional Small Polynomial Ratio (DSPR) assumption.However,the LTV12and subsequent NTRU-type schemes are restricted to the family of power-of-2 cyclotomic rings,which may affect the security in the case of subfield attacks.Moreover,the key-switching technique of the LTV12 scheme requires a circular application of evaluation keys,which causes rapid growth of the error and thus affects the circuit depth.In this paper,an NTRU-type MKFHE scheme over prime cyclotomic rings without key-switching is proposed,which has the potential to resist the subfield attack and decrease the error exponentially during the homomorphic evaluating process.First,based on the RLWE and DSPR assumptions over the prime cyclotomic rings,a detailed analysis of the factors affecting the error during the homomorphic evaluations in the LTV12 scheme is provided.Next,a Low Bit Discarded&Dimension Expansion of Ciphertexts (LBD&DEC) technique is proposed,and the inherent homomorphic multiplication decryption structure of the NTRU is proposed,which can eliminate the key-switching operation in the LTV12 scheme.Finally,a leveled NTRU-type MKFHE scheme is developed using the LBD&DEC and modulus-reduction techniques.The analysis shows that the proposed scheme compared to the LTV12 scheme can decrease the magnitude of the error exponentially and minimize the dimension of ciphertexts. 展开更多
关键词 NTRU-type Multi-Key Fully Homomorphic Encryption(MKFHE) prime cyclotomic rings Low Bit Discarded(LBD) homomorphic multiplication decryption structure
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部