10 results on '"Xing, Qianqian"'
Search Results
2. Predictive Value of Contrast-Enhanced Ultrasound in Chemical Lumbar Sympathectomy for End-Stage Arteriosclerosis Obliterans of the Lower Extremities
- Author
-
Wu, Yue, Tian, Suming, Li, Chunye, Zhang, Weibo, Xing, Qianqian, and Chen, Gang
- Published
- 2022
- Full Text
- View/download PDF
3. BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections.
- Author
-
Xing, Qianqian, Wang, Xiaofeng, Xu, Xinyue, Lin, Jiaqi, Wang, Fei, Li, Cui, and Wang, Baosheng
- Subjects
- *
PUBLIC key cryptography , *REVOCATION , *MONETARY incentives - Abstract
Log-based public key infrastructure(PKI) refers to a robust class of CA-attack-resilient PKI that enhance transparency and accountability in the certificate revocation and issuance process by compelling certificate authorities (CAs) to submit revocations to publicly and verifiably accessible logs. However, log-based PKIs suffer from a reliance on centralized and consistent sources of information, rendering them susceptible to split-world attacks, and they regrettably fail to provide adequate incentives for recording or monitoring CA behavior. Blockchain-based PKIs address these limitations by enabling decentralized log audits through automated financial incentives. However, they continue to face challenges in developing a scalable revocation mechanism suited for lightweight clients. In this paper, we introduce BRT, a scalable blockchain-based system for certificate and revocation transparency. It serves to log, audit, and validate the status of certificates within the transport layer security (TLS)/secure sockets layer(SSL) PKI domain. We designed an audit-on-chain framework, coupled with an off-chain storage/computation system, to enhance the efficiency of BRT when operating in a blockchain environment. By implementing a blockchain-based prototype, we demonstrate that BRT achieves storage-efficient log recording with a peak compression rate reaching 8%, cost-effective log updates for large-scale certificates, and near-instantaneous revocation checks for users. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Effect of traditional Chinese medicine (TCM) on survival, quality of life, and immune function in patients with ovarian carcinoma: A protocol for systematic review and meta analysis
- Author
-
Ge, Shuxia, Xing, Qianqian, Zhang, Anqi, and Wang, Yucui
- Published
- 2021
- Full Text
- View/download PDF
5. Impedance Iterative Learning Backstepping Control for Output-Constrained Multisection Continuum Arms Based on PMA.
- Author
-
Xu, Yuexuan, Guo, Xin, Li, Jian, Huo, Xingyu, Sun, Hao, Zhang, Gaowei, Xing, Qianqian, Liu, Minghe, Ma, Tianyi, and Ding, Qingsong
- Subjects
ITERATIVE learning control ,IMPEDANCE control ,LYAPUNOV functions ,PNEUMATIC actuators ,ENERGY function - Abstract
Background: Pneumatic muscle actuator (PMA) actuated multisection continuum arms are widely applied in various fields with high flexibility and bionic properties. Nonetheless, their kinematic modeling and control strategy proves to be extremely challenging tasks. Methods: The relationship expression between the deformation parameters and the length of PMA with the geometric method is obtained under the assumption of piecewise constant curvature. Then, the kinematic model is established based on the improved D-H method. Considering the limitation of PMA telescopic length, an impedance iterative learning backstepping control strategy is investigated. For one thing, the impedance control is utilized to ensure that the ideal static balance force is maintained constant in the Cartesian space. For another, the iterative learning backstepping control is applied to guarantee that the desired trajectory of each PMA can be accurately tracked with the output-constrained requirement. Moreover, iterative learning control (ILC) is implemented to dynamically estimate the unknown model parameters and the precondition of zero initial error in ILC is released by the trajectory reconstruction. To further ensure the constraint requirement of the PMA tracking error, a log-type barrier Lyapunov function is employed in the backstepping control, whose convergence is demonstrated by the composite energy function. Results: The tracking error of PMA converges to 0.004 m and does not exceed the time-varying constraint function through cosimulation. Conclusion: From the cosimulation results, the superiority and validity of the proposed theory are verified. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. The Role of Flagellin B in Vibrio anguillarum -Induced Intestinal Immunity and Functional Domain Identification.
- Author
-
Gao, Quanxin, Yi, Shaokui, Li, Yang, Luo, Jinping, Xing, Qianqian, Yang, Xia, Zhao, Ming, Min, Minghua, Wang, Qian, Wang, Yabing, Ma, Lingbo, and Peng, Shiming
- Subjects
VIBRIO anguillarum ,FLAGELLIN ,MOLECULAR dynamics ,INTESTINES ,SURFACE plasmon resonance - Abstract
Vibrio anguillarum , an opportunistic pathogen of aquatic animals, moves using a filament comprised of polymerised flagellin proteins. Flagellins are essential virulence factors for V. anguillarum infection. Herein, we investigated the effects of flagellins (flaA , flaB , flaC , flaD and flaE) on cell apoptosis, TLR5 expression, and production of IL-8 and TNF-α. FlaB exhibited the strongest immunostimulation effects. To explore the functions of flaB in infection, we constructed a flaB deletion mutant using a two-step recombination method, and in vitro experiments showed a significant decrease in the expression of TLR5 and inflammatory cytokines compared with wild-type cells. However in the in vivo study, expression of inflammatory cytokines and intestinal mucosal structure showed no significant differences between groups. Additionally, flaB induced a significant increase in TLR5 expression based on microscopy analysis of fluorescently labelled TLR5, indicating interactions between the two proteins, which was confirmed by native PAGE and yeast two-hybrid assay. Molecular simulation of interactions between flaB and TLR5 was performed to identify the residues involved in binding, revealing two binding sites. Then, based on molecular dynamics simulations, we carried out thirteen site-directed mutations occurring at the amino acid sites of Q57, N83, N87, R91, D94, E122, D152, N312, R313, N320, L97, H316, I324 in binding regions of flaB protein by TLR5, respectively. Surface plasmon resonance (SPR) was employed to compare the affinities of flaB mutants for TLR5, and D152, D94, I324, N87, R313, N320 and H316 were found to mediate interactions between flaB and TLR5. Our comprehensive and systematic analysis of V. anguillarum flagellins establishes the groundwork for future design of flagellin-based vaccines. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
7. DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability.
- Author
-
Li, Pengkun, Su, Jinshu, Wang, Xiaofeng, and Xing, Qianqian
- Subjects
INTERNET protocol address ,BLOCKCHAINS ,INTERNET ,COMPUTER network security ,DENIAL of service attacks - Abstract
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and DDoS attacks. Global PKI-based accountable network involves harmful centralized authority abuse and complex certificate management. The inherently accountable network with self-certifying addresses is incompatible with the current Internet and faces the difficulty of revoking and updating keys. This study presents DIIA, a blockchain-based decentralized infrastructure to provide accountability for the current Internet. Specifically, DIIA designs a public-permissioned blockchain called TIPchain to act as a decentralized trust anchor, allowing cryptographic authentication of IP addresses without any global trusted authority. DIIA also proposes the revocable trustworthy IP address bound to the cryptographic key, which supports automatic key renewal and efficient key revocation and eliminates complexity certificate management. We present several security mechanisms based on DIIA to show how DIIA can help to enhance network layer security. We also implement a prototype system and experiment with real-world data. The results demonstrate the feasibility and suitability of our work in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.
- Author
-
Xing, Qianqian, Wang, Baosheng, Wang, Xiaofeng, and Tao, Jing
- Subjects
- *
CRYPTOSYSTEMS , *DATA encryption , *THEORY of knowledge , *COMPUTER simulation , *PROBABILITY theory - Abstract
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE schemes have been proposed but shown to be either insecure or bounded where they have to fix the maximum hierarchical depth of RHIBE at setup. In this paper, we propose a new unbounded RHIBE scheme with decryption key exposure resilience and with short public system parameters, and prove our RHIBE scheme to be adaptively secure. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. By carefully designing the hybrid games, we overcome the subtle obstacle in applying the dual system encryption methodology for the unbounded and revocable HIBE. To the best of our knowledge, this is the first construction of adaptively secure unbounded RHIBE scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
9. EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains.
- Author
-
Luo, Zhenhao, Xie, Wei, Wang, Baosheng, Tang, Yong, and Xing, Qianqian
- Subjects
BAR codes ,CRYPTOGRAPHY ,CYBERTERRORISM ,HEALTH status indicators ,ROBUST statistics - Abstract
Despite greater attention being paid to sensitive-information leakage in the cyberdomain, the sensitive-information problem of the physical domain remains neglected. Anonymous users can easily access the sensitive information of other users, such as transaction information, health status, and addresses, without any advanced technologies. Ideally, secret messages should be protected not only in the cyberdomain but also in the complex physical domain. However, popular steganography schemes only work in the traditional cyberdomain and are useless when physical distortions of messages are unavoidable. This paper first defines the concept of cross-domain steganography, and then proposes EasyStego, a novel cross-domain steganography scheme. EasyStego is based on the use of QR barcodes as carriers; therefore, it is robust to physical distortions in the complex physical domain. Moreover, EasyStego has a large capacity for embeddable secrets and strong scalability in various scenarios. EasyStego uses an AES encryption algorithm to control the permissions of secret messages, which is more effective in reducing the possibility of sensitive-information leakage. Experiments show that EasyStego has perfect robustness and good efficiency. Compared with the best current steganography scheme based on barcodes, EasyStego has greater steganographic capacity and less impact on barcode data. In robustness tests, EasyStego successfully extracts secret messages at different angles and distances. In the case of adding natural textures and importing quantitative error bits, other related steganography techniques fail, whereas EasyStego can extract secret messages with a success rate of nearly 100%. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
10. BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution.
- Author
-
Xing, Qianqian, Wang, Baosheng, and Wang, Xiaofeng
- Subjects
- *
BGP (Computer network protocol) , *CYBERTERRORISM , *COUNTERTERRORISM , *RESOURCE allocation , *COMPUTER security , *BLOCKCHAINS , *COMPUTER software - Abstract
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have been proposed to prevent or detect such attacks, the unsatisfactory cost-effectiveness frustrates their deployment. In fact, the currently deployed BGP security infrastructure leaves the chance for potential centralized authority misconfiguration and abuse. It actually becomes the critical yield point that demands the logging and auditing of misbehaviors and attacks in BGP security deployments. We propose a blockchain-based Internet number resource authority and trustworthy management solution, named BGPcoin, to facilitate the transparency of BGP security. BGPcoin provides a reliable origin advertisement source for origin authentication by dispensing resource allocations and revocations compliantly against IP prefix hijacking. We perform and audit resource assignments on the tamper-resistant Ethereum blockchain by means of a set of smart contracts, which also interact as one to provide the trustworthy origin route examination for BGP. Compared with RPKI, BGPcoin yields significant benefits in securing origin advertisement and building a dependable infrastructure for the object repository. We demonstrate it through an Ethereum prototype implementation, and we deploy it and do experiment on a locally-simulated network and an official Ethereum test network respectively. The extensive experiment and evaluation demonstrate the incentives to deploy BGPcoin, and the enhanced security provided by BGPcoin is technically and economically feasible. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.