Search

Your search keyword '"Shaohua Tang"' showing total 332 results

Search Constraints

Start Over You searched for: Author "Shaohua Tang" Remove constraint Author: "Shaohua Tang"
332 results on '"Shaohua Tang"'

Search Results

101. High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction

102. [Analysis of genetic variation for a child affected with congenital insensitivity to pain with anhidrosis and albinism by whole genome sequencing]

103. Resurgence of Positive qRT-PCR Test Results in Patients Recovered from COVID-19: Case Reports

104. The variations in human orphan G protein-coupled receptor QRFPR affect PI3K-AKT-mTOR signaling

107. Next‐generation sequencing identifies rare pathogenic and novel candidate variants in a cohort of Chinese patients with syndromic or nonsyndromic hearing loss

108. Genetic analysis and prenatal diagnosis of 20 Chinese families with oculocutaneous albinism

109. Bandage Contact Lenses versus Deproteinized Calf Blood Extract Eye Gel for Recurrent Corneal Erosion Syndrome: A Case-Control Study

111. [Analysis of TWNK variant in a family affected with Perrault syndrome]

112. Plastid Glycerol-3-phosphate Acyltransferase Enhanced Plant Growth and Prokaryotic Glycerolipid Synthesis in Brassica napus

113. Clinical application of chromosomal microarray analysis for fetuses with craniofacial malformations

114. A verifiable and privacy‐preserving multidimensional data aggregation scheme in mobile crowdsensing

115. Proteomics Uncovers Immunosuppression in COVID-19 Patients with Long Disease Course

116. Molecular delineation of small supernumerary marker chromosomes using a single nucleotide polymorphism array

117. Dynamics of Viral Load and Antibodies in First 8 Weeks of Infection by SARS-CoV-2: An Observational Cohort Study

118. Proteomics Uncovers Immunosuppression in COVID-19 Patients with Long Disease Course

120. Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing

121. JPEG Image Encryption With Improved Format Compatibility and File Size Preservation

122. Genome-Wide Array Analysis Reveals Novel Genomic Regions and Candidate Gene for Intellectual Disability

123. A novel reversible data hiding method with image contrast enhancement

124. Systematic Control of Self-Seeding Crystallization Patterns of Poly(ethylene oxide) in Thin Films

126. Mental workload classification based on ignored auditory probes and spatial covariance

127. Two naturally occurring mutations of human GPR103 define distinct G protein selection bias

128. SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing

129. Online/Offline Provable Data Possession

130. Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

131. Power analysis attacks against FPGA implementation of KLEIN

132. A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy

133. [Analysis of MYH3 gene variation and prenatal diagnosis for two pedigrees affected with congenital arthrogryposis]

134. [Analysis of SACS mutation in a family affected with autosomal recessive spastic ataxia of Charlevoix-Saguenay]

135. A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing

136. Expression of AhATL1, an ABA Transport Factor Gene from Peanut, Is Affected by Altered Memory Gene Expression Patterns and Increased Tolerance to Drought Stress in Arabidopsis

137. Efficient photocatalytic degradation of acid orange 7 over N-doped ordered mesoporous titania on carbon fibers under visible-light irradiation based on three synergistic effects

138. Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

139. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

140. A multicenter study of fetal chromosomal abnormalities in Chinese women of advanced maternal age

141. Key recovery on several matrix public‐key encryption schemes

142. Online/offline signature based on UOV in wireless sensor networks

143. Fast Inversions in Small Finite Fields by Using Binary Trees

144. A secure image sharing scheme with high quality stego-images based on steganography

145. Building a new secure variant of Rainbow signature scheme

146. Very Small FPGA Processor for Multivariate Signatures

147. Incentives for Mobile Crowd Sensing: A Survey

148. Secure Distributed Deduplication Systems with Improved Reliability

149. A novel selective encryption scheme for H.264/AVC video with improved visual security

150. Improved block ordering and frequency selection for reversible data hiding in JPEG images

Catalog

Books, media, physical & digital resources