• Publications
  • Influence
Genome-wide association study identifies eight new risk loci for polycystic ovary syndrome
Following a previous genome-wide association study (GWAS 1) including 744 cases and 895 controls, we analyzed genome-wide association data from a new cohort of Han Chinese (GWAS 2) with 1,510Expand
  • 318
  • 22
  • PDF
Shikonin and its analogs inhibit cancer cell glycolysis by targeting tumor pyruvate kinase-M2
We recently reported that shikonin and its analogs were a class of necroptotic inducers that could bypass cancer drug resistance. However, the molecular targets of shikonin are not known. Here, weExpand
  • 257
  • 16
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
With the fast development of wireless communication technologies and semiconductor technologies, the wireless sensor network (WSN) has been widely used in many applications. As an application of theExpand
  • 181
  • 15
Common variants on 8p12 and 1q24.2 confer risk of schizophrenia
Schizophrenia is a severe mental disorder affecting ∼1% of the world population, with heritability of up to 80%. To identify new common genetic risk factors, we performed a genome-wide associationExpand
  • 217
  • 7
  • PDF
An efficient certificateless two-party authenticated key agreement protocol
Since certificateless public key cryptography (CLPKC) has received widespread attention due to its efficiency in avoiding key escrow problems in identity-based public key cryptography (ID-PKC), theExpand
  • 57
  • 7
  • PDF
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
With the widespread adoption of Internet of Things and cloud computing in different industry sectors, an increasing number of individuals or organizations are outsourcing their Industrial Internet ofExpand
  • 88
  • 5
Certificateless searchable public key encryption scheme for mobile healthcare system
Abstract As mobile communication technology develops, mobile healthcare system (MHS) is becoming a hot topic in academia and healthcare industry. MHS refers to providing medical services throughExpand
  • 33
  • 5
Context modeling based on context quantization with application in wavelet image coding
  • J. Chen
  • Computer Science, Medicine
  • IEEE Trans. Image Process.
  • 2004
Context modeling is widely used in image coding to improve the compression performance. However, with no special treatment, the expected compression gain will be cancelled by the model costExpand
  • 39
  • 5
An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
To ensure secure communications in public network environments, various three-party authenticated key exchange (3PAKE) protocols were proposed to provide the transaction confidentiality andExpand
  • 22
  • 5