Mingming Jiang

Learn More
To investigate the drive-mode resonance frequency of a micromachined vibratory gyroscope (MVG), one needs to measure it accurately and efficiently. The conventional approach to measure the resonant frequency is by performing a sweep frequency test and spectrum analysis. The method is time-consuming and inconvenient because of the requirements of many test(More)
Gallbladder carcinoma (GBC) is a rare tumor with a dismal survival rate overall. Hence, there is an urgent need for exploring more specific and sensitive biomarkers for the diagnosis and treatment of GBC. At first, amplified total RNAs from two paired GBC tumors and adjacent non-tumorous tissues (ANTTs) were subjected to RNA sequencing. 161 genes were(More)
  • Youcai Tang, Shiyong Zhou, Y John Chen, Eric Sandvol, Xiaofeng Liang, Yongge Feng +3 others
  • 2015
The stable Ordos Plateau, extensional Weihe Graben, and Qinling orogenic belt are located at the northeast margin of the Tibetan Plateau. They have been thought to play different roles in the eastward expanding of the Tibetan Plateau. Peking University deployed a linear seismic array across the western end of the Weihe Graben to investigate the crustal(More)
The response of graphene surface plasmon (SP) in the ultraviolet (UV) region and the realization of short-wavelength semiconductor lasers not only are two hot research areas of great academic and practical significance, but also are two important issues lacked of good understanding. In this work, a hybrid Fabry-Perot (F-P) microcavity, comprising of(More)
Inspired by the framework of Boyen, in this paper, an attribute-based signature (ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity’s attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling(More)
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions.(More)
Certificateless public key cryptography (CL-PKC) can solve the problems of certificate management in a public key infrastructure (PKI) and of key escrows in identity-based public key cryptography (ID-PKC). In CL-PKC, the key generation center (KGC) does not know the private keys of all users, and their public keys need not be certificated by certification(More)
  • 1