Mingming Jiang

Learn More
The response of graphene surface plasmon (SP) in the ultraviolet (UV) region and the realization of short-wavelength semiconductor lasers not only are two hot research areas of great academic and practical significance, but also are two important issues lacked of good understanding. In this work, a hybrid Fabry-Perot (F-P) microcavity, comprising of(More)
To investigate the drive-mode resonance frequency of a micromachined vibratory gyroscope (MVG), one needs to measure it accurately and efficiently. The conventional approach to measure the resonant frequency is by performing a sweep frequency test and spectrum analysis. The method is time-consuming and inconvenient because of the requirements of many test(More)
Inspired by the framework of Boyen, in this paper, an attribute-based signature (ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity’s attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling(More)
Gallbladder carcinoma (GBC) is a rare tumor with a dismal survival rate overall. Hence, there is an urgent need for exploring more specific and sensitive biomarkers for the diagnosis and treatment of GBC. At first, amplified total RNAs from two paired GBC tumors and adjacent non-tumorous tissues (ANTTs) were subjected to RNA sequencing. 161 genes were(More)
The stable Ordos Plateau, extensional Weihe Graben, and Qinling orogenic belt are located at the northeast margin of the Tibetan Plateau. They have been thought to play different roles in the eastward expanding of the Tibetan Plateau. Peking University deployed a linear seismic array across the western end of the Weihe Graben to investigate the crustal(More)
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions.(More)