Yinglei Wang

Learn More
We demonstrate that unmodified commercial Flash memory can provide two important security functions: true random number generation and digital fingerprinting. Taking advantage of random telegraph noise (a type of quantum noise source in highly scaled Flash memory cells) enables high quality true random number generation at a rate up to 10Kbits / second. A(More)
Theory suggests that coworkers may influence individuals’ technology use behaviors, but there is limited research in the technology diffusion literature that explicates how such social influence processes operate after initial adoption. We investigate how two key social influence mechanisms (identification and internalization) may explain the growth over(More)
OBJECTIVE To investigate the effect of Shao Yao-Gan Cao-Tang on function and expression of P-glycoprotein (P-gp) in Caco-2 cells. METHOD 3H-digoxin (Dig), a substrate of P-glycoprotein, was used as a probe to measure the P-gp-mediated drug efflux transport, which indicated the function of P-gp in Caco-2 cells, while Verapamil (Ver) was used as a positive(More)
Using social cognitive theory, we opened up the black box of psychological processes in which e-learners engage. We believed that prior experience with ICT and virtual competence were two influential factors that affected e-learning and had a positive influence on its outcomes. We tested our hypotheses on a sample of 383 Chinese students participating in(More)
This paper introduces a novel information hiding technique for Flash memory. The method hides data within an analog characteristic of Flash, the program time of individual bits. Because the technique uses analog behaviors, normal Flash memory operations are not affected and hidden information is invisible in the data stored in the memory. Even if an(More)
Organizing and accomplishing virtual work presents both opportunities and challenges. Our review of the literature indicates that an important element of the virtual organization phenomenon individual knowledge, skills and abilities (KSAs) to work virtually (Powell, Picoli and Ives, 2004), has not been well studies. Based on Bandura’s (1986) social(More)
Relative advantage and perceived usefulness are often used interchangeably in the literature. In this paper, the authors argue that this limits the understanding of the adoption of ICTs, especially when there are multiple alternatives. To address this issue, the authors reexamine relative advantage in relation to perceived usefulness, providing a(More)