Learn More
1,3-Butadiene (BTD) is an important commodity chemical and air pollutant that has been shown to be a potent carcinogen in mice, and to a lesser extent, a carcinogen in rats. To better assess butadiene's carcinogenic risk to humans, it is important to understand its mode of action and how this relates to differences in responses among species. In a series of(More)
False data injection attacks not only cause user to receive incorrect reports so that make wrong decisions, but also drain out the significant sensor network energy resources. Previous filtering schemes mainly relying on pairwise key based schemes for endorsing the report. In wireless sensor networks, sharing pairwise key with other sensor nodes may be(More)
The widely spread mobile consumer electronic devices, such as Android-based smartphones and tablets, have employed Ext4 file system as their main partition's file systems. Although the performance of Ext4 file system has been researched and optimized for traditional hard disk drives under general workloads, extensive investigations are urgently required to(More)
— Multi-level cell (MLC) NAND flash-based consumer electronic devices suffer from random multiple bit errors that grow exponentially with the increase of program/erase counts. Numerous error correction codes (ECCs) have been developed to detect and correct these multiple erroneous bits within a codeword, such as bose-chaudhuri-hocquenghem (BCH) and(More)
Deduplication serves as a fundamental way to eliminate replicas and save space and network bandwidth in various storage systems. However, the performance of most existing deduplication systems can be further improved on normal reads, which carry crucial weight in currently popular WORM access model. Specifically, most existing deduplication systems achieve(More)
Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such as code-morphism, which allows the malware to evolve into many variants and bypass traditional code feature based detection systems. In this paper, we(More)
Recently, secure search over encrypted cloud data has become a hot research spot and challenging task. Some secure search schemes have been proposed to try to meet this challenge. In this paper, we propose a conjunctive multi-keyword secure search scheme for multiple data owners. To guarantee data security and system flexibility in the multiple data owners(More)
Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such as code-morphism, which allows the malware to evolve into many variants and bypass traditional code feature based detection systems. In this paper, we(More)
In the big data era, with the rapid development of location-based applications, GPS enabled devices and big data institutions, location correlation privacy raises more and more people's concern. Because adversaries may combine location correlations with their background knowledge to guess users' privacy, such correlation should be protected to preserve(More)
BACKGROUND We previously reported the promising effects of dioscin against cerebral and renal ischemia-reperfusion (I/R) injury. However, its role against gastric I/R injury has not yet been reported. Thus, the aim of the present work was to investigate the protective effect and possible mechanisms of dioscin against gastric I/R. MATERIALS AND METHODS The(More)