Learn More
The powerful processors and variety of sensors on nowaday smartphones make them being ideal mobile cyber-physical systems. However, these advantages can also be used to launch serious sensor-based privacy theft attacks through sensors abusing. In this paper, a sensor-based voice privacy theft attack named CPVT is presented. The attack will be detected(More)
Android is characterized by the complicated relations among its components and apps, through which one party interacts with the other (e.g., starting its activity) by referring to its attributes like package, activity, service, action names, authorities and permissions. Such relations can be easily compromised during a customization: e.g., when an app is(More)
Articular cartilage injury is the most common type of damage seen in clinical orthopedic practice. The matrix-induced autologous chondrocyte implant (MACI) was developed to repair articular cartilage with an advance on the autologous chondrocyte implant procedure. This study aimed to evaluate whether MACI is a safe and efficacious cartilage repair treatment(More)
Unstable atherosclerotic plaques are prone to rupture, which leads to atherothrombosis. Endothelial progenitor cells (EPCs) are bone marrow-derived precursor cells that may repair vascular injury in atherosclerosis. Chemokine (C-C motif) receptor 5 (CCR5) promotes mobilization of EPCs. In this study, we investigated the therapeutic potential of(More)
BACKGROUND Many studies have evaluated the association between matrix metalloproteinase 9 (MMP9) gene promoter polymorphism and diabetic microvascular complications. However, the results are conflicting and inconclusive. The aim of this meta-analysis was to evaluate the association more precisely. MATERIALS AND METHODS Studies were retrieved from the(More)
Two key factors in the design of anonymity schemes are the scalability and the security of the relay node selection. In this paper, a scalable, secure anonymity scheme based on DHT inquiry mechanism is presented. Unlike the most existing schemes, every relay node's routing information (RRI) is stored as normal data in DHT overlay. The routing information(More)