Hongji Yang

Publications : 0
Aldex : 0
H-index : 0
Citations : 0

Privacy protection by typing in ubiquitous computing systems

François Siewe, Hongji Yang

Oct 1, 2016 in Journal of Systems and Software
A novel privacy type system is proposed to protect the privacy of context information in ubiquitous computing systems. The subject reduction property of the proposed type system is formally established to guarantee that a well-typed process can only reduce to well-typed processes. The soundness of the proposed type system is also formally established to ensure that well-typed processes do not viol...

Materials, Vol. 15, Pages 8326: Unlocking Novel Ultralow Frequency Band Gap: Assembled Cellular Metabarrier for Broadband Wave Isolation

Xiao Liang, Hongji Yang et 4 al.

Nov 23, 2022 in Materials
Materials, Vol. 15, Pages 8326: Unlocking Novel Ultralow Frequency Band Gap: Assembled Cellular Metabarrier for Broadband Wave Isolation Materials doi: 10.3390/ma15238326 Authors: Xiao Liang Fang Zhang Jinhui Jiang Cang He Hongji Yang Admittedly, the design requirements of compactness, low frequency, and broadband seem to constitute an impossible trinity, hindering the further development of elast...

DNA Damage Repair Status Predicts Opposite Clinical Prognosis Immunotherapy and Non-Immunotherapy in Hepatocellular Carcinoma.

Yunfei Chen, Kai Chen et 7 al.

Jul 15, 2021 in Frontiers in immunology
Immune checkpoint inhibitors(ICIs) that activate tumor-specific immune responses bring new hope for the treatment of hepatocellular carcinoma(HCC). However, there are still some problems, such as uncertain curative effects and low objective response rates, which limit the curative effect of immunotherapy. Therefore, it is an urgent problem to guide the use of ICIs in HCC based on molecular typing....


Cross-view Geo-localization with Evolving Transformer

Hongji Yang, Yingying Zhu et 2 al.

Jul 2, 2021 in Arxiv
In this work, we address the problem of cross-view geo-localization, which estimates the geospatial location of a street view image by matching it with a database of geo-tagged aerial images. The cross-view matching task is extremely challenging due to drastic appearance and geometry differences across views. Unlike existing methods that predominantly fall back on CNN, here we devise a novel evolv...

Pseudogene AK4P1 promotes pancreatic ductal adenocarcinoma progression through relieving miR-375-mediated YAP1 degradation.

Lang Jia, Shikai Zhu et 9 al.

Feb 27, 2022 in Aging
Pseudogenes have been reported to play oncogenic or tumor-suppressive roles in cancer progression. However, the molecular mechanism of most pseudogenes in pancreatic ductal adenocarcinoma (PDAC) remains unknown. Herein, we characterized a novel pseudogene-miRNA-mRNA network associated with PDAC progression using bioinformatics analysis. After screening by dreamBase and GEPIA, 12 up-regulated and 7...

biology

A Recurrent Neural Network-Based Method for Dynamic Load Identification of Beam Structures.

Hongji Yang, Fan Lu et 4 al.

Dec 18, 2021 in Materials
The determination of structural dynamic characteristics can be challenging, especially for complex cases. This can be a major impediment for dynamic load identification in many engineering applications. Hence, avoiding the need to find numerous solutions for structural dynamic characteristics can significantly simplify dynamic load identification. To achieve this, we rely on machine learning. The ...

Reconciling Requirements and Implementation via Reengineering for Context-Aware Service Evolution

Jianchu Huang, Lei Liu et 2 al.

Jan 1, 2011 in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops
In modern software development, software requirements and implementation are not always reconciled. This leads to difficulties for evolution tasks in future. Specifically, for modern context-aware systems, changes in stakeholders` requirements disclose that existing implementation is insufficient to meet the new requirements due to the limitations of the traditional techniques. In this paper, we p...

Utilising Abstration Techniques and Gaming Theory for Developing Intangible Cultural Heritage

Sicong Ma, Meiyu Shi et 2 al.

Jan 1, 2018 in 2018 IEEE 42nd Annual Computer Software and Applications Conference
Raising the level of abstraction is to improve the ability to understand the world and then to help with computing. This paper proposes the new value of intangible cultural heritage to compute game rate on abstraction level and to instantiate and infer the other values with the same concrete information and game rate. The proposed approach is to formulate element and standard, enabling system auto...

An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability

Lei Liu, Guannan Si et 7 al.

Jan 1, 2016 in 2016 IEEE 40th Annual Computer Software and Applications Conference
Among all the Web application security issues, SQL Injection Vulnerability (SQLIV) is one of the most serious problems. How to test SQLIV effectively is of great importance. To address this issue, this paper describes a novel approach that is the utilization of Feature Matrix (FM) model for SQLIV black-box penetration test. Firstly, FM is introduced, which integrates the general SQLIV penetration ...