UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage Journal article
Yang, Ziyuan, Kang, Ming, Teoh, Andrew Beng Jin, Gao, Chengrui, Chen, Wen, Zhang, Bob, Zhang, Yi. A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 8587-8599.
Authors:  Yang, Ziyuan;  Kang, Ming;  Teoh, Andrew Beng Jin;  Gao, Chengrui;  Chen, Wen; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.3/7.3 | Submit date:2024/10/10
Palmprint Verification  Cancellable Biometrics  Negative Database  Competition Neural Network  Replay Attacks  
Cardioprotective role of oleanolic acid in patients with type 2 diabetes mellitus Journal article
Li, Chengrui, He, Jing, Li, Yongjun, Zhang, Chengyang, Wang, Ziheng, Wu, Xiaoman, Qi, Fuwei. Cardioprotective role of oleanolic acid in patients with type 2 diabetes mellitus[J]. Heliyon, 2024, 10(11), e31303.
Authors:  Li, Chengrui;  He, Jing;  Li, Yongjun;  Zhang, Chengyang;  Wang, Ziheng; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.4/3.9 | Submit date:2024/06/05
Network Pharmacology  Oleanolic Acid  Type 2 Diabetes  
Mechanism of Yuanhu Zhitong oral liquid in the treatment of primary dysmenorrhea based on network pharmacology Conference paper
Zhang, Chengrui, HU YUANJIA. Mechanism of Yuanhu Zhitong oral liquid in the treatment of primary dysmenorrhea based on network pharmacology[C], 2023.
Authors:  Zhang, Chengrui;  HU YUANJIA
Favorite |  | Submit date:2024/01/02
Network pharmacology study of quality control markers in Chinese medicine: an analysis based on the Network Pharmacology Evaluation Method Guidance. Conference paper
Zhang, Daiyan, Zhang, Chengrui, HU YUANJIA. Network pharmacology study of quality control markers in Chinese medicine: an analysis based on the Network Pharmacology Evaluation Method Guidance.[C], 2023.
Authors:  Zhang, Daiyan;  Zhang, Chengrui;  HU YUANJIA
Favorite |  | Submit date:2024/01/02
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security