Dongxi Liu
YOU?
Author Swipe
View article: Experimental study of a novel downhole heat exchanger utilizing working fluids for enhanced heat exchange
Experimental study of a novel downhole heat exchanger utilizing working fluids for enhanced heat exchange Open
View article: Traceable signatures from lattices
Traceable signatures from lattices Open
View article: Paleo-environmental and geological characteristics of Wufeng-Longmaxi marine shale in different paleo-geomorphological units, Eastern Sichuan Basin, China
Paleo-environmental and geological characteristics of Wufeng-Longmaxi marine shale in different paleo-geomorphological units, Eastern Sichuan Basin, China Open
View article: Stratigraphic division and sedimentary environment of the Permian Wujiaping Formation in the Longmen-Wushankan area of the eastern Sichuan Basin: Insights for shale gas exploration
Stratigraphic division and sedimentary environment of the Permian Wujiaping Formation in the Longmen-Wushankan area of the eastern Sichuan Basin: Insights for shale gas exploration Open
The Longmen-Wushankan area, a newly emerging region in the Sichuan Basin, has seen significant exploration activites across the Permian marine shale gas following a breakthrough in the Hongxing area. Recently, well DY1H achieved a high tes…
View article: Response of geochemical characteristics of organic-rich shale of Longmaxi formation to the sedimentary environment in the Neijiang-Rongchang area, Sichuan Basin, China
Response of geochemical characteristics of organic-rich shale of Longmaxi formation to the sedimentary environment in the Neijiang-Rongchang area, Sichuan Basin, China Open
The Lower Paleozoic (Upper Ordovician–Silurian), a globally deposited organic-rich shale, is one of the most prevalent source rocks worldwide. However, the origin of these shales remains uncertain. Here, this study reports geological and g…
View article: Spontaneous Spatial Cognition Emerges during Egocentric Video Viewing through Non-invasive BCI
Spontaneous Spatial Cognition Emerges during Egocentric Video Viewing through Non-invasive BCI Open
Humans possess a remarkable capacity for spatial cognition, allowing for self-localization even in novel or unfamiliar environments. While hippocampal neurons encoding position and orientation are well documented, the large-scale neural dy…
View article: Deep Learning-Based Sound Source Localization: A Review
Deep Learning-Based Sound Source Localization: A Review Open
As a fundamental technology in environmental perception, sound source localization (SSL) plays a critical role in public safety, marine exploration, and smart home systems. However, traditional methods such as beamforming and time-delay es…
View article: Spatial pattern and driving factors of carbon storage in mangroves along Leizhou Peninsula, China
Spatial pattern and driving factors of carbon storage in mangroves along Leizhou Peninsula, China Open
Mangrove ecosystem is known for its productivity with high carbon density. However, the mechanisms controlling carbon storage in mangroves remain poorly understood. Therefore, a field survey was conducted to explore mangrove carbon storage…
View article: Mangrove afforestation increases microbial necromass but reduces their contribution to soil carbon pool
Mangrove afforestation increases microbial necromass but reduces their contribution to soil carbon pool Open
View article: Zero trust-based authentication for Inter-Satellite Links in NextGen Low Earth Orbit networks
Zero trust-based authentication for Inter-Satellite Links in NextGen Low Earth Orbit networks Open
View article: A Review of Indirect Authentication in LEO Satellite Networks: Three Decades of Progress
A Review of Indirect Authentication in LEO Satellite Networks: Three Decades of Progress Open
View article: Shale reservoir characterization and implications for the exploration and development of the upper Permian Wujiaping Formation, Longmen–Wushankan area, eastern Sichuan Basin
Shale reservoir characterization and implications for the exploration and development of the upper Permian Wujiaping Formation, Longmen–Wushankan area, eastern Sichuan Basin Open
Recent exploration efforts have revealed significant industrial gas flow from the Wujiaping Formation marine shale in the Longmen–Wushankan area of the eastern Sichuan Basin, underscoring its considerable exploration potential. In this stu…
View article: FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup Open
Bit-decomposition-based zero-knowledge range proofs in the discrete logarithm (DLOG) setting with a transparent setup, e.g., Bulletproof (IEEE S&P 18), Flashproof (ASIACRYPT 22), and SwiftRange (IEEE S&P 24), have garnered widespread popul…
View article: Evolution of black shale sedimentary environment and its impact on organic matter content and mineral composition: a case study from Wufeng-Longmaxi Formation in Southern and Eastern Sichuan Basin
Evolution of black shale sedimentary environment and its impact on organic matter content and mineral composition: a case study from Wufeng-Longmaxi Formation in Southern and Eastern Sichuan Basin Open
Due to global geological events and differences in regional sedimentary environments, marine shale reservoirs of Wufeng-Longmaxi Formation in Eastern and Southern Sichuan Basin exhibit significant heterogeneity in organic matter content an…
View article: An Experimental Study of Three-Dimensional Separation Surface Sloshing in the Wet Storage Tank of a Floating Offshore Platform
An Experimental Study of Three-Dimensional Separation Surface Sloshing in the Wet Storage Tank of a Floating Offshore Platform Open
In this work, in order to elucidate the three-dimensional (3D) resonant sloshing dynamics of the oil–water interface in an offshore cylindrical wet storage tank, a series of model experiments are conducted in a completely filled cylindrica…
View article: Zero Trust-Based Authentication for Inter-Satellite Links in Nextgen Low Earth Orbit Networks
Zero Trust-Based Authentication for Inter-Satellite Links in Nextgen Low Earth Orbit Networks Open
View article: Mangrove Restoration Increases Microbial Necromass But Reduces Their Contribution to Soil Carbon Pool
Mangrove Restoration Increases Microbial Necromass But Reduces Their Contribution to Soil Carbon Pool Open
View article: Zero Trust-Based Authentication for Inter-Satellite Links in Nextgen Low Earth Orbit Networks
Zero Trust-Based Authentication for Inter-Satellite Links in Nextgen Low Earth Orbit Networks Open
View article: Vulmatch: Binary-Level Vulnerability Detection Through Signature
Vulmatch: Binary-Level Vulnerability Detection Through Signature Open
View article: Semdiff: Binary Similarity Detection by Diffing Key-Semantics Graphs
Semdiff: Binary Similarity Detection by Diffing Key-Semantics Graphs Open
View article: Influence of liquid viscosity on surface wave motion in a vertical cylindrical tank
Influence of liquid viscosity on surface wave motion in a vertical cylindrical tank Open
The data in the paper named "Influence of liquid viscosity on surface wave motion in a vertical cylindrical tank"
View article: model-based script synthesis for fuzzing
model-based script synthesis for fuzzing Open
Kernel fuzzing is important for finding critical kernel vulnerabilities. Close-source (e.g., Windows) operating system kernel fuzzing is even more challenging due to the lack of source code. Existing approaches fuzz the kernel by modeling …
View article: SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs Open
Binary similarity detection is a critical technique that has been applied in many real-world scenarios where source code is not available, e.g., bug search, malware analysis, and code plagiarism detection. Existing works are ineffective in…
View article: VulMatch: Binary-level Vulnerability Detection Through Signature
VulMatch: Binary-level Vulnerability Detection Through Signature Open
Similar vulnerability repeats in real-world software products because of code reuse, especially in wildly reused third-party code and libraries. Detecting repeating vulnerabilities like 1-day and N-day vulnerabilities is an important cyber…
View article: OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy
OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy Open
Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Diff…
View article: Influence of Liquid Viscosity on Surface Wave Motion in a Vertical Cylindrical Tank
Influence of Liquid Viscosity on Surface Wave Motion in a Vertical Cylindrical Tank Open
View article: Upper Limit on Heat Extraction of a Super Long Gravity Heat Pipe in a Hot Dry Rock Geothermal Reservoir
Upper Limit on Heat Extraction of a Super Long Gravity Heat Pipe in a Hot Dry Rock Geothermal Reservoir Open
View article: Experimental Study on a New Type of Water Storage Tank for Geothermal Heating
Experimental Study on a New Type of Water Storage Tank for Geothermal Heating Open
View article: Experimental Study on the Sloshing of a Three-Liquid System with Free Surface
Experimental Study on the Sloshing of a Three-Liquid System with Free Surface Open
View article: Semdiff: Binary Similarity Detection by Diffing Key-Semantics Graphs
Semdiff: Binary Similarity Detection by Diffing Key-Semantics Graphs Open