Yaping Lin
YOU?
Author Swipe
View article: Study on the Influence of Rural Economic Development on the Export Competitiveness of Agricultural Products
Study on the Influence of Rural Economic Development on the Export Competitiveness of Agricultural Products Open
How to influence the export competitiveness of agricultural products from the perspective of rural economic development is a topic worthy of attention. When the rural economy develops, does it have an important impact on the export competi…
View article: Statistical Measurement of the Level of Rural Digitization in Zhejiang Province
Statistical Measurement of the Level of Rural Digitization in Zhejiang Province Open
This paper constructs the evaluation index system of rural digitization level from 16 specific indicators in 4 dimensions. Based on the panel data of 11 prefecture-level cities in Zhejiang Province from 2017 to 2021, the entropy value meth…
View article: Supplementary Material for: Risk of Hospital-Acquired Acute Kidney Injury among Adult Opioid Analgesic Users: A Multicenter Real-World Data Analysis
Supplementary Material for: Risk of Hospital-Acquired Acute Kidney Injury among Adult Opioid Analgesic Users: A Multicenter Real-World Data Analysis Open
Introduction: Comprehensive data on the risk of hospital-acquired (HA) acute kidney injury (AKI) among adult users of opioid analgesics are lacking. This study aimed to systematically compare the risk of HA-AKI among the users of various o…
View article: Oversampling for Imbalanced Time Series Data
Oversampling for Imbalanced Time Series Data Open
Many important real-world applications involve time-series data with skewed
distribution. Compared to conventional imbalance learning problems, the
classification of imbalanced time-series data is more challenging due to high
dimensionalit…
View article: Effect of Electroacupuncture on Platelet-derived Growth Factor and the Ultrastructure of Mitochondria in Rats with Diabetic Gastroparesis
Effect of Electroacupuncture on Platelet-derived Growth Factor and the Ultrastructure of Mitochondria in Rats with Diabetic Gastroparesis Open
View article: Electroacupuncture Relieves Suppression of Autophagy in Interstitial Cells of Cajal of Diabetic Gastroparesis Rats
Electroacupuncture Relieves Suppression of Autophagy in Interstitial Cells of Cajal of Diabetic Gastroparesis Rats Open
Background . The incidence of diabetic gastroparesis (DGP) is mainly blamed to abnormity of interstitial cells of Cajal (ICCs). Autophagy could degrade damaged proteins and organelles to keep intracellular homeostasis, and it could directl…
View article: A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing
A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing Open
The sharing economy has greatly promoted the rapid development and application of spatial crowdsourcing. Although privacy-preserving spatial task matching as an indispensable part has been extensively explored, existing schemes cannot be d…
View article: Effect of moxibustion on survival status and nutritional metabolic factor in tumor-bearing rats with gastric cancer
Effect of moxibustion on survival status and nutritional metabolic factor in tumor-bearing rats with gastric cancer Open
To observe the effect of moxibustion on the survival status and nutritional metabolic factors of tumor-bearing rats with gastric cancer and explore the inhibitory effect of moxibustion on the tumor-bearing rats. A total of 40 SD rats were …
View article: Offline privacy preserving proxy re-encryption in mobile cloud computing
Offline privacy preserving proxy re-encryption in mobile cloud computing Open
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based pro…
View article: ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples Open
Since the threat of malicious software (malware) has become increasingly serious, automatic malware detection techniques have received increasing attention, where machine learning (ML)-based visualization detection methods become more and …
View article: A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services
A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services Open
With the rapid development of wireless communications and mobile devices with location capability, location-based services (LBS) have been extensively used in almost all social and business domains. In terms of privacy and efficiency, ther…
View article: An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data Open
With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing. There are various searchable encryption schemes to…
View article: Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud
Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud Open
Cloud-based Personal Health Record systems (CB-PHR) have great potential in facilitating the management of individual health records. Security and privacy concerns are among the main obstacles for the wide adoption of CB-PHR systems. In th…
View article: An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach
An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach Open
The huge benefit of mobile application industry has attracted a large number of developers and attendant attackers. Application repackaging provides help for the distribution of most Android malware. It is a serious threat to the entire An…
View article: Image decomposition-based structural similarity index for image quality assessment
Image decomposition-based structural similarity index for image quality assessment Open
Perceptual image quality assessment (IQA) adopts a computational model to assess the image quality in a fashion, which is consistent with human visual system (HVS). From the view of HVS, different image regions have different importance. B…
View article: The Effects of Moxibustion on Serum Interleukins and T Cell Subset in H.polyri Infected Rats
The Effects of Moxibustion on Serum Interleukins and T Cell Subset in H.polyri Infected Rats Open
Objective: to observe the effects of moxibustion on histomorphological changes of gastric mucosa, as well as on serum IL-6、IL-8、TNF-α,Hp IgG、CD 3 + 、CD 4 + 、CD 8 + in helicobacter pylori (Hp) infected rats, so that to better understand how…
View article: Scrape-off layer flows, magnetic topology and influence on the L-H threshold in a tokamak
Scrape-off layer flows, magnetic topology and influence on the L-H threshold in a tokamak Open
View article: A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing Open
With its reprogrammability, low design cost, and increasing capacity, field-programmable gate array (FPGA) has become a popular design platform and a target for intellectual property (IP) infringement. Currently available IP protection sol…