About
260
Publications
25,780
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,007
Citations
Current institution
Additional affiliations
July 2006 - February 2016
Publications
Publications (260)
Quasiplanar donor–acceptor (D–A) thermally activated delayed fluorescence (TADF) molecules are appealing candidates for efficient red/near‐infrared (NIR) emitters but have not been realized. Herein, for the first time, a stepwise approach to achieve this goal via a spiro‐locked C─C covalent bond linking strategy combined with the subtle management...
Organoboron‐nitrogen‐carbonyl‐hybridized (h‐BNCO) frameworks are emerging templates for developing high‐performance multiresonant (MR) emitters, but their potentials have not been fully explored. In this study, a novel red MR emitter, namely, h‐BNCO‐3, is developed by decorating two diphenylamine moieties onto a h‐BNCO MR skeleton (h‐BNCO‐2). Compa...
With the rapid development of IoT technology, a vast quantity of spatial data with text information is generated. Because of the explosive growth of spatial data, users usually encrypt these data and outsource them to the cloud for enjoying the storage and computing capability. Privacy-preserving boolean k Nearest Neighbor (kNN) query is a typical...
Boron/nitrogen (B/N)‐doped polycyclic aromatic hydrocarbons (PAHs) with the multiple resonance (MR) effect are promising for organic light‐emitting diodes (OLEDs) because of their narrowband emission and thermally activated delayed fluorescence (TADF) characteristics. Nevertheless, exploring the variety of such emitters is challenging because of th...
Boron/nitrogen (B/N)‐doped polycyclic aromatic hydrocarbons (PAHs) with the multiple resonance (MR) effect are promising for organic light‐emitting diodes (OLEDs) because of their narrowband emission and thermally activated delayed fluorescence (TADF) characteristics. Nevertheless, exploring the variety of such emitters is challenging because of th...
Cloud-assisted computation empowers resource-constrained clients to efficiently tackle computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the current era of Big Data, the widespread need to solve large-scale modular linear systems of equations (
$\mathcal {LMLSE}$
) of the form
$\mathbf {A}\mathbf {x}\equiv \ma...
inline-formula> $K$
-hop Reachability Query (KRQ) is one of fundamental graph queries, which can answer whether a node
$u$
can reach a node
$v$
within
$K$
hops. With the scale of graph data increasing, data owner desires to outsource the local graphs to cloud server. To protect the graph privacy, data owner encrypts graphs before outsourcing...
Double‐borylated multiple‐resonance (MR) skeletons are promising templates for high performance, while the chemical design space is relatively limited. Peripheral segments are often used to decorate/fuse MR skeletons and modulate the photophysics but they can also cause unwanted spectral broadening. Herein, a narrowband MR emitter ICzDBA by fusing...
Organic light-emitting diodes (OLEDs) exploiting simple binary emissive layers (EMLs) blending only emitters and hosts have natural advantages in low-cost commercialization. However, previously reported OLEDs based on binary EMLs hardly simultaneously achieved desired comprehensive performances, e.g., high efficiency, low efficiency roll-off, narro...
Regioisomeric strategy is of great significance to the design of red thermally activated delayed fluorescence (TADF) molecules; however, previous studies have mainly focused on the regioisomerism of acceptor frameworks. Herein,...
The minimum community search is used to identify a minimum dense community that includes a specified vertex in a large network. It has gained significant attention because of its various applications in social-network analysis, e-commerce transactions, biological network modeling, and other areas. Nevertheless, how to realize privacy-preserving min...
The double-carbazole-fused organoboron framework CzBN is a widely used parent skeleton in designs of multiple resonance (MR) emitters. Currently, the majority of CzBN derivatives are derived from peripheral modification strategies....
Cloud storage auditing mechanism is used to check whether the data of users stored in the cloud is intact. Most existing auditing schemes for secure cloud storage are designed to check the integrity for specified files based on file identities. In some scenarios, the user would like to check the integrity of the files generated and uploaded to the...
According to Menger’s theorem, connectivity and edge connectivity are closely related to node-disjoint paths and edge-disjoint paths, respectively. Node- and edge-disjoint paths can keep the effective transmission of information and confidentiality. Therefore, node-disjoint paths and edge-disjoint paths are two important parameters to measure the r...
Realizing efficient red/near‐infrared (NIR) electroluminescence (EL) by precisely modulating molecular aggregations of thermally activated delayed fluorescence (TADF) emitters is an attractive pathway, yet the molecular designs are elusive. Here, we propose a new approach to manage molecular aggregation via a mild‐twist acceptor‐donor‐acceptor (A‐D...
With the expansion of network scale, it is essential to study network reliability through connectivity and diagnosability. For Hypercube, DCell, BCube, and other networks, their connection modes are specific and different, so it is necessary to use different methods to study the properties of networks. This paper proposes a class of topological str...
With the surging demand for ultra‐high‐resolution displays, the International Telecommunication Union (ITU) announce the next‐generation color gamut standard, named ITU‐R Recommendation BT.2020, which not only sets a seductive but challenging milestone for display technologies but also urges researchers to recognize the importance of color coordina...
Atomically separated frontier molecular orbital (FMO) distribution plays a crucial role in achieving narrowband emissions for multiple resonance (MR)-type thermally activated delayed fluorescence emitters. Directly peripherally decorating a MR framework with donor or acceptor groups is a common strategy for developing MR emitters. However, this app...
Multiple resonance (MR)‐type thermally activated delayed fluorescence (TADF) emitters have promising prospects for high‐color‐purity organic light‐emitting diodes (OLEDs), but they are seldom attempted in the fabrication of solution‐processed devices. In addition, another issue with MR‐TADF emitters is that their heteroatom patterns are very limite...
Hindered by spectral broadening issues with redshifted emission, long‐wavelength (e.g., maxima beyond 570 nm) multiple resonance (MR) emitters with full width at half maxima (FWHMs) below 20 nm remain absent. Herein, by strategically embedding diverse boron (B)/nitrogen (N) atomic pairs into a polycyclic aromatic hydrocarbon (PAH) skeleton, we prop...
Hindered by spectral broadening issues with redshifted emission, long‐wavelength (e.g., maxima beyond 570 nm) multiple resonance (MR) emitters with full width at half maxima (FWHMs) below 20 nm remain absent. Herein, by strategically embedding diverse boron (B)/nitrogen (N) atomic pairs into a polycyclic aromatic hydrocarbon (PAH) skeleton, we prop...
Building blocks and heteroatom alignments are two determining factors in designing multiple resonance (MR)‐type thermally activated delayed fluorescence (TADF) emitters. Carbazole‐fused MR emitters, represented by CzBN derivatives, and the heteroatom alignments of ν‐DABNA are two star series of MR‐TADF emitters that show impressive performances fro...
Building blocks and heteroatom alignments are two determining factors in designing multiple resonance (MR)‐type thermally activated delayed fluorescence (TADF) emitters. Carbazole‐fused MR emitters, represented by CzBN derivatives, and the heteroatom alignments of ν ‐DABNA are two star series of MR‐TADF emitters that show impressive performances fr...
Deep‐red/near‐infrared (DR/NIR) organic light‐emitting diodes (OLEDs) are promising for applications such as night‐vision readable marking, bioimaging, and photodynamic therapy. To tune emission spectra into the DR/NIR region, red emitters generally require assistance from intermolecular interactions. But such interactions generally lead to sharp e...
The road network plays an important role in guiding people's daily travel. In the road network, the shortest distance query is one of the most basic query operations. With the scale of the road network continuously expanding, people choose to outsource the road network to the cloud server in the form of an encrypted graph. To the best of authors' k...
Constructing donor‐π‐acceptor (D‐π‐A)‐type molecular structures by employing a phenyl as the π‐bridge to link donor (D) and acceptor (A) units has been recognized as an effective way to develop highly efficient red thermally activated delayed fluorescence (TADF) organic light‐emitting diodes (OLEDs). However, flexible and relatively planar structur...
Employing metal‐free thermally activated delayed fluorescence (TADF) materials as novel photosensitizers (PSs) for triplet–triplet annihilation upconversion (TTA‐UC) systems has received great attention. Nevertheless, how to choose suitable TADF materials is still a gap that deserves further in‐depth research. Herein, by systematically investigatin...
Multiple resonance (MR) type thermally activated delayed fluorescence (TADF) emitters are very promising in the high‐resolution and high‐efficiency displays, due to their narrow and highly efficient optical emissions. Early MR‐TADF cores that show only short‐range charge‐transfer (CT) electronic excitations hardly afford ideal performances (e.g., s...
Fault tolerance is critical to the reliability analysis of interconnection networks because the vulnerability of components increases with the growth of network scale. Extra connectivity and extra diagnosability are two decisive indicators to measure network fault tolerance and diagnostic capability. Recently, the extra fault tolerance of many tria...
Organic light-emitting diodes (OLEDs) exploiting simple binary emissive layers (EMLs) blending only emitters and hosts have natural advantages in low-cost commercialization. However, previously reported OLEDs based on binary EMLs hardly simultaneously achieved excellent comprehensive performances, e.g ., high efficiency, low efficiency roll-off, na...
Efficient utilization of triplet excitons is vital in organic optoelectronics. One important strategy for harvesting triplets is thermally activated delayed fluorescence (TADF). In most TADF materials, the first singlet (S1) and triplet (T1) excited states both show strong charge-transfer (CT) character to reduce their energetic gap (EST); however,...
Organic light-emitting diode (OLED) technology is promising for ultrahigh-definition displays and other applications, but further improvements in efficiency and colour purity are desired. Here, we designed and synthesized an ultrapure green emitter called DBTN-2, which is organoboron based and features a highly distorted fused π-conjugated molecula...
Graph matching, as one of the most fundamental problems in graph database, has a wide range of applications. Due to the large scale of graph database and the hardness of graph matching, graph user tends to outsource the encrypted graphs to the cloud. The complex graph matching is performed by the cloud. Several schemes have been proposed to support...
Aggregate signatures enable the sensor nodes of Industrial Internet of Things to send their signatures to the aggregator to realize signature compression. Before being stored in the data center, sensitive data and non-sensitive data should adopt different data processing methods in the process of sensor data fusion. In the high security analysis sc...
Developing red thermally activated delayed fluorescence (TADF) emitters concurrently with high efficiency and emission color close to the BT.2020 red standard is an ongoing challenge. Herein, we developed a new red TADF emitter BCN-TPA, in which two identical donors are attached at the para-positions of one fused phenyl ring in the acceptor framewo...
Realizing blue‐hazard‐free emission is an important goal for white organic light‐emitting diodes (OLEDs) toward healthy lighting applications. However, conventional blue organic emitters with broad emission spectra would generally cover the high‐energy emission region and thus cannot meet the demand. Here a blue multiple resonance type thermally ac...
Multiple resonance (MR) type thermally activated delayed fluorescence (TADF) material is currently a research hotspot in organic light‐emitting diodes (OLEDs) due to their high color purity and high exciton utilization. However, there are only a handful of MR‐TADF emitters with emissions beyond the blue‐to‐green region. The very limited emission co...
In this text, by linking a phenoxazine donor (D) into different positions of the 11,12-diphenyldipyrido[3,2-a:2′,3′-c]phenazine acceptor (A), Two novel red thermally activated delayed fluorescence (TADF) isomers, PPZBP and BPZPP, were designed and synthesized. The different connection modes bring different steric hindrance between D and A segments,...
Multiple resonance (MR) type thermally activated delayed fluorescence (TADF) material is currently a research hotspot in organic light‐emitting diodes (OLEDs) due to their high color purity and high exciton utilization. However, there are only a handful of MR‐TADF emitters with emissions beyond the blue‐to‐green region. The very limited emission co...
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of data. The private data onto specific IoT devices can be combined with intelligent platform to provide help for future research and prediction. As an important digital asset, individuals can sell private data to get rewards. Problems, such as privacy, security,...
Multiple resonance (MR) type thermally activated delayed fluorescence (TADF) emitters have attracted much recent attention due to their narrow emission spectra and high photoluminescence quantum yields (PLQYs). Spectral broadening and concentration quenching at high doping concentrations are two issues currently limiting the development of MR-TADF...
Thermally activated delayed fluorescence (TADF) materials with aggregation‐induced emission (AIE) features can overcome aggregation‐caused quenching (ACQ) and emit intensely in aggregate states and thus have attracted enormous attention in the fields of high‐efficiency organic light‐emitting diodes, bioimaging, photodynamic therapy, photocatalysis,...
High‐performance nondoped organic light‐emitting diodes (OLEDs) are promising technologies for future commercial applications. Herein, we synthesized two new thermally activated delayed fluorescence (TADF) emitters that enable us, for the first time, to combine three effective approaches for enhancing the efficiency of nondoped OLEDs. First, the tw...
In the current cloud computing era, outsourcing overloaded computations to cloud servers has become an increasingly popular computing paradigm. Meanwhile, face recognition (FR), as a typical and extensively deployed biometric authentication technique in the real world, always involves time-consuming large-scale matrix operations or complex optimiza...
Dragonfly networks have been widely used in the current High Performance Computing (HPC) computers due to lower global network diameter and other advantages of communication performance such as modularity and cost-effectiveness. The original definition of the dragonfly network was very loose on account of its uncertain and diversified global link a...
Increasing the reverse intersystem crossing (RISC) rates remains a challenge for red thermally activated delayed fluorescence (TADF) emitters, and energy level alignments play an important role. In this work, we demonstrate that locally excited triplet energy levels from acceptor segments (³LEA) can be well modulated by changing the conjugation ext...
Benefiting from the cloud computing, graph owners tend to store their data graphs on the cloud server to release the local computation and storage burden. The complex subgraph isomorphic query, as an important graph query operation, is completed by the cloud server in this way. In order to realize privacy-preserving subgraph isomorphic query over g...
Fragments of fullerene are used as acceptor segments for the first time to construct two thermally activated delayed fluorescence (TADF) compounds DBCP and FAP. Both compounds exhibit similar highly twisted geometries and separated frontier molecular orbital distributions. While on the other hand, their locally exited triplet energy levels from acc...
Hypercubes are popular topologies of massive multiprocessor systems due to their super properties. Cross-cubes are significant variations of hypercubes and they have smaller diameters and higher fault-tolerant capability than hypercubes at the same dimensions. In this paper, we construct node-to-set disjoint paths of an n-dimensional cross-cube, \(...
In the digital twin environment, the fusion data onto physical entities in the physical space are mapped to multiple virtual spaces for digital modeling and intelligent simulation in different dimensions. In real intelligent manufacturing scenarios, heterogeneous multi-source fusion data are collected at the same time period. So they are consistent...
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem, we construct a novel and efficient identity-based data integrity auditing scheme with key-expos...
With popularity and growth of cloud computing, outsourcing computation, as an important cloud service, has been applied in the field of academic and industry. It allows the resource-constrained IoT devices to outsource the computationally intensive problems to the cloud server. The smallest normalized cuts of the large-scale graph is a fundamental...
With the gradual growth of road networks, the graphs used to represent road networks have been becoming larger and larger. It is a preferable choice for the user to outsource large-scale graphs for road networks to cloud and allow the cloud to store and query the information from graphs for him. It improves query efficiency greatly and reduces the...
With the explosive growth of data on the internet, the trend is for users to store these large amounts of data on the cloud. To protect the privacy of data, users need to encrypt their data before uploading them to the cloud. This brings a big challenge for cloud to perform deduplication. In order to tackle this challenge, we design a secure dedupl...
Realizing highly efficient reverse intersystem crossing (RISC) process for red thermally activated delayed fluorescence (TADF) emitters remains a formidable challenge. Herein we demonstrate that charge transfer (CT) energy levels are gradually reduced with enhancing electron-withdrawing abilities of the secondary acceptor (A) attachments. Meanwhile...
With the integration of the healthcare system, Internet of Things, and cloud storage service, more and more medical institutions upload their electronic medical records (EMRs) to the cloud to reduce the local storage burden and realize data sharing among external researchers. To secure the sensitive information, EMRs usually should be encrypted bef...
With the popularization of various applications of the Internet of Things (IoT), a large number of smart devices are connected to the IoT to form an interconnected network. Because the amount of network data generated by IoT devices is huge, data owners prefer to outsource these data to the cloud for releasing them from the local storage burden. Me...
Connectivity is a significant metric to assess the fault tolerance of a network. For a faulty vertex set $H$, the $h$-extra connectivity is defined under the assumption that every component of the network removing $H$ has at least $h+1$ fault-free vertices. Compared to the traditional connectivity, which is defined under the assumption that the net...
As cloud computing and Internet of Things (IoT) are becoming more and more deeply integrated, the new secure challenge for IoT data has attracted great attention. Privacy preserving keyword search, as one important secure technique, achieves search over encrypted cloud-based IoT data. Forward security and verifiability are two important security pr...
Broad Learning System (BLS) is a new deep learning model proposed recently, which shows its effectiveness in many fields, such as image recognition and fault detection. In this paper, we propose a secure, efficient, and verifiable outsourcing algorithm for BLS. This algorithm enables resource constrained devices to outsource BLS algorithm to untrus...
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the d...
With the development of cloud computing and the advent of Internet of Things(IoT), outsourcing computation, as an important application of cloud computing, has been widely researched in the field of academic and industry. The convex optimization problem, as a most common mathematical problem, often appears in some machine learning algorithms and sm...
Solving quadratic congruence equations is an expensive operation widely employed in cryptographic constructions for secure Internet of Things applications. Recently, two outsourcing algorithms were proposed by Zhang
et al.
to solve quadratic congruence equations by employing Cippolla’s algorithm. It was claimed that all the inputs and outputs can...
Linear Regression (LR) is a classical machine learning algorithm which has many applications in the cyber physical social systems (CPSS) to shape and simplify the way we live, work and communicate. This paper focuses on the data analysis for CPSS when the Linear Regression is applied. The training process of LR is time-consuming since it involves c...
The public cloud data integrity auditing technique is used to check the integrity of cloud data through the Third Party Auditor. In order to make it more practical, we propose a new paradigm called integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. This paradigm is designed for one of the most commo...
As the product of combining Internet of Things (IoT), cloud computing and traditional healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile security and privacy issues have attracted great attention. Dynamic searchable symmetric encryption (DSSE) technique can make the user search the dynamic healthcare informatio...
For the sake of achieving higher reliability, conditional connectivity has gradually become well-known. Component connectivity, as a kind of conditional connectivity, is an extension of the classical connectivity. Given a simple and undirected graph G and a nonnegative integer r, the (r+1)-component connectivity of graph G, say cκr+1(G), is the min...
Connectivity and diagnosability are two crucial subjects for a network’s ability to tolerate and diagnose faulty processors. The $r$-component connectivity $c\kappa _{r}(G)$ of a network $G$ is the minimum number of vertices whose deletion results in a graph with at least $r$ components. The $r$-component diagnosability $ct_{r}(G)$ of a network $G$...
We investigate the problem of securely outsourcing the modular exponentiations in cryptography to an untrusted server, and analyze the security and the efficiency of three privacy-preserving outsourcing protocols for exponentiations proposed in [JCSS,90 (2017):1-13]. Based on Coppersmith's lattice-based method, we present heuristic polynomial-time...
Bilinear pairing is a fundamental operation that is widely used in cryptographic algorithms (e.g., identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the time complexity of bilinear pairing is
$O(n^{3})$
, making it a very time-consuming operation, especially for resource-constrained IoT devices. Secure outsourcing...
Phrase search encryption, as an important technique in cloud-based IoT system, allows users to retrieve encrypted IoT data that contains a set of consecutive keywords. It plays an important role in cloud-based e-healthcare diagnosis system, machine learning applications for cloud-based IoT system, etc. However, to the best of our knowledge, the exi...
p>Thermally activated delayed fluorescence (TADF) has been considered an important development in organic light-emitting diodes (OLEDs) for significantly enhancing efficiency of pure organic emitters. However, TADF is often associated with boarder emission spectra not meeting the requirements of modern high-performance flat-panel displays. A recent...
Huaqun Wang Debiao He Jia Yu- [...]
Bin Wu
Internet of things (IoT) is one of the main application scenarios of 5th generation mobile networks (5G). Along with the rapid development of 5G, IoT terminal devices will create big data. Generally, IoT terminal devices are lightweight user equipments, for example, wearable devices. In order to take use of these lightweight terminal devices, it is...
With the rapid development of artificial intelligence and the advent of the 5G era, deep learning has received extensive attention from researchers. Broad Learning System (BLS) is a new deep learning model proposed recently, which shows its effectiveness in many fields, such as image recognition and fault detection. However, the training process st...
Bilinear pairing is a fundamental operation that is widely used in cryptographic algorithms (e.g., identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the time complexity of bilinear pairing is $O(n^3)$, making it a very time-consuming operation, especially for resource-constrained IoT devices. Secure outsourcing of bi...
Linear Regression (LR) is a classical machine learning algorithm which has many applications in the cyber physical social systems (CPSS) to shape and simplify the way we live, work and communicate. This paper focuses on the data analysis for CPSS when the Linear Regression is applied. The training process of LR is time-consuming since it involves c...
For large-scale data transmission of Industrial Internet of Things (IIoT), aggregate signature is an effective approach. It can compress the signatures of different senders to save bandwidth. In order to maintain the autonomous management of IIoT, massive sensing data are sent to the data center for intelligent analysis. The reliability of data is...
Developing red thermally activated delayed fluorescence (TADF) emitters for high‐performance OLEDs is still facing great challenge. Herein, three red TADF emitters, pDBBPZ‐DPXZ, pDTBPZ‐DPXZ, and oDTBPZ‐DPXZ, are designed and synthesized with same donor–acceptor (D‐A) backbone with different peripheral groups attaching on the A moieties. Their lowes...
Thermally activated delayed fluorescence (TADF) emitters with aggregation-induced emission (AIE) features are hot candidates for non-doped organic light-emitting diodes (OLEDs), as they are highly emissive in solid states upon photoexcitation. Nevertheless, not every AIE-TADF emitter in the past had guaranteed decent efficiencies in non-doped devic...
In thermally activated delayed fluorescence (TADF) molecular design, triazine (TRZ) is of the most widely used acceptor core with three phenyl rings protected. In this work, by substituting the peripheral phenyl group with electrophilic pyridine rings, a new acceptor 2-phenyl-4,6-di(pyridin-3-yl)-1,3,5-triazine (PyTRZ) was designed and two novel TA...