
Qian Wang- Anhui Agricultural University
Qian Wang
- Anhui Agricultural University
About
383
Publications
82,752
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
25,195
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (383)
Gallium nitride (GaN) materials have high absorption coefficient and wide bandgap. In this work, an excellent ohmic contact electrode with low specific contact resistivity of 5.9 × 10⁻⁶ Ω·cm² is prepared on semi-insulating GaN material grown by MOCVD. Moreover, the high-responsivity lateral GaN photoconductive semiconductor switch (PCSS) is develop...
Despite the implementation of safety alignment strategies, large language models (LLMs) remain vulnerable to jailbreak attacks, which undermine these safety guardrails and pose significant security threats. Some defenses have been proposed to detect or mitigate jailbreaks, but they are unable to withstand the test of time due to an insufficient und...
Recently, software systems powered by deep learning (DL) techniques have significantly facilitated people’s lives in many aspects. As the backbone of these DL systems, various DL libraries undertake the underlying optimization and computation. However, like traditional software, DL libraries are not immune to bugs. These bugs may be propagated to p...
In this paper, a photoconductive semiconductor switch (PCSS) device that adopts the lateral step doping structure (LSD) is proposed for the first time. Simulation results show that the lateral step doping structure has significant advantages in improving the voltage resistance of the PCSS. As to a small-size PCSS with 5 µm electrode gap, the LSD st...
Facial recognition models are increasingly employed by commercial enterprises, government agencies, and cloud service providers for identity verification, consumer services, and surveillance. These models are often trained using vast amounts of facial data processed and stored in cloud-based platforms, raising significant privacy concerns. Users' f...
Private data, when published online, may be collected by unauthorized parties to train deep neural networks (DNNs). To protect privacy, defensive noises can be added to original samples to degrade their learnability by DNNs. Recently, unlearnable examples are proposed to minimize the training loss such that the model learns almost nothing. However,...
Deep learning-based automatic speech recognition (ASR) systems are capable of transcribing input audio of arbitrary duration into character sequences, which are widely used in daily life. However, recent research has found that deep learning models are vulnerable to backdoor attacks. A malicious adversary can embed a backdoor functionality into the...
Recent studies have revealed the vulnerability of Deep Neural Network (DNN) models to backdoor attacks. However, existing backdoor attacks arbitrarily set the trigger mask or use a randomly selected trigger, which restricts the effectiveness and robustness of the generated backdoor triggers. In this paper, we propose a novel attention-based mask ge...
Recent studies have revealed the vulnerability of Deep Neural Network (DNN) models to backdoor attacks. However, existing backdoor attacks arbitrarily set the trigger mask or use a randomly selected trigger, which restricts the effectiveness and robustness of the generated backdoor triggers. In this paper, we propose a novel attention-based mask ge...
Vision transformers have achieved impressive performance in various vision-related tasks, but their vulnerability to backdoor attacks is under-explored. A handful of existing works focus on dirty-label attacks with wrongly-labeled poisoned training samples, which may fail if a benign model trainer corrects the labels. In this paper, we propose Mega...
Federated Learning (FL) emerged as a paradigm for conducting machine learning across broad and decentralized datasets, promising enhanced privacy by obviating the need for direct data sharing. However, recent studies show that attackers can steal private data through model manipulation or gradient analysis. Existing attacks are constrained by low t...
Adversarial training has been widely considered the most effective defense against adversarial attacks. However, recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training, leading to two potential issues: firstly, the overall robustness of a model is compromised due to the weakest class; a...
Deepfake detection automatically recognizes the manipulated media by analyzing whether it contains forgeries generated through deep learning. It is natural to ask which among the existing deepfake detection approaches stand out as top performers. This question is pivotal for identifying promising research directions and offering practical guidance....
Here, we describe a systematic theoretical study of ScAlN/AlGaN/GaN heterostructures for enhanced high-electron-mobility transistors (HEMTs). We have investigated the carrier distributions and energy-band diagrams by solving the coupled Schrödinger and Poisson equations self-consistently. When the heterostructure is in the “off” state, the two-dime...
Face authentication usually utilizes deep learning models to verify users with high accuracy. However, it is vulnerable to various attacks that cheat the models by manipulating the digital counterparts of human faces. So far, lots of liveness detection schemes have been developed to prevent such attacks. Unfortunately, the attacker can still bypass...
A new long-term emission inventory called the Inversed Emission Inventory for Chinese Air Quality (CAQIEI) was developed in this study by assimilating surface observations from the China National Environmental Monitoring Centre (CNEMC) using an ensemble Kalman filter (EnKF) and the Nested Air Quality Prediction Modeling System. This inventory conta...
Large Language Models (LLMs) have excelled in various tasks but are still vulnerable to jailbreaking attacks, where attackers create jailbreak prompts to mislead the model to produce harmful or offensive content. Current jailbreak methods either rely heavily on manually crafted templates, which pose challenges in scalability and adaptability, or st...
Cauliflower is a distinct subspecies of the Brassica oleracea plants due to its specialized and edible floral organ. Cauliflower curd is composed of enlarged inflorescence meristems that developed by a series of precise molecular regulations. Based solely on the curd solidity, cauliflower is generally classified into two groups (compact-curd and lo...
Molecular markers play a crucial role in marker-assisted breeding and varietal identification. However, the application of insertion/deletion markers (InDels) in grapevines has been limited by the low throughput and separability of gel electrophoresis. To developed effective InDel markers for grapevines, this study reports a novel, effective and hi...
Deep generative models have demonstrated impressive performance in various computer vision applications, including image synthesis, video generation, and medical analysis. Despite their significant advancements, these models may be used for malicious purposes, such as misinformation, deception, and copyright violation. In this paper, we provide a s...
This study aimed to investigate the epidemiological characteristics and trends over time of carbapenemase-producing (e.g., KPC, NDM, VIM, IMP, and OXA-48) Gram-negative bacteria (CPGNB). Non-duplicated multi-drug resistant Gram-negative bacteria (MDRGNB) were collected from the First Affiliated Hospital of Zhengzhou University from April 2019 to Fe...
Background
Pseudomonas syringae pv. actinidiae (Psa) is an important bacterial plant pathogen that causes severe damage to the kiwifruit industry worldwide. Three Psa strains were recently obtained from different kiwifruit orchards in Anhui Province, China. The present study mainly focused on the variations in virulence and genome characteristics o...
Cauliflower (Brassica oleracea L. var. botrytis) is a distinctive vegetable that supplies a nutrient-rich edible inflorescence meristem for the human diet. However, the genomic bases of its selective breeding have not been studied extensively. Herein, we present a high-quality reference genome assembly C-8 (V2) and a comprehensive genomic variation...
Background
Breast cancer is the key global menace to women’s health, which ranks first by mortality rate. The rate reduction and early diagnostics of breast cancer are the mainstream of medical research. Immunohistochemical examination is the most important link in the process of breast cancer treatment, and its results directly affect physicians’...
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms, such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient mode...
Recent advancements in adversarial attack research have seen a transition from white-box to black-box and even no-box threat models, greatly enhancing the practicality of these attacks. However, existing no-box attacks focus on instance-specific perturbations, leaving more powerful universal adversarial perturbations (UAPs) unexplored. This study a...
Existing research has demonstrated that deep neural networks are susceptible to model extraction attacks, where an attacker can construct a substitute model with similar functionality to the victim model by querying the black-box victim model. To counter such attacks, various disruption-based defenses have been proposed. These defenses disrupt the...
A new long-term emission inventory called the Inversed Emission Inventory for Chinese Air Quality (CAQIEI) was developed in this study by assimilating surface observations from the China National Environmental Monitoring Centre (CNEMC) using the ensemble Kalman filter (EnKF) and the Nested Air Quality Prediction Modeling System (NAQPMS). This inven...
Current root reinforcement methods for acute type A aortic dissection (ATAAD) risk the tearing of endothelial tissue by sutures. This study proposed a novel technique for aortic root reinforcement and evaluated its effectiveness.
Patients who diagnosed with ATAAD and had mild to moderate aortic root involvement, combined with aortic arch involvemen...
Adversarial transferability presents an intriguing phenomenon, where adversarial examples designed for one model can effectively deceive other models. By exploiting this property, various transfer-based methods are proposed to conduct adversarial attacks without knowledge of target models, posing significant threats to practical black-box applicati...
Widely-used DNN models are vulnerable to backdoor attacks, where the backdoored model is only triggered by specific inputs but can maintain a high prediction accuracy on benign samples. Existing backdoor input detection strategies rely on the assumption that benign and poisoned samples are separable in the feature representation of the model. Howev...
Backdoor attacks aim to inject backdoors to victim machine learning models during training time, such that the backdoored model maintains the prediction power of the original model towards clean inputs and misbehaves towards backdoored inputs with the trigger. The reason for backdoor attacks is that resource-limited users usually download sophistic...
Background:
Pemphigus Vulgaris (PV) is a potentially fatal autoimmune bullous disease primarily caused by acantholysis of keratinocytes attributed to pathogenic desmoglein-3 (Dsg3) autoantibodies. Interleukin-37 (IL-37) reportedly plays important roles in a variety of autoimmune diseases, but its role in PV is not clear.
Objectives:
To investiga...
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions are firstly detected using visual primitives such as color and shape and then grouped and merged into a co-saliency map. However, co-s...
Deep neural networks are vulnerable to backdoor attacks, where a specially-designed trigger will lead to misclassification of any benign samples. However, existing backdoor attacks usually impose conspicuous patch triggers on images, which are easily detected by humans and defense algorithms. Existing works on invisible triggers, however, either ha...
Encrypted databases have garnered considerable attention for their ability to safeguard sensitive data outsourced to third parties. However, recent studies have revealed the vulnerability of encrypted databases to leakage-abuse attacks on their search module, prompting the development of countermeasures to address this issue. While most studies hav...
With the development of deep learning, deep neural network (DNN)-based application have become an indispensable aspect of daily life. However, recent studies have shown that these well-trained DNN models are vulnerable to model inversion attacks (MIAs), where attackers can recover their training data with high fidelity. Although several defensive s...
Backdoor attacks have been widely studied for image classification tasks, but rarely investigated for video recognition tasks. In this paper, we explore the possibility of physically-realizable backdoor attacks against video recognition models. Different from existing works that directly apply image backdoor attacks to videos, i.e., patch a visible...
Cauliflower is one of the most important vegetable crops grown worldwide. However, the lack of genetic diversity information and efficient molecular markers hinders efforts to improve cauliflower. This study aims to construct DNA fingerprints for 329 cauliflower cultivars based on SNP markers and the KASP system. After rigorous filtering, a total o...
Bacillus pumilus plays an important role in industrial application and biocontrol activities, as well as causing humans and plants disease, leading to economic losses and biosafety concerns. However, until now, the pathogenesis and underlying mechanisms of B. pumilus strains remain unclear. In our previous study, one representative isolate of B. pu...
Background
Plant chloroplast DNA (cpDNA) typically has a circular structure, including a large single-copy region (LSC), a small single-copy region (SSC) and two inverted repeats (IR1 and IR2). The organization of these four elementary regions LSC-IR1-SSC-IR2 is highly conserved across all plant cpDNAs. Very few structural variations (SVs) occurrin...
Deep learning training is often outsourced to clouds due to its high computation overhead. However, clouds may not perform model training correctly due to the potential violations on Service Level Agreement (SLA) and attacks, incurring low quality of outsourced training. It is challenging for customers to understand the quality of outsourced traini...
Introduction
Endothelial cells play important roles in neurodegenerative diseases caused by diabetes, therefore, we aimed at investigating the mechanisms through which endothelial cells are involved in diabetes development.
Methods
Single cell analysis was performed to identify the major endothelial cell subtypes in cardiovascular tissues that are...
There is mounting evidence that ischemic cerebral infarction contributes to vascular cognitive impairment and dementia in elderly. Ischemic stroke and glioma are two majorly fatal diseases worldwide, which promote each other's development based on some common underlying mechanisms. As a post-transcriptional regulatory protein, RNA-binding protein i...
Machine learning models are established with a variety of data collected from individual users who are concerned about their privacy. Various cloud service providers (e.g., Amazon, Google, Alibaba) commercialize their models by selling them or providing limited access via APIs. However, existing studies have shown that such cloud-based models are s...
To investigate the diagnostic efficiency of Raman spectroscopy for the diagnosis of breast cancer, we searched PubMed, Web of Science, Cochrane Library, and Embase for articles published from the database establishment to May 20, 2022. Pooled sensitivity, specificity, diagnostic odds ratio, and area under the receiver pooled operating characteristi...
Cauliflower is one of the most important vegetable crops grown worldwide. However, efforts to improve cauliflower are hindered by the lack of genetic diversity information and efficient molecular markers. In this study, we aim to construct DNA fingerprints for 329 cauliflower cultivars based on SNP markers and the KASP system. After rigorous filter...
It’s well-known that multiple metal elements can lead to the change of oxidative stress response levels in vivo. However, their relationship with age-related cataract (ARC) had not been well studied. We designed a case–control study including 210 individuals with ARC and 210 matched control group. The metal levels in their urine specimens were meas...
Background:
Polycystic ovary syndrome (PCOS) is closely related to insulin resistance (IR). Bone morphogenetic protein-9 (BMP-9) plays an important role in maintaining glucose homeostasis, but an association between BMP-9 and PCOS has not been reported. Here, we report the changes in BMP-9 and the influence of this protein on IR in PCOS.
Methods:...
Background
Papillary thyroid cancer (PTC) is the most common thyroid tumor, and early diagnosis and treatment can effectively improve prognosis. Many controversies surround the treatment method of T1N0M0 PTC. Recently, thermal ablation (TA) has shown some benefits in the treatment of PTC patients, but the safety and efficacy of its treatment remain...
Family with sequence similarity 83 (FAM83) is a newly identified family of oncogenes whose members play important roles in signaling and cancer progression. However, a thorough understanding of the FAM83 family in tumors is still lacking. Here, we performed a comprehensive analysis of the expression levels of the FAM83 family across cancers and pat...
Cardiac surgery-associated acute kidney injury (CSA-AKI) is a common yet serious complication that is closely related to cardiopulmonary bypass (CPB). Extracellular cold-inducible RNA-binding protein (eCIRP) can mediate aseptic inflammation and trigger intracellular oxidative stress. In the present study, expression of serum CIRP was significantly...
Previous researches have demonstrated deep learning models' vulnerabilities to decision-based adversarial attacks, which craft adversarial examples based solely on information from output decisions (top-1 labels). However, existing decision-based attacks have two major limitations, i.e., expensive query cost and being easy to detect. To bridge the...
Cognition may be improved by the active ingredients of the Yiqi Qingre Ziyin method in patients with atrophic rhinitis (AR). This study aimed to identify potential targets of the Yiqi Qingre Ziyin method for the treatment of patients with cognitive impairment. Nasal mucosal tissue samples from patients with AR were subjected to proteomic assays, an...
Information regarding the function of Melilotus officinalis (L.) Pall. in skeletal muscles is still unknown. In this study, we explored the possible regulatory targets of M. (L.) Pall. that affects the repair patterns in chronic muscle injury. We analyzed the potential target genes and chemical composition of M. (L.) Pall. and constructed a “drug-c...
Owing to the fact that luteolin has antibacterial activity against Staphylococcus aureus (S. aureus) and methicillin-resistant S. aureus (MRSA), its specific mechanism in MRSA is worthy of investigation, which is the focus of this study. Initially, the collected S. aureus strains were treated with luteolin. Then, the minimum inhibitory concentratio...
Exercise is crucial for preventing Alzheimer’s disease (AD), although the exact underlying mechanism remains unclear. The construction of an accurate AD risk prediction model is beneficial as it can provide a theoretical basis for preventive exercise prescription. In recent years, necroptosis has been confirmed as an important manifestation of AD,...
The activation of pancreatic stellate cells (PSCs) is the key mechanism of pancreatic fibrosis, which can lead to β-cell failure. Oxidative stress is an important risk factor for PSC activation. There is no direct evidence proving if administration of glutathione can inhibit fibrosis and β-cell failure. To explore the role of glutathione in pancrea...
Background
Nemolizumab is deemed as a promising drug for atopic dermatitis (AD) patients with pruritus.
Objective
This study aimed to evaluate the efficacy of nemolizumab in treating patients with AD and the association between the dosage or regimen of nemolizumab with the improvement in clinical indices.
Methods and Materials
PubMed, Embase, and...
Background: The primary purpose of this study is to develop diabetic retinopathy (DR) hazard nomogram in a Chinese sample of type 2 diabetes mellitus patients (T2DM).
Methods: From January 2018 to May 2020, we constructed a model containing 213 diabetic retinopathy patients, and we used the basic statistics and biochemical indicator test to assess...
With Deep Neural Network (DNN) being integrated into a growing number of critical systems with far-reaching impacts on society, there are increasing concerns on their ethical performance, such as fairness. Unfortunately, model fairness and accuracy in many cases are contradictory goals to optimize. To solve this issue, there has been a number of wo...
Background: Plant chloroplast DNA (cpDNA) typically has a circular structure, including a large single-copy region (LSC), a small single-copy region (SSC) and two inverted repeats (IR1 and IR2). The organization of these four elementary regions LSC-IR1-SSC-IR2 is highly conserved across all plant cpDNAs. Only very a few structural variations (SVs)...
People are not always receptive to their voice data being collected and misused. Training the audio intelligence systems needs these data to build useful features, but the cost for getting permissions or purchasing data is very high, which inevitably encourages hackers to collect these voice data without people's awareness. To discourage the hacker...
Among all the complications of diabetes, diabetic nephropathy is a significant factor causing the end-stage renal disease associated with high death rates. Current treatment fails to produce an ideal outcome. Thus, searching for a new preventive drug is urgently needed. Liuwei Dihuang pill (LDP), a popular ancient Chinese medicine (TCM) prescriptio...
A metal‐insulator‐semiconductor high‐electron‐mobility transistors (MIS‐HEMT) with Al2O3 /SiNx (SiNx next to semiconductor) double insulators is proposed to obtain lower gate leakage and lower current collapse simultaneously and is comparatively studied in this paper. SiNx directly next to the (Al)GaN induces less interface traps and provides bette...
Hui An Zhang Jitai Ting Li- [...]
Ming Li
In the early stage of coronavirus disease 2019 (COVID-19), most cases are identified as mild or moderate illnesses. Approximately 20% of hospitalised patients become severe or critical at the middle or late stage of the disease. The predictors and risk factors for prognosis in those with mild or moderate disease remain to be determined. Of 694 pati...
Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos. It is natural to ask which are the top performers among the existing deepfake detection approaches to identify promising research directions and provide practical guidance. Unfortunately, it's difficu...
Dementias is a kind of neurodegenerative disease, which occurs among the aging population. Current therapeutic outcome for dementia is limited. The medical use of herbal plant has a rich history in traditional Chinese medicine practice for thousands of years. Herbal medicine (HM) may provide a positive effect for prevention and treatment in dementi...
Objective
To identify the genetic mechanisms of immunosuppression-related genes implicated in ischemic stroke.BackgroundA better understanding of immune-related genes (IGs) involved in the pathophysiology of ischemic stroke may help identify drug targets beneficial for immunomodulatory approaches and reducing stroke-induced immunosuppression compli...
MicroRNAs (miRNAs) have been extensively studied as circulating biomarkers for early diagnosis and prognosis of many human diseases. However, it has been found challenging to accurately detect and quantify the trace amounts of miRNAs in biological samples. Herein, we propose a generic and non-enzymatic electrochemical strategy integrated molecular...
Network Function Virtualization (NFV) is a new networking paradigm to enable dynamic network function deployment in networks. Existing studies focused on optimized function deployment and management in NFV. Unfortunately, these studies did not well address the problem of efficient security function enforcement in networks, which is the goal of depl...
Decentralized storage (DS) projects such as Filecoin are gaining traction. Their openness mandates effective auditing mechanisms to assure users that their data remains intact. A blockchain is typically employed here as an unbiased public auditor. While the case for static data is relatively easy to handle, on-chain auditing of dynamic data with pr...
Federated learning enables distributed training of deep learning models among user equipment (UE) to obtain a high-quality global model. A centralized server aggregates the updates submitted by UEs without knowledge of the local training data or process. Despite its privacy preserving merit, we reveal a severe security concern. Malicious UEs can ma...
PIN authentication is widely used on mobile devices due to its usability and simplicity. However, it is known to be susceptible to shoulder surfing attacks, where an adversary spies the user’s PIN by direct human observation or camera-based recording. This paper proposes PressPIN, a novel enhanced PIN authenticator on mobile devices by sensing pres...
Voice authentication is increasingly used for sensitive operations in mobile devices. However, voice biometrics focuses on distinguishing individuals by their spectral features, which cannot deal with spoofing attacks. In this paper, we design and implement a novel software-only anti-spoofing system on smartphones. Our system leverages the pop nois...
The federated learning framework is designed for massively distributed training of deep learning models among thousands of participants without compromising the privacy of their training datasets. The training dataset across participants usually has heterogeneous data distributions. Besides, the central server aggregates the updates provided by dif...
To keep web users away from unsafe websites, modern web browsers enable the embedded feature of safe browsing (SB) by default. In this work, through theoretical analysis and empirical evidence, we reveal two major shortcomings in the current SB infrastructure. Firstly, we derive a feasible tracking technique for industry best practice. We show that...
Nowadays, many edge computing service providers expect to leverage the computational power and data of edge nodes to improve their models without transmitting data. Federated learning facilitates collaborative training of global models among distributed edge nodes without sharing their training data. Unfortunately, existing privacy-preserving feder...
Behavioral biometrics has been widely investigated and deployed in real world scenarios for human authentication. However, there has been almost nil attempt to identify behavior patterns in a cross-scenario setting, which is common in practice and needs urgent attention. This paper defines and investigates cross-scenario behavioral biometrics authe...
Mobile two-factor authentication (TFA), which uses mobile devices as a second security layer to online accounts, has been widely applied with the proliferation of mobile phones. Currently, many studies propose to use acoustic fingerprints as the second factor. However, these solutions ignore the variations of the extracted static acoustic fingerpri...
Objective:
Galectin-3, an inflammatory mediator derived from microglia, participates in the pathophysiological process of various neurological diseases. However, the relationship between galectin-3 and poststroke cognitive impairment (PSCI) remains ambiguous. This research purposed to prove whether serum galectin-3 can predict PSCI.
Methods:
In...
The effect of nitrogen flow and growth temperature on extension of GaN on Si substrate has been studied. By increasing the nitrogen flow whose outlet is located in the center of the MOCVD (metal–organic chemical vapor deposition) gas/particle screening flange and by increasing the growth temperature of HT-AlN and AlGaN buffer layers near the primar...
The uncontrolled inflammatory response caused by a disorder in inflammation resolution is one of the reasons for acute respiratory distress syndrome (ARDS). The macrophage pool markedly expands when inflammatory monocytes, known as recruited macrophages, migrate from the circulation to the lung. The persistent presence of recruited macrophages lead...
This case illustrates the untypical presentation of primary bladder malacoplakia. The patient was in her mid-50s have impaired immunity by the long-term hyperglycemic condition. She presented with symptoms of urinary tract infection and dysuria, and had multiple nodulars in bladder and significantly mass in urethra. Although the diagnosis of bladde...
Network function virtualization (NFV) has been promising to improve the availability, programmability, and flexibility of network function deployment and communication facilities. Meanwhile, with the advancements of cloud technologies, there has been a trend to outsource network functions through virtualization to a cloud service provider, so as to...
State-of-the-art AlGaN/GaN high electron mobility structures were grown on semi-insulating 4H-SiC substrates by MOCVD and X-band microwave power high electron mobility transistors were fabricated and characterized. Hall mobility of 2291.1 cm ² /(V·s) and two-dimensional electron gas density of 9.954 × 10 ¹² cm –2 were achieved at 300 K. The HEMT de...