Resource Type

Journal Article 224

Conference Videos 5

Year

2023 27

2022 25

2021 24

2020 15

2019 14

2018 15

2017 17

2016 26

2015 13

2014 7

2013 6

2012 4

2011 4

2010 5

2009 3

2008 3

2007 4

2006 2

2005 2

2004 2

open ︾

Keywords

food security 39

energy security 19

China 7

sustainable development 7

Physical layer security 5

cyberspace security 5

security 5

water security 4

Internet of Things (IoT) 3

Network security 3

Security 3

industrial Internet security 3

Artificial intelligence (AI) 2

Block cipher 2

Embedded security 2

Encryption 2

Lightweight cryptography 2

Moving target defense 2

Provable security 2

open ︾

Search scope:

排序: Display mode:

Cyberspace Endogenous Safety and Security Article

Jiangxing Wu

Engineering 2022, Volume 15, Issue 8,   Pages 179-185 doi: 10.1016/j.eng.2021.05.015

Abstract:

Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficultso-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenousit is necessary to develop or utilize the endogenous security functions of the system architecture itselfIn addition, this paper gives a definition for and lists the main technical characteristics of endogenoussafety and security in cyberspace, introduces endogenous security mechanisms and characteristics based

Keywords: Cyberspace endogenous security problem     Uncertain threat     Cyberspace endogenous safety and security    

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 106-115 doi: 10.15302/J-SSCAE-2023.06.018

Abstract: regions such as the United States and Europe to implement digital transformation and address network securitydigital technologies based on the cyber resilience standard and to improve the digital infrastructure securitythe study goes further to propose a dynamic heterogeneous redundancy architecture based on an endogenoussecurity and safety (ESS) theory.nbsp;with Chinese characteristics, establish corresponding regulatory systems to clarify the network security

Keywords: cyberspace     endogenous safety and security     cyber resilience     structure encryption     dynamic heterogeneous    

Discussion on a new paradigm of endogenous security towards 6G networks Review

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1421-1450 doi: 10.1631/FITEE.2200060

Abstract:

The sixth-generation mobile communication (6G) networks will face more complex endogenous securityto deal with the "unknown unknown" security threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the visionof 6G cyberspace security.of endogenous security and traditional security.

Keywords: 6G security     New paradigm of endogenous security     Core network     Wireless access network    

Stem cell niches and endogenous electric fields in tissue repair

Li LI, Jianxin JIANG

Frontiers of Medicine 2011, Volume 5, Issue 1,   Pages 40-44 doi: 10.1007/s11684-011-0108-z

Abstract: Endogenous adult stem cells reside in certain regions of organs, known as the stem cell niche, whichregulatory factors are involved in the stem cell-based repair process, including stem cell niches and endogenousHere we briefly review the role of stem cell niches and endogenous electric fields in tissue repair,and hypothesize that endogenous electric fields become part of stem cell niche in the wound site.

Keywords: stem cell     stem cell niche     electric field     tissue repair    

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 15-21 doi: 10.15302/J-SSCAE-2021.02.003

Abstract: definable technology, polymorphic addressing and routing technology, network intelligence technology, and endogenoussecurity structure.

Keywords: network architecture,full-dimension definable,polymorphic addressing and routing,network intelligence, endogenoussecurity structure    

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014

Abstract: control of network, storage, and computing, intelligent arrangement of service functions, and endogenoussecurity structure, as well as demonstration applications in the smart park network, vertical industry

Keywords: protocol     integration of network     storage     and computing     intelligent arrangement of service functions     endogenoussecurity    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Spillover effect of environmental investment: evidence from panel data at provincial level in China

Qunhui LIN, Guanyi CHEN, Wencui DU, Haipeng NIU

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 3,   Pages 412-420 doi: 10.1007/s11783-012-0392-0

Abstract: This paper considers pollution density as a function of environmental investment. The higher environmental investment, the lower pollution density. The lower the pollution density is the higher production technology becomes. This is called the spillover effect. We collected China’s panel data at the provincial level from 2005 to 2009, and tested the spillover effect of environmental investment. This paper finds that the environmental investment influenced production technology positively. There is a significant positive relation between government expenditure and spillover effect.

Keywords: environmental investment     spillover effect     endogenous growth    

Endogenous tissue factor pathway inhibitor in vascular smooth muscle cells inhibits arterial thrombosis

Jichun Yang, Kaiyue Jin, Jiajun Xiao, Jing Ma, Duan Ma

Frontiers of Medicine 2017, Volume 11, Issue 3,   Pages 403-409 doi: 10.1007/s11684-017-0522-y

Abstract: However, the role of endogenous TFPI in vascular smooth muscle cells (VSMCs) in thrombosis and vascularTaken together, these data indicated that endogenous TFPI from VSMCs inhibited ferric chloride–

Keywords: arterial thrombosis     conditional knockout mice     tissue factor pathway inhibitor     vascular smooth muscle cells    

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4,   Pages 467-477 doi: 10.15302/J-FASE-2020320

Abstract: Ecological security comprehensively reflects the heath and integrity of an ecosystem, and it is broadlydefined as the security state of a complex artificial ecosystem composed of natural, economic and socialEcological security determines the potential for sustainable development in Africa, especially with itsHowever, there is a lack of information on the ecological security state of the continent as a whole.In general, African countries showed relatively good ecological security.

Keywords: Africa     ecological security     evaluation system     PSR model    

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 787-793 doi: 10.1007/s11783-013-0526-z

Abstract: living standards and food consumption will require an integrated approach where food, water and energy securityIn this paper we examine water, energy and food security and their couplings.

Keywords: water security     energy security     food security     water-energy nexus     water conflicts    

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5,   Pages 678-691 doi: 10.1007/s11783-012-0450-7

Abstract: Water environment security (WES) is defined in terms of three aspects: first, that it meets basic demandsLimitations associated with current water environment security indicators in China — including inefficiencyprocedures used to assess the risks associated with poor management practices relating to water environment securityas well as design an appropriate water environment security indicator system.

Keywords: water environment security     supervision and management     monitoring parameter     indicator system     Suzhou    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

Programming CAR T cells to enhance anti-tumor efficacy through remodeling of the immune system

Xiaohui Wang, Zhiqiang Wu, Wei Qiu, Ping Chen, Xiang Xu, Weidong Han

Frontiers of Medicine 2020, Volume 14, Issue 6,   Pages 726-745 doi: 10.1007/s11684-020-0746-0

Abstract: Mobilization of endogenous immune cells is also necessary for CAR T cells to obtain their optimal therapeuticwith CAR T cells acting as cellular carriers to deliver immunomodulators to tumors to mobilize the endogenous

Keywords: CAR T cells     immunoregulatory molecules     endogenous immune response     solid malignancies    

Title Author Date Type Operation

Cyberspace Endogenous Safety and Security

Jiangxing Wu

Journal Article

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Journal Article

Discussion on a new paradigm of endogenous security towards 6G networks

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Journal Article

Stem cell niches and endogenous electric fields in tissue repair

Li LI, Jianxin JIANG

Journal Article

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Journal Article

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Journal Article

Soil security and global food security

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Spillover effect of environmental investment: evidence from panel data at provincial level in China

Qunhui LIN, Guanyi CHEN, Wencui DU, Haipeng NIU

Journal Article

Endogenous tissue factor pathway inhibitor in vascular smooth muscle cells inhibits arterial thrombosis

Jichun Yang, Kaiyue Jin, Jiajun Xiao, Jing Ma, Duan Ma

Journal Article

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Journal Article

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Journal Article

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Programming CAR T cells to enhance anti-tumor efficacy through remodeling of the immune system

Xiaohui Wang, Zhiqiang Wu, Wei Qiu, Ping Chen, Xiang Xu, Weidong Han

Journal Article