Advanced search    

Search: authors:"Jing Tang"

9 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Propofol inhibits parthanatos via ROS–ER–calcium–mitochondria signal pathway in vivo and vitro

• PubMed • Google Scholar Search for Youtan Liu in:Nature Research journals • PubMed • Google Scholar Search for Zhifeng Liu in:Nature Research journals • PubMed • Google Scholar Search for Jing Tang ... in:Nature Research journals • PubMed • Google Scholar Conflict of interest The authors declare that they have no conflict of interest. Corresponding authors Correspondence to Zhifeng Liu or Jing Tang

Increased autophagy in EOC re-ascites cells can inhibit cell death and promote drug resistance

, Harbin, ChinaYu Liu, Jing Tang, Duanyang Liu, Lei Zhang, Yan He, Dai Tang & Xiaoming JinElectron Microscopic Center, Harbin Medical University, Harbin, ChinaJing Li & Lei GaoDepartment of Gynecology, Tumor ... Hospital of Harbin Medical University, Harbin, ChinaDan Kong AuthorsSearch for Yu Liu in:Nature Research journals • PubMed • Google Scholar Search for Jing Tang in:Nature Research journals • PubMed

MicroRNA-378 protects against intestinal ischemia/reperfusion injury via a mechanism involving the inhibition of intestinal mucosal cell apoptosis

Shihong Wen Xi Yao Weifeng Liu Jiantong Shen Wentao Deng Jing Tang Cai Li Kexuan Liu Intestinal ischemia/reperfusion (I/R) injury remains a major clinical event and contributes to high morbidity and

A Novel Logic for Analyzing Electronic Payment Protocols

A novel formal method which can be used to analyze security properties such as accountability, fairness and timeliness in electronic payment protocols is proposed. The novel method extends Qing-Zhou approach based on logic reasoning by adding a simple time expression and analysis method. It increases the ability to describe the event time, and extends the time characteristics of...

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network

With the development of the Internet, malwares have also been expanded on the network systems rapidly. In order to deal with the diversity and amount of the variants, a number of automated behavior analysis tools have emerged as the time requires. Yet these tools produce detailed behavior reports of the malwares, it still needs to specify its category and judge its criticality...

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network

With the development of the Internet, malwares have also been expanded on the network systems rapidly. In order to deal with the diversity and amount of the variants, a number of automated behavior analysis tools have emerged as the time requires. Yet these tools produce detailed behavior reports of the malwares, it still needs to specify its category and judge its criticality...