Jianyi Zhang
Cited by
Cited by
Myocardial tissue engineering with cells derived from human-induced pluripotent stem cells and a native-like, high-resolution, 3-dimensionally printed scaffold
L Gao, ME Kupfer, JP Jung, L Yang, P Zhang, Y Da Sie, Q Tran, V Ajeti, ...
Circulation research 120 (8), 1318-1325, 2017
Engineering human ventricular heart muscles based on a highly efficient system for purification of human pluripotent stem cell-derived ventricular cardiomyocytes
B Li, H Yang, X Wang, Y Zhan, W Sheng, H Cai, H Xin, Q Liang, P Zhou, ...
Stem Cell Research & Therapy 8 (1), 1-18, 2017
Y-27632 preconditioning enhances transplantation of human-induced pluripotent stem cell-derived cardiomyocytes in myocardial infarction mice
M Zhao, C Fan, PJ Ernst, Y Tang, H Zhu, S Mattapally, Y Oduk, ...
Cardiovascular research 115 (2), 343-356, 2019
Quantitative proteomics and immunohistochemistry reveal insights into cellular and molecular processes in the infarct border zone one month after myocardial infarction
L Yang, ZR Gregorich, W Cai, P Zhang, B Young, Y Gu, J Zhang, Y Ge
Journal of proteome research 16 (5), 2101-2112, 2017
A real-time automatic detection of phishing URLs
J Zhang, Y Wang
Proceedings of 2012 2nd International Conference on Computer Science and …, 2012
A prior-based transfer learning method for the phishing detection
J Zhang, Y Ou, D Li, Y Xin
Journal of Networks 7 (8), 1201, 2012
Efficient and provable security searchable asymmetric encryption in the cloud
J Zhang, C Song, Z Wang, T Yang, W Ma
IEEE Access 6, 68384-68393, 2018
Honeynet construction based on intrusion detection
Z Wang, G Li, Y Chi, J Zhang, Q Liu, T Yang, W Zhou
Proceedings of the 3rd International Conference on Computer Science and …, 2019
No one can escape: A general approach to detect tampered and generated image
K Zhang, Y Liang, J Zhang, Z Wang, X Li
IEEE Access 7, 129494-129503, 2019
URL based gateway side phishing detection method
J Zhang, Y Pan, Z Wang, B Liu
2016 IEEE Trustcom/BigDataSE/ISPA, 268-275, 2016
Parsing and detecting phishing pages based on semantic understanding of text
J Zhang, Q Li, Q Wang, T Geng, X Ouyang, Y Xin
Journal of Information &Computational Science 9 (6), 1521-1534, 2012
Long-term preservation of myocardial energetic in chronic hibernating myocardium
MN Jameel, Q Li, A Mansoor, Q Xiong, C Swingen, J Zhang
American Journal of Physiology-Heart and Circulatory Physiology 300 (3 …, 2011
Android malware detection based on convolutional neural networks
Z Wang, G Li, Y Chi, J Zhang, T Yang, Q Liu
Proceedings of the 3rd International Conference on Computer Science and …, 2019
DGA and DNS covert channel detection system based on machine learning
Z Wang, H Dong, Y Chi, J Zhang, T Yang, Q Liu
Proceedings of the 3rd International Conference on Computer Science and …, 2019
Security of medical cyber-physical systems: An empirical study on imaging devices
Z Wang, P Ma, X Zou, J Zhang, T Yang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
Secure medical data collection via local differential privacy
Z Wang, P Ma, R Wang, J Zhang, Y Chi, Y Ma, T Yang
2018 IEEE 4th International Conference on Computer and Communications (ICCC …, 2018
Medical devices are at risk: Information security on diagnostic imaging system
Z Wang, P Ma, Y Chi, J Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
DICOM-Fuzzer: Research on DICOM vulnerability mining based on Fuzzing technology
Z Wang, Q Li, Q Liu, B Liu, J Zhang, T Yang, Q Liu
Communications and Networking: 14th EAI International Conference, ChinaCom …, 2020
Medical protocol security: Dicom vulnerability mining based on fuzzing technology
Z Wang, Q Li, Y Wang, B Liu, J Zhang, Q Liu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Effective metabolic approaches for the energy starved failing heart: Bioenergetic resiliency via redundancy or something else?
J Zhang, ED Abel
Circulation research 123 (3), 329-331, 2018
The system can't perform the operation now. Try again later.
Articles 1–20