
Citation: Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang. Secure data storage based on blockchain and coding in edge computing[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091
[1] | Jun Wang, Mingzhi Gong, Zhenggang Xiong, Yangyang Zhao, Deguo Xing . Immune-related prognostic genes signatures in the tumor microenvironment of sarcoma. Mathematical Biosciences and Engineering, 2021, 18(3): 2243-2257. doi: 10.3934/mbe.2021113 |
[2] | Rongxing Qin, Lijuan Huang, Wei Xu, Qingchun Qin, Xiaojun Liang, Xinyu Lai, Xiaoying Huang, Minshan Xie, Li Chen . Identification of disulfidptosis-related genes and analysis of immune infiltration characteristics in ischemic strokes. Mathematical Biosciences and Engineering, 2023, 20(10): 18939-18959. doi: 10.3934/mbe.2023838 |
[3] | Sidan Long, Shuangshuang Ji, Kunmin Xiao, Peng Xue, Shijie Zhu . Prognostic and immunological value of LTB4R in pan-cancer. Mathematical Biosciences and Engineering, 2021, 18(6): 9336-9356. doi: 10.3934/mbe.2021459 |
[4] | Siyuan Tian, Yinan Hu, Chunmei Yang, Jiahao Yu, Jingyi Liu, Guoyun Xuan, Yansheng Liu, Keshuai Sun, Miao Zhang, Shuoyi Ma, Yulong Shang, Xia Zhou, Ying Han . A novel immune checkpoint-related gene signature for hepatocellular carcinoma to predict clinical outcomes and therapeutic response. Mathematical Biosciences and Engineering, 2022, 19(5): 4719-4736. doi: 10.3934/mbe.2022220 |
[5] | Jing Cao, Hui Gan, Han Xiao, Hui Chen, Dan Jian, Ning Jiang, Xuan Zhai . Key protein-coding genes related to microglia in immune regulation and inflammatory response induced by epilepsy. Mathematical Biosciences and Engineering, 2021, 18(6): 9563-9578. doi: 10.3934/mbe.2021469 |
[6] | Yuanqian Yao, Jianlin Lv, Guangyao Wang, Xiaohua Hong . Multi-omics analysis and validation of the tumor microenvironment of hepatocellular carcinoma under RNA modification patterns. Mathematical Biosciences and Engineering, 2023, 20(10): 18318-18344. doi: 10.3934/mbe.2023814 |
[7] | Chenyang Jiang, Weidong Jiang . AGTR1, PLTP, and SCG2 associated with immune genes and immune cell infiltration in calcific aortic valve stenosis: analysis from integrated bioinformatics and machine learning. Mathematical Biosciences and Engineering, 2022, 19(4): 3787-3802. doi: 10.3934/mbe.2022174 |
[8] | Xin Lin, Xingyuan Li, Binqiang Ma, Lihua Hang . Identification of novel immunomodulators in lung squamous cell carcinoma based on transcriptomic data. Mathematical Biosciences and Engineering, 2022, 19(2): 1843-1860. doi: 10.3934/mbe.2022086 |
[9] | Jie Chen, Jinggui Chen, Bo Sun, Jianghong Wu, Chunyan Du . Integrative analysis of immune microenvironment-related CeRNA regulatory axis in gastric cancer. Mathematical Biosciences and Engineering, 2020, 17(4): 3953-3971. doi: 10.3934/mbe.2020219 |
[10] | Xiangyue Zhang, Wen Hu, Zixian Lei, Hongjuan Wang, Xiaojing Kang . Identification of key genes and evaluation of immune cell infiltration in vitiligo. Mathematical Biosciences and Engineering, 2021, 18(2): 1051-1062. doi: 10.3934/mbe.2021057 |
Osteosarcoma is the most common type of malignant bone tumors that appears most frequently in children and young adults. It usually starts in the femur, the tibia and the humerus, and less commonly the skull, the jaw or the pelvis [1]. There are some risk factor such as age, height, gender, and heritable syndromes that predispose to for osteosarcoma, however, the cause of osteosarcomas is still not clear [2].
Although neoadjuvant chemotherapy in treatment of osteosarcoma has shown better results, overall survival of patients with metastasis still remains in low rate in the last three decades [3,4]. Immunotherapy and targeted therapy have recently shown significant improvements for some malignancies [5,6]. Therefore, they are increasingly attractive treatment options for ostesarcoma patients. However, they are not effective for many patients and there is no evidence that proves the effectiveness of a specific molecular target [7].
It has been shown in many studies that cancer cells and tumor infiltrating immune cells (TIICs) have an important role in cancer progression and determination of malignant tumor types [8,9,10]. CD8 T cells, which is an important component of TIICs, has been found to associate with better clinical outcomes and response to immunotherapy in many cancer types [11,12]. Treatments that includes the antitumor immunocompetence of innate immune cells, which includes NK cells and γδ T cells, are found favorable for osteosarcoma tumors [13,14]. These studies show the importance of finding further biomarkers of tumor cells such as PD-1 and CTLA-4 and of tumor infiltrating immune cells such as T cells and Macrophages to improve new treatment strategies and to choose the best treatment strategy for osteosarcoma patients.
Several computational methods, alternative ways to immunohistochemistry and flow cytometry [15], have been recently developed to derive tumor immune infiltrates using gene expression profiles of bulk tumors. In this study, we use the latest popular deconvolution method [16,17,18,19,20], CIBERSORTx [21], to investigate the immune patterns of tumors and analyze the relationship between immune composition and clinical features of osteosarcoma patients.
There have been many other studies that utilize a deconvolution method to study the tumor microenvironment of osteosarcoma. A number of them use the estimated immune infiltrations calculated using CIBERSORT and/or immune scores calculated using ESTIMATE to find immune-related genes that can predict the prognosis of osteosarcoma [22,23,24,25]. Another set of studies find genes with prognostic values by applying Cox model on survival data or performing differentially expressed genes analysis between two groups of interest, and then investigate the relationship between these genes and estimated immune infiltrates [26,27,28,29,30]. Others study the association of immune abundance with clinical information directly [24,31,32,33,34]. Our work falls somewhat into the third category.
Among the studies that directly investigate the relationship between immune infiltrations and clinical information, three of them use TARGET data set [24,31,33], one uses data from GSE21257 [32], and one uses data from GSE39058 [34]. Most of these studies use CIBERSORT [24,32,33,34], while the other uses ssGSEA and ImmuCellAI along with expression of immune marker genes to get estimated abundance of immune cells [31]. Our study, on the other hand, utilizes the latest and best performing version of deconvolution methods called CIBERSORTx B-mode, and conducts our analyses on both TARGET data set and GSE21257 data set. We also perform K-means clustering using the estimated immune abundance to study the clinical characteristics of different immune patterns in osteosarcoma. Another study has used hierarchical clustering on immune abundance, but they estimate immune abundance using ssGSEA and do not focus on the clinical difference between clusters [35].
The gene expression data sets in this study are obtained from 2 cohorts: TARGET (cohort 1) and GSE21257 (cohort 2). Cohort 1 includes FPKM normalized RNA-seq data of 88 osetosarcoma patients downloaded from the UCSC Xena web portal and their corresponding clinical data downloaded from the GDC data portal. Cohort 2 includes microarray data and corresponding clinical features of 53 osteosarcoma samples, downloaded from GEO website. Cohort 2's gene expression data were previously normalized with robust spline normalization before being downloaded.
We calculate the relative frequencies of 22 immune cell types by applying CIBERSORTx [21] B-mode algorithm with immune signature matrix LM22 on gene expression data from both cohort 1 and 2. CIBERSORTx is the latest version of CIBERSORT (Cell type Identification By Estimating Relative Subsets Of RNA Transcripts) [36], where batch correction method Combat has been introduced in the algorithm to reduce the effect of cross-platform variation between gene expression data and signature matrix. There are 2 modes of this algorithm: B-mode and S-mode, whose difference lies in the way batch correction is applied in the algorithm. Our recent study has shown that CIBERSORTx B-mode gives good estimates of immune abundance in both RNA-Seq and microarray data with the use of LM22, and in fact outperforms CIBERSORT and other tumor deconvolution methods [16]. We obtain estimated immune fractions by running the algorithm on their website with 100 permutations. Similar to CIBERSORT, CIBERSORTx outputs a p-value for each deconvolved sample as an indicator of confidence of the results. We use samples with p-value less than 0.05 for analyses in this study.
To calculate the abundance of each cell type, which has several subtypes with a small abundance, we sum the proportions of their subtypes obtained from CIBERSORTx. The abundance of B cells is the summation of naive and memory B cells; NK cell is the summation of resting and activated NK cells; Mast cells is the summation of resting and activated Mast cells; Dendritic cells is the summation of resting and activated Dendritic cells; and CD4 T cells is the summation of follicular helper T cells, regulatory T cells, naive CD4 T cells, resting and activated memory CD4 T cells. We do not combine subtypes of Macrophages because M1 and M2 Macrophages have very different functions and Macrophages make up the majority of immune cells in osteosarcoma.
We then use K-means clustering to identify various immune patterns of osteosarcoma based on the estimated immune cells' abundance. The number of clusters in K-means is determined using elbow method. A t-SNE visualization of the clusters is also included to see how well K-means algorithm distinguishes between samples with different immune patterns.
Immune scores of all samples in cohort 1 and 2 are computed from ESTIMATE algorithm [37]. In order to do so, we run estimate package locally from R. We also divide all patients from both cohorts into low immune score and high immune score group using the median immune score as cut-off to study the relationship between immune score and survival outcome.
Chi-square test is used to analyze the relationship between categorical variables in this study. We employ Mann-Whitney-Wilcoxon test to detect any significant difference between groups of continuous variables, such as immune fractions, gene expression, age and immune score. Pearson correlation and corresponding p-value are used to study the correlation between different immune infiltrates.
To investigate the impact of immune infiltrates on survival, for each immune cell, we split all patients into high and low abundance group using the median value as cut-off and perform log-rank test to find significant difference in survival between groups. Kaplan-Meier curves are also plotted to visualize the differences between these groups.
All analyses in this study are conducted on all samples in both cohorts 1 and 2, except for metastasis-free survival analysis which is applied only on cohort 2 since cohort 1 does not include data on the time of metastasis development. All statistical analyses and visualizations are carried out in Python.
Results of CIBERSORTx B-mode on gene expression profiles of 141 osteosarcoma patients (cohorts 1 and 2) demonstrates that M0 Macrophages is the most frequent immune cell in osteosarcoma tumors with an average of 40% of total immune cells, followed by M2 Macrophages and CD4 T cells (Figure 1B, C). Unsupervised hierarchical clustering of immune cell fractions shows that most abundant cells tend to be clustered together, as is shown in Figure 1A, where M0 and M2 Macrophages are clustered together and then grouped with CD4 T cells and other immune cells. In addition, the most frequent cells also have the highest variation in abundance across osteosarcoma tumors (Figure 1B).
According to the CIBERSORTx B-mode results, abundance of CD8 T cells is negatively correlated with M0 Macrophages and positively correlated with M1 Macrophages with Pearson correlation coefficients of -0.62 and 0.55, with p-values of 4.8e-16 and 1.1e-12, respectively (Figure 1E). The proportion of γδ T cells is also significantly negatively correlated with CD4 T cells and NK cells (Pearson coefficients of -0.6 and -0.62, with p-values of 4.3e-15 and 1.8e-16). Interestingly, frequencies of M0 and M1 Macrophages exhibit a negative correlation of -0.61 with p-value 1e-15.
K-means clustering of immune cell proportions in osteosarcoma tumors indicates the existence of three distinct immune classes (Figure 1D), namely: Cluster 1, which has the highest proportions of CD8 T cells, γδ T cells, M1 Macrophages, Mast cells and Plasma cells and the lowest proportion of M0 Macrophages; Cluster 2, in which the percentage of M0 Macrophages is the highest; and Cluster 3, which has the highest percentage of M2 Macrophages. A t-SNE plot of immune cell proportions suggests that K-means clustering algorithm successfully separates osteosarcoma patients with different immune patterns (Figure 1G).
While there is no significant difference in gender, age and proportion of metastasis at diagnosis between clusters (Figure 2A, B, F), we observe some differences in survival outcomes among clusters.
Kaplan-Meier curves indicate that cluster 2 has the worst survival probability throughout time out of all clusters (Figure 2G). In addition, cluster 2, along with cluster 1, has higher percentage of dead patients at the last time of follow up than cluster 3 (Figure 2C). Interestingly, cluster 2 also has the lowest immune scores compared to other clusters (Figure 1F).
Cluster 3 appears to have the best outcome among clusters. It has the lowest percentage of dead patients at the last time of follow up among all clusters (Figure 2C), and better survival rate than cluster 2 over time (Figure 2G) with p-value 0.07 from the log-rank test.
Cluster 1, which has the highest amount of CD8 T cells, γδ T cells, M1 Macrophages and Mast cells, has slightly better overall survival time than cluster 2 (p = 0.16, Figure 2G). However, cluster 1 seems to have worse outcome than cluster 3 due to its higher percentage of dead patients at the last time of follow up (Figure 2C). It is worth noting that there is no significant difference in the survival rate between cluster 1 and 3 according to the log-rank test (p = 0.5, Figure 2G).
The Chi-square test and Mann-Whitney-Wilcoxon test show a relationship between metastasis at diagnosis and vital status (p = 0.001, Figure 2H), Huvos grade, which is a grading system to evaluate a patient's response to chemotherapy based on the percentage of necrosis in the tumor after treatment, and vital status (p = 0.036, Figure 2I), and between gender and age (p = 2.3e-4, Figure 2K) where male patients are older on average. We observe that patients with metastasis at diagnosis have much higher percentage of being dead at the last time of follow up than patients without metastasis (Figure 2H). This makes perfect sense since metastases have been known to associate with late stages of tumor and poor prognosis in many cancers. The other clinical feature with a relation to vital status is Huvos grade. Higher percentage of patients with high Huvos grade (3-4) are alive at the last time of follow up than patients with low Huvos grade (1-2) (Figure 2I), which is reasonable since a high Huvos grade means good response to chemotherapy. Figure 2J suggests that primary osteosarcoma tumors in the arm respond more poorly to chemotherapy than leg tumors, as illustrated by the high proportion of Huvos grade 1-2 in arm tumors. However, it is important to note that primary osteosarcoma tumors happen more often in the leg than in the arm (Figure 2E), and the observation in Figure 2J is based on a small number of arm tumor samples (n = 8), thus the relationship between tumor location and Huvos grade is not considered significant by the Chi-square test (p = 0.18).
Figure 3D indicates no clear difference in immune score between alive and dead patients at the last time of follow up. However, Kaplan-Meier curves of high and low immune score with a median cut-off reveal that the high immune score group has a better outcome (Figure 3E). The log rank test supports this observation with a p-value of 0.03. Thus, higher immune score is associated with better survival probability throughout time. This is consistent with the observation of outcome in the clusters. Cluster 2 has significantly lower immune score than cluster 1 and 3 (Figure 1F), with p-values of 5e-9 and 2.1e-5 from Mann-Whitney-Wilcoxon test, and accordingly worse overall survival probability over time than cluster 1 and 3 (Figure 2G). Cluster 1, with the highest average immune score among clusters (Figure 1F), even though has about the same proportion of dead patients at the last time of follow up as cluster 2 (Figure 2C), shows better survival time than cluster 2 (Figure 2G).
The Mann-Whitney-Wilcoxon test shows that there is a significant difference in the level of γδ T cells and Mast cells between alive and dead patients at the last time of follow up, with p-values of 0.045 and 0.022, where dead patients are associated with higher percentages of γδ T cells and Mast cells than alive patients (Figure 3A). Dendritic cells, NK cells and CD8 T cells also seem to associate with survival status in osteosarcoma. We observe higher level of NK cells (p = 0.063), CD8 T cells (p = 0.1) and lower level of Dendritic cells (p = 0.052) in alive patients than in dead patients (Figure 3A).
Kaplan-Meier curves (Figure 3B, C, F) and the log rank test indicate an association between survival outcomes and levels of Dendritic cells, M0 Macrophages and CD8 T cells, with a p-value of 0.01, 0.04 and 0.04, respectively. Low Dendritic cells, low M0 Macrophages and high CD8 T cells are associated with better survival probability over time in osteosarcoma patients. This is again consistent with the outcome of the clusters where cluster 2, with the highest level of M0 Macrophages and lowest CD8 T cells, has the worst overall survival.
Overall, we found that γδ T cells, Mast cells, Dendritic cells, M0 Macrophages, NK cells and CD8 T cells have a relationship with the survival of osteosarcoma patients.
We see no significant relationship between age or metastasis at diagnosis and the frequencies of immune cells. However, we notice an association of M1 Macrophages and CD8 T cells' frequencies to metastasis-free survival. High levels of M1 Macrophages and CD8 T cells are associated with better metastasis-free survival probability across time in osteosarcoma (Figure 4A, B), with p-values of 0.05 and 0.08 from the log-rank test, respectively. This means that patients with more M1 Macrophages and CD8 T cells are less likely to develop metastasis or die at any given time than patients with low percentage of these cells.
A relationship between some immune infiltrates and other clinical features of osteosarcoma has also been observed. Higher level of NK cells is associated with good response to chemotherapy (p = 0.035, Figure 4C). Patients with arm tumors have higher percentage of Plasma cells and Dendritic cells than patients with leg tumors (Figure 4D, E), with p-values of 0.046 and 0.033. Lastly, female patients are shown to have higher frequency of Neutrophils (Figure 4F), with p-value 0.0016.
We use the gene expression values for some important proteins, and we analyze gene expression value of the proteins separately for cohort 1 and 2 because they have different data types: RNA-Seq and microarray, respectively.
Programmed cell death protein 1 (PD-1) is a type of protein on T cells and cancer cells use it to bind with PD-1 ligand (PD-L1) and PD-2 ligand (PD-L2) to escape cell death by immune cells. There is a high correlation between PDCD1 gene, which encodes PD-1 protein, and CD8 T cells in both data sets with correlation coefficient of 0.70 and 0.77, respectively, and p-values less than 0.05 (Figure 6). As a result of this correlation, PDCD1 is the highest in cluster 1 (Figure 5A1, B1). Cluster 1 also has the highest expression of CTLA4 gene (Figure 5A3, B3) that encodes Cytotoxic T-Lymphocyte Associated Protein 4 (CTLA4), which is a member of immunoglobulin superfamily and has been found to significantly associate with the risk of osteosarcoma [38,39]. Moreover, we see that gene expression value of CTLA4 is significantly correlated with CD8 T cells in osteosarcoma tumors (Figure 6).
Interferon γ (INF-γ), encoded by IFNG gene, has antiviral, immunoregulatory, and anti-tumor properties in the immune system and is secreted by mostly T cells and NK cells [40]. Importantly, CD8 T cells frequency and PDCD1 gene expression are significantly correlated with IFNG gene expression so that cluster 1 has the highest level of IFNG compared the other clusters (Figure 5A2, B2). Beside these, we do not see any significant correlation between expression levels of CD274 and PDCD1LG2 genes, that encodes PD-L1 and PD-L2 respectively, with the expression levels of PDCD1 and IFNG, and the percentage of CD8 T cells in osteosarcoma tumors (Figure 6).
Tumor necrosis factor (TNF) is a cytokine that is mainly produced by Macrophages and has crucial roles in tumor development and tumor progression inducing apoptosis, necrosis, angiogenesis, immune cell activation, differentiation, and cell migration [41]. We notice that cluster 2 has the lowest TNF gene expression among clusters, while cluster 1 and 3 have roughly similar average expression of this gene (Figure 5A4, B4). In addition, we analyze gene IL1B that encodes cytokin protein Interleukin-1 beta (IL-1β), which is produced by activated Macrophages [42], and see that IL1B gene expression is the lowest in cluster 2 and the highest in cluster 3 (Figure 5A6, B6).
Beside these, Insulin-like growth factor 1 (IGF-1) is a hormone that has important function in the development and function of many tissues and it has been used as a diagnostic marker for osteosarcoma [43,44]. Similar to TNF and IL1B genes expression, cluster 2 has the lowest amount of IGF1 among other clusters (Figure 5A5, B5). Furthermore, we examine RUNX2 oncogene that is associated with amplifications and it has been found to correlate to poor response to chemotherapy in osteosarcoma [45,46]. In our analysis, cluster 1 has the lowest amount of RUNX2 gene and cluster 2 and 3 show almost similar expression of RUNX2 gene (Figure 5A7, B7).
The findings from analyses using estimated immune infiltrations in osteosarcoma have varied among studies, perhaps due to the small number of osteosarcoma tumors with available gene expression data in the literature. In this study, we find that infiltration of CD8 T cells, NK cells and M1 Macrophages have a positive association with prognosis, while infiltration of γδ T cells, Mast cells, M0 Macrophages and Dendritic cells have a negative association with prognosis. Yu et al. [24] also illustrates that high level of CD8 T cells is a good prognosis in their survival analysis, and results from [26] and [28] indirectly suggest the positive prognostic value of CD8 T cells. Tang et al. [26] reports that CD8 T cells infiltration has a positive correlation with CXCR3 expression which is related to good prognosis. Khader et al. [28] shows that low-risk patients have high level of CD8 T cells and NK cells, which supports with our conclusion on these cells. In agreement with our findings on prognostic value of M1 Macrophages, Song et al [31] demonstrates that high level of M1 Macrophages is associated with good prognosis, while Zhang et al. [22] and Tang et al. [26] imply the same from their results. Our conclusion about M0 Macrophages aligns with the results from [22] and [26], but contradicts with the finding from [34] that abundance level of M0 Macrophages is positively correlated with survival.
The observable difference in outcomes between clusters are likely due to the relationship between immune infiltrates and prognosis in osteosarcoma, because we cluster the patients based on their immune composition. Our results indicate that cluster 2 has the worst outcome, while cluster 3 seems to have the best outcome among clusters. The main difference in immune composition between these two clusters is that cluster 2 has much higher percentage of M0 Macrophages, and lower percentage of CD8 T cells and M1 Macrophages than cluster 3. In general, we found that high levels of CD8 T cells and M1 Macrophages are associated with good prognosis, while a high level of M0 Macrophages correlates with poor prognosis in osteosarcoma. These results make sense because CD8 T cells are known to kill cancer cells directly [47,48] and M1 Macrophages exhibit anti-tumor effects by producing cytokines that inhibit osteosarcoma growth [49]. These facts could also explain the observed differences between the outcomes of patients in clusters 2 and 3. Meanwhile, cluster 1 has worse outcome than cluster 3, but better outcome than cluster 2. This could be due to the fact that cluster 1 has both high level of immune cells associated with good prognosis such as CD8 T cells and M1 Macrophages, and high level of immune cells associated with poor prognosis according to our results such as γδ T cells and Mast cells. A high infiltration of mast cells has been associated with poor prognosis, low survival and increased metastasis in many cancers [50], while γδ T cells show dual effects on cancer growth [51]. Both mast cells and γδ T cells promote tumor development by supporting angiogenesis through angiogenic factors production [50,51]. Mast cells also produce proteases, which lead to extracellular matrix degradation and tissue remodeling, and thus promote tumor growth [50]. γδ T cells have been reported to secrete TGF-β [51], which is a pro-tumor cytokine in osteosarcoma [52,53,54]. Overall, the clinical outcomes of the clusters are consistent with our findings and biological knowledge on prognostic values of immune cells in osteosarcoma.
On the other hand, we did not observe any difference in age or metastasis at diagnosis between clusters. This can be explained by the lack of correlation between immune infiltrates and these clinical variables, which suggests that the immune composition of the primary tumor has no effect on age or metastasis status at diagnosis.
Immune checkpoints have an important role in the immune system to prevent autoimmune diseases, but unfortunately they can allow immune tolerance against tumors. PD-1 and CTLA-4 are the main checkpoints that tumor cells use to block immune system [55,56,57]. Blocking PD-1 pathway has improved oncological survival of several patients with metastatic cancers, including melanoma, renal cell carcinoma, and colon cancer [58,59]. Also, targeting CTLA-4 in patients with metastatic melanomas demonstrates significant development about overall survival [60].
It has been reported that osteosarcoma patients treated with an anti PD-1 drug, Pembrolizumab, show some improvement in disease progression [61]. Combination of PD-1 and CTLA-4 blockade therapy in bone sarcoma have shown better response compared to single checkpoint inhibitor therapy [62]. Note, patients in cluster 1 have the highest expression levels of IFNG, PDCD1 and CTLA-4 that are significantly correlated with CD8 T cells (Figures 5 and 6), and it has been shown that INF-γ increases the CD8 T cells expansion [63]. Thus, patients in cluster 1 might respond well to combination of PD-1 and CTLA-4 blockade therapies.
It has been suggested in several studies that bacteria are able to activate anti-tumor immune responses [64,65]. In a study with combination of Bacillus Calmette-Guerin (BCG) injection and tumor vaccine, 18% of the patients remained alive and disease-free and it has been reported that bacterial vaccine caused increased level of immunoregulatory cytokines such as TNF-α, IFN-γ, and IL1-β that might be involved in inducing tumor regression [66]. As a result, bacterial vaccine and inactivated tumor cells injection can be thought of as a treatment that activates anti-tumor immune responses [47]. In our results, cluster 2 has the lowest amount of gene expression level of immunoregulatory cytokines TNF-α, IFN-γ, and IL1-β (Figure 5) so that tumors in this cluster might be treated with bacterial vaccine. Otherwise, targeting RUNX2 oncogene with chemotherapy is suggested as a new therapeutic approach to osteosarcoma patients in recent studies [67,46] and cluster 2 has the highest amount of RUNX2 gene expression values compared to other clusters (Figure 5A7–B7) so with the help of further studies, tumors similar to those in cluster 2 also might be good candidates to treat with targeting RUNX2 in conjunction to standard chemotherapy.
Targeting tumor associated macrophages (TAM) is another alternative treatment method for osteosarcoma tumors and treatments that suppress M2 Macrophages phenotype or block the polarization of M1 Macrophages to M2 Macrophages have shown positive results in several studies [68,69,70,71]. Thus, tumors in cluster 3, which has the highest amount of M2 macrophages (Figure 1D) can be treated with targeting TAMs.
We would like to thank Dr. Marieke Kuijjer for the helpful clarifications on GSE21257 data set.
Research reported in this publication was supported by the National Cancer Institute of the National Institutes of Health under Award Number R21CA242933. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.
No potential conflict of interest was reported by the authors.
CIBERSORTx is the latest version of CIBERSORT, which has been the most popular deconvolution method up until now. Both algorithms are based on the following model:
y=Xβ |
where y is the vector of gene expression values of the bulk tumor, called mixture data, X is the signature matrix where each column is a vector of gene expression values of a cell type, and β is the vector of estimated cell fractions.
CIBERSORT solves for β using a machine learning technique called nu-Support Vector Machine (ν-SVR). Specifically, CIBERSORT finds β by minimizing the objective function:
12‖β‖2+C(νϵ+1NN∑i=1(ξi+ξ∗i)) |
s.t. yi−ˆyi≤ϵ+ξi and ˆyi−yi≤ϵ+ξ∗i and ξi, ξ∗i≥0.
Here ϵ is the margin of error, ν is a model hyperparameter between 0 and 1, ˆyi is the predicted value of yi, and (ξi+ξ∗i) is the absolute error of ˆyi that lie outside margin of error ϵ from yi. By minimizing this objective function, CIBERSORT finds estimated fractions ˆβ that result in the smallest absolute error between observed and predicted mixture data (y and ˆy) where a margin of error ϵ is tolerated. After this optimization step, all negative coefficients in the estimated ˆβ are set to 0 and the coefficients are normalized to sum to 1 because ˆβ represents cell fractions.
CIBERSORTx extends CIBERSORT by adding batch correction to adjust the potential cross-platform variations between mixture data y and signature matrix X. The algorithm of CIBERSORTx B-mode works as follows:
1. Given signature matrix X and mixture data y, obtain estimated cell fractions ˆβ from CIBERSORT
2. Compute estimated mixture data ˆy as ˆy=Xˆβ
3. Use Combat, a well-known batch correction method, to adjust the technical variations between y and ˆy, outputing adjusted mixture data yadj
4. Obtain final estimated cell fractions from X and yadj using CIBERSORT
Given an immune gene set, which is a set of genes associated with the quantity of immune infiltrations, ESTIMATE uses single sample gene set enrichment analysis (ssGSEA) to compute the Immune Score from gene expression data of bulk tumor. A high Immune Score represents a high level of infiltrating immune cells in the tumor tissue. ssGSEA algorithm in ESTIMATE works as follows:
1. Order gene expression data of bulk tumor from highest to lowest and replace gene expression values with their ranks
2. For each gene i, compute the following:
PwG(G,y,i)=∑rj∈G,j≤i|rj|α∑rj∈G|rj|α,PNG(G,y,i)=∑rj∉G,j≤i1(N−NG), |
where G is the given immune gene set which has NG genes, y is the gene expression data of bulk tumor which has N genes, rj is the rank of gene j and α is a hyperparameter between 0 and 1.
3. The Immune Score of sample y given immune gene set G is:
IS(G,y)=N∑i=1[PwG(G,y,i)−PNG(G,y,i)]. |
Given a number of clusters k, K-means clustering works as follows:
1. Randomly choose k data points as centroids
2. Assign each data point to its closest centroid, resulting in k clusters based on k centroids
3. Compute a new centroid for each cluster by taking average of data points that belong to that cluster
4. Repeat step 2 and 3 until the centroids no longer change
[1] | A. Khan, M. Othman, S. Madani, et al., A survey of mobile cloud computing application models, IEEE Commun. Surv. Tut., 16 (2014), 393–413. |
[2] | G. Dan, K. Jeremy, S. Evan, et al., Cloud-Trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE T. Cloud Comput., 5 (2017), 523–536. |
[3] | J. Wang, Y. Cao, B. Li, et al., Particle swarm optimization based clustering algorithm with mobile sink for WSNs, Future Gener. Comp. Sy., 76 (2017), 452–457. |
[4] | S. Li, L. Xu, S. Zhao, et al., Internet of things: A survey, J. Ind. Inf. Integr., 10 (2018), 1–9. |
[5] | P. Ray, A survey on Internet of Things architectures, J. King Saud University-Comput. Inf. Sci., 30 (2018), 291–319. |
[6] | L. Bittencourt, R. Immich, R. Sakellariou, et al., The Internet of Things, fog and cloud continuum: integration and challenges, Internet. Things, 4 (2018), 134–155. |
[7] | R. Olaniyan, O. Fadahunsi and M. Maheswaran, Opportunistic edge computing: concepts, opportunities and research challenges, Future Gener. Comp. Sy., 89 (2018), 633–645. |
[8] | P. Hu, D. Sahraoui and H. Ning, Survey on fog computing: architecture, key technologies, applications and open issues, J.Netw. Comput. Appl., 98 (2017), 27–42. |
[9] | S. Ola, E. Imad and C. Ali, IoT survey: an SDN and fog computing perspective, Comput. Netw., 143 (2018), 221–246. |
[10] | J. Zhang, Y. Zhao, B. Chen, et al., Survey on data security and privacy-preserving for the research of edge computing, J. Comm., 39 (2018), 1–21. |
[11] | T. Taleb, K. Samdanis, B. Mada, et al., On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration, IEEE Commun. Surv. Tut., 19 (2017), 1657–1681. |
[12] | M. Marjanović, A. Antonić, I. Podnar, et al., Edge computing architecture for mobile crowdsensing, IEEE Access, 6 (2018), 10662–10674. |
[13] | D. Zeng, Y. Dai, F. Li, et al., Adversarial learning for distant supervised relation extraction, Comput. Mater. Con., 55 (2018), 121–136. |
[14] | Y. Tu, Y. Lin, J. Wang, et al., Semi-supervised learning with generative adversarial networks on digital signal modulation classification, Comput. Mater. Con., 55 (2018), 243–254. |
[15] | C. Yin, J. Xi, X, Sun, et al., Location privacy protection based on differential privacy strategy for big data in Industrial Internet of Things, IEEE T. Ind. Inform., 14 (2018), 3628–3636. |
[16] | S. N. Shirazi, A. Gouglidis, A. Farshad, et al., The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective, IEEE J. Sel. Area. Comm., 35 (2017), 2586–2595. |
[17] | E. B. Tirkolaee, A. A. R. Hosseinabadi, M. Soltani, et al., A hybrid genetic algorithm for multi-trip green capacitated arc routing problem in the scope of urban services, Sustainability, 10 (2018), 1–21. |
[18] | W. D. Wang and J. Y. Lang, Reflection and prospect: precise radiation therapy based on bionomics/radionics and artificial intelligence technology, Chinese J. Clin. Oncol., 45 (2018), 30648–30656. |
[19] | R. Khanna, H. Liu and T. Rangarajan, Wireless data center management: sensor network applications and challenges, IEEE Microw. Mag., 15 (2014), S45–S60. |
[20] | C. Yang, D. Puthal, S. Mohanty, et al., Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks, IEEE Consum. Electr. M., 6 (2017), 48–56. |
[21] | J. Wang, C. Ju, H. Kimet, et al., A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs, Cluster Comput., 3 (2017), 1–9. |
[22] | R. Meng, S. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, Comput. Mater. Con., 55 (2018), 1–16. |
[23] | B. Gong, P. Cheng, Z. Chen, et al., Spatiotemporal compressive network coding for energy-efficient distributed data storage in wireless sensor networks, IEEE Commun. Lett., 19 (2015), 803–806. |
[24] | Y. Yang, J. Miao, Y. Zhao, et al., Distributed information storage and retrieval in 3D sensor networks with general topologies, IEEE ACM T. Network., 23 (2015), 1149–1162. |
[25] | J. Wang, J. Cao, S. Ji, et al., Energy-efficient cluster based dynamic routes adjustment approach for wireless sensor networks with mobile sinks, J. Supercomput., 73 (2017), 3277–3290. |
[26] | L. Xiang, Y. Li, W. Hao, et al., Reversible natural language watermarking using synonym substitution and arithmetic coding, Comput. Mater. Con., 55 (2018), 541–559. |
[27] | O. Diallo, R. Joel, M. Sene, et al., Distributed database management techniques for wireless sensor networks, IEEE T. Parall. Distr., 26 (2015), 604–620. |
[28] | A. Al-Dhaqm, S. Razak, S. H. Othman, et al., CDBFIP: common database forensic investigation processes for Internet of Things, IEEE Access, 5 (2017), 24401–24416. |
[29] | Y. Ren, Y. Liu, S. Ji, et al., Incentive mechanism of data storage based on blockchain for wireless sensor networks, Mob. Inf. Syst., 2018 (2018), 1–10. |
[30] | S. Fang, L. Xu and Y. Zhu, An integrated system for regional environmental monitoring and management based on Internet of Things, IEEE T. Ind. Inform., 10 (2014), 1596–1605. |
[31] | D. E. Kouicem, A. Bouabdallah and H. Lakhlef, Internet of things security: A top-down survey, Comput. Netw., 141 (2018), 199–221. |
[32] | C. Wei, Z. Wang, E. Jason, et al., Decentralized applications: the blockchain-empowered software system, IEEE Access, 6 (2018), 53019–53033. |
[33] | F. Tschorsch and B. Scheuermann, Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Commun. Surv. Tut., 18 (2016), 2084–2123. |
[34] | R. B. Uriarte and R. D. Nicola, Blockchain-based decentralized cloud/fog solutions: challenges, opportunities, and standards, IEEE Commun. Standards Mag., 2 (2018), 22–28. |
[35] | K. Govinda, P. Nin, V. Lalitha, et al., Codes with local regeneration and erasure correction, IEEE T. Inform. Theory, 60 (2014), 4637–4660. |
[36] | J. Yao, K. Zhang, Y. Yang, et al., Emergency vehicle route oriented signal coordinated control model with two-level programming, Soft Comput., 22 (2018), 4283–4294. |
[37] | Y. Hu, L. Patrick, K. W. Shum, et al., Proxy-assisted regenerating codes with uncoded repair for distributed storage systems, IEEE T. Inform. Theory, 64 (2018), 2512–2528. |
[38] | Y. Chen, L. Wang, X. Yan, et al., Mimic storage scheme based on regenerated code, J. Commun., 39 (2018), 21–34. |
[39] | J. Wang, C. Ju, Y. Gao, et al., A PSO based energy efficient coverage control algorithm for wireless sensor networks, Comput. Mater. Con., 56 (2018), 433–446. |
[40] | J. Wang, Z. Zhang and B. Li, An enhanced fall detection system for elderly person monitoring using consumer home networks, IEEE T. Consum. Electr., 60 (2014), 23–29. |
[41] | Y. Ren, J. Shen, D. Liu, et al., Evidential quality preserving of electronic record in cloud storage, J. Internet Technol., 17 (2016), 1125–1132. |
[42] | X. Li, A fast and exhaustive method for heterogeneity and epistasis analysis based on multi-objective optimization, Bioinformatics, 33 (2017), 2829–2836. |
[43] | X. Li, J. Y. Peng, J. W. Niu, et al., A robust and energy efficient authentication protocol for Industrial Internet of Things, IEEE Internet Things J., 5 (2018), 1606–1615. |
[44] | J. Wang, J. Y. Cao, R. Simon, et al., An improved ant colony optimization-based approach with mobile sink for wireless sensor networks, J. Supercomput., 74 (2018), 6633–6645. |
[45] | J. Wang, Y. Gao, X. Yin, et al., An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks, Wirel. Commun. Mob. Com., 18 (2018), 1–9. |
[46] | X. Li, J. W. Niu, M. Bhuiyan, et al., A robust ECC based provable secure authentication protocol with privacy preserving for industrial internet of things, IEEE T. Ind. Inform., 14 (2017), 3599–3609. |
1. | Yongjun Ren, Fujian Zhu, Pradip Kumar Sharma, Tian Wang, Jin Wang, Osama Alfarraj, Amr Tolba, Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things, 2019, 20, 1424-8220, 207, 10.3390/s20010207 | |
2. | Jiaxing Li, Jigang Wu, Guiyuan Jiang, Thambipillai Srikanthan, Blockchain-based public auditing for big data in cloud storage, 2020, 57, 03064573, 102382, 10.1016/j.ipm.2020.102382 | |
3. | Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh, Simple and scalable blockchain with privacy, 2021, 58, 22142126, 102700, 10.1016/j.jisa.2020.102700 | |
4. | Xiang Chen, A security integration model for private data of intelligent mobile communication based on edge computing, 2020, 162, 01403664, 204, 10.1016/j.comcom.2020.08.026 | |
5. | Yepeng Liu, Yongjun Ren, Chunpeng Ge, Jinyue Xia, Qirun Wang, A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system, 2019, 47, 22142126, 125, 10.1016/j.jisa.2019.05.002 | |
6. | Yehia I. Alzoubi, Valmira H. Osmanaj, Ashraf Jaradat, Ahmad Al‐Ahmad, Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art, 2021, 4, 2475-6725, 10.1002/spy2.145 | |
7. | Yongjun Ren, Fujian Zhu, Jian Qi, Jin Wang, Arun Kumar Sangaiah, Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things, 2019, 9, 2076-3417, 2058, 10.3390/app9102058 | |
8. | Yong Sauk Hau, Jae Min Lee, Jaechan Park, Min Cheol Chang, Attitudes Toward Blockchain Technology in Managing Medical Information: Survey Study, 2019, 21, 1438-8871, e15870, 10.2196/15870 | |
9. | Yongjun Ren, Jian Qi, Yepeng Liu, Jin Wang, Gwang-Jun Kim, Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator, 2021, 21, 1533-5399, 1, 10.1145/3380749 | |
10. | Yongjun Ren, Yan Leng, Fujian Zhu, Jin Wang, Hye-Jin Kim, Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network, 2019, 19, 1424-8220, 2395, 10.3390/s19102395 | |
11. | Pingshui Wang, Qinjuan Ma, Issues of privacy policy conflict in mobile social network, 2020, 16, 1550-1477, 155014772091293, 10.1177/1550147720912939 | |
12. | Sahar Ismail, Rahaf Almayouf, Shaden Chehab, Shatha Alghamdi, Albandari Almutairi, Bshair Alasmari, Rawan Altherwy, 2020, Edge IoT-cloud Framework based on Blockchain, 978-1-7281-5467-1, 1, 10.1109/ICCIS49240.2020.9257647 | |
13. | Chunpeng Ge, Zhe Liu, Liming Fang, A blockchain based decentralized data security mechanism for the Internet of Things, 2020, 141, 07437315, 1, 10.1016/j.jpdc.2020.03.005 | |
14. | Yongjun Ren, Fujian Zhu, Kui Zhu, Pradip Kumar Sharma, Jin Wang, Blockchain-based trust establishment mechanism in the internet of multimedia things, 2020, 1380-7501, 10.1007/s11042-020-09578-y | |
15. | Xiaonan Li, Xi Cheng, Wenjian Wu, Qinghua Wang, Zhaoyang Tong, Xiaoqing Zhang, Dahai Deng, Yihe Li, Xinbao Gao, An improved wavelet de-noising-based back propagation neural network model to forecast the bioaerosol concentration, 2021, 55, 0278-6826, 352, 10.1080/02786826.2020.1846678 | |
16. | Xiaofang Luo, Wei Wang, Design and Implementation of Decentralized Swarm Intelligence E-Commerce Model Based on Regional Chain and Edge Computing, 2021, 2021, 1099-0526, 1, 10.1155/2021/5595002 | |
17. | Weijian Zhang, Hao Wang, Hao Hua, Qirun Wang, Selfish Mining and Defending Strategies in the Bitcoin, 2022, 34, 1079-8587, 1861, 10.32604/iasc.2022.030274 | |
18. | Cuixiang Wang, Xing Shao, Yifan Meng, Jun Gao, A Physical Layer Network Coding Based Tag Anti-collision Algorithm for RFID System, 2020, 66, 1546-2226, 931, 10.32604/cmc.2020.012267 | |
19. | Hongxia Deng, Chunxiang Hu, Zihao Zhou, Jinxiu Guo, Zhenxuan Zhang, Haifang Li, RMCA-LSA: A Method of Monkey Brain Extraction, 2021, 29, 1079-8587, 387, 10.32604/iasc.2021.016989 | |
20. | Shan Ji, Wei Zhou, Chuan Ma, Dafang Li, Kui Zhu, Liming Fang, Proofs of retrievability with tag outsourcing based on Goppa codes, 2023, 86, 09205489, 103719, 10.1016/j.csi.2022.103719 | |
21. | Alexandru A. Maftei, Alexandru Lavric, Adrian I. Petrariu, Valentin Popa, Massive Data Storage Solution for IoT Devices Using Blockchain Technologies, 2023, 23, 1424-8220, 1570, 10.3390/s23031570 | |
22. | Yiming Liu, Ke Chen, Lanzhen Bian, Lei Ren, Jing Hu, Jinyue Xia, Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury, 2021, 29, 1079-8587, 553, 10.32604/iasc.2021.017391 | |
23. | Jin Wang, Jiahao Chen, Yongjun Ren, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba, Data security storage mechanism based on blockchain industrial Internet of Things, 2022, 164, 03608352, 107903, 10.1016/j.cie.2021.107903 | |
24. | Xiaona Hu, Shan Ji, Hao Hua, Baiqing Zhou, Gang Hu, An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal, 2022, 43, 0267-6192, 1285, 10.32604/csse.2022.029230 | |
25. | Jin Wang, Chenchen Han, Xiaofeng Yu, Yongjun Ren, R. Simon Sherratt, Distributed Secure Storage Scheme Based on Sharding Blockchain, 2022, 70, 1546-2226, 4485, 10.32604/cmc.2022.020648 | |
26. | Huading Ling, Aiping Zhang, Changchun Yin, Dafang Li, Mengyu Chang, Improve Representation for Cross-Language Clone Detection by Pretrain Using Tree Autoencoder, 2022, 33, 1079-8587, 1561, 10.32604/iasc.2022.027349 | |
27. | Kaspar A. Schindler, Tobias Nef, Maxime O. Baud, Athina Tzovara, Gürkan Yilmaz, Gerd Tinkhauser, Stephan M. Gerber, Oriella Gnarra, Jan D. Warncke, Narayan Schütz, Samuel E. J. Knobel, Markus H. Schmidt, Paul Krack, Flavio Fröhlich, Raphael Sznitman, Simon Rothen, Claudio L. A. Bassetti, NeuroTec Sitem-Insel Bern: Closing the Last Mile in Neurology, 2021, 5, 2514-183X, 13, 10.3390/ctn5020013 | |
28. | Yongjun Ren, Xinyu Liu, Qiang Wu, Ling Wang, Weijian Zhang, Stelvio Cimato, Cryptographic Accumulator and Its Application: A Survey, 2022, 2022, 1939-0122, 1, 10.1155/2022/5429195 | |
29. | P. Renuka, B. Booba, 2022, Chapter 30, 978-981-16-3960-9, 351, 10.1007/978-981-16-3961-6_30 | |
30. | Jun Zhu, Chaosong Yan, Yinglong Ouyang, Yao Chen, Xiaowan Wang, Security Data Sharing of Shipbuilding Information Based on Blockchain, 2022, 33, 1079-8587, 1747, 10.32604/iasc.2022.026934 | |
31. | Zixin Wang, Bin Cao, Chenxi Liu, Congfang Xu, Lei Zhang, Blockchain-based fog radio access networks: Architecture, key technologies, and challenges, 2022, 8, 23528648, 720, 10.1016/j.dcan.2021.12.006 | |
32. | Pengchong Han, Zhouyang Zhang, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren, Access control mechanism for the Internet of Things based on blockchain and inner product encryption, 2023, 74, 22142126, 103446, 10.1016/j.jisa.2023.103446 | |
33. | Min Rao, Yufeng Li, Hongye Liu, Isabel Wang, Yongjun Ren, Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury, 2022, 34, 1079-8587, 455, 10.32604/iasc.2022.027694 | |
34. | Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss, A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology, 2020, 8, 2169-3536, 33644, 10.1109/ACCESS.2020.2972606 | |
35. | Jothi Prakash Venugopal, Arul Antran Vijay Subramanian, Jegathesh Peatchimuthu, The realm of metaverse: A survey, 2023, 1546-4261, 10.1002/cav.2150 | |
36. | Mingsen Mo, Shan Ji, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren, Privacy Data Management Mechanism Based on Blockchain and Federated Learning, 2023, 74, 1546-2226, 37, 10.32604/cmc.2023.028843 | |
37. | Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren, Blockchain Data Availability Scheme with Strong Data Privacy Protection, 2023, 14, 2078-2489, 88, 10.3390/info14020088 | |
38. | Dengzhi Liu, Yong Zhang, Dongbao Jia, Qiaosheng Zhang, Xuefeng Zhao, Huan Rong, Toward secure distributed data storage with error locating in blockchain enabled edge computing, 2022, 79, 09205489, 103560, 10.1016/j.csi.2021.103560 | |
39. | Lanlan Ni, Lanzheng Bian, Rugang Lu, Ting Chen, Jinyue Xia, Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward, 2022, 43, 0267-6192, 219, 10.32604/csse.2022.026594 | |
40. | Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, Jindong Xue, Jinyue Xia, Conveyor Belt Detection Based on Deep Convolution GANs, 2021, 29, 1079-8587, 601, 10.32604/iasc.2021.017963 | |
41. | Wanchun Dou, Bowen Liu, Chuangwei Lin, Xiaokang Wang, Xutong Jiang, Lianyong Qi, Architecture of virtual edge data center with intelligent metadata service of a geo-distributed file system, 2022, 128, 13837621, 102545, 10.1016/j.sysarc.2022.102545 | |
42. | Lihua Zhang, Chunhui Liu, Boping Li, Haodong Fang, Jinguang Gu, A Secure Storage and Deletion Verification Scheme of Microgrid Data Based on Integrating Blockchain into Edge Computing, 2022, 11, 2079-9292, 4033, 10.3390/electronics11234033 | |
43. | Jian Geng, Shaoyuan Yu, Ailin Chen, Hao Wang, Bo Yan, Liang Li, Lei Song, Qirun Wang, Evidence Mechanism of Power Dispatching Instruction Based on Blockchain, 2022, 43, 0267-6192, 559, 10.32604/csse.2022.026948 | |
44. | Tao Li, Qi Qian, Yongjun Ren, Yongzhen Ren, Jinyue Xia, Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing, 2020, 66, 1546-2226, 779, 10.32604/cmc.2020.010424 | |
45. | Sahar A. ElRahman, Ala Saleh Alluhaidan, Blockchain technology and IoT-edge framework for sharing healthcare services, 2021, 25, 1432-7643, 13753, 10.1007/s00500-021-06041-4 | |
46. | Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam, Serge Demidenko, IoT Big Data provenance scheme using blockchain on Hadoop ecosystem, 2021, 8, 2196-1115, 10.1186/s40537-021-00505-y | |
47. | Yehia Ibrahim Alzoubi, Asif Gill, Alok Mishra, A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues, 2022, 11, 2192-113X, 10.1186/s13677-022-00353-y | |
48. | Jiang Xu, Ling Wang, Xinyu Liu, Xiujuan Feng, Yongjun Ren, Jinyue Xia, Front-end Control Mechanism of Electronic Records, 2021, 39, 0267-6192, 337, 10.32604/csse.2021.015004 | |
49. | Leo Eichhorn, Tanya Shreedhar, Aleksandr Zavodovski, Nitinder Mohan, 2021, Distributed Ledgers for Distributed Edge, 9781450391382, 26, 10.1145/3488663.3493687 | |
50. | Qiang Wu, Liang Xi, Shiren Wang, Shan Ji, Shenqing Wang, Yongjun Ren, Verifiable Delay Function and Its Blockchain-Related Application: A Survey, 2022, 22, 1424-8220, 7524, 10.3390/s22197524 | |
51. | Yongjun Ren, Xinyu Liu, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba, Shenqing Wang, Jin Wang, Data storage mechanism of industrial IoT based on LRC sharding blockchain, 2023, 13, 2045-2322, 10.1038/s41598-023-29917-x | |
52. | Jing Hu, Gang Hu, Jiantao Cai, Lipeng Xu, Qirun Wang, Hospital Bed Allocation Strategy Based on Queuing Theory during the COVID-19 Epidemic, 2020, 66, 1546-2226, 793, 10.32604/cmc.2020.011110 | |
53. | Lei Ren, Jing Hu, Mei Li, Ling Zhang, Jinyue Xia, Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation, 2022, 40, 0267-6192, 139, 10.32604/csse.2022.018640 | |
54. | Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam Prakash Mishra, Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach, 2022, 1386-7857, 10.1007/s10586-022-03813-x | |
55. | Jing Hu, Ling Zhang, Jie Li, Qirun Wang, A New Mixed Clustering-based Method to Analyze the Gait of Children with Cerebral Palsy, 2021, 66, 1546-2226, 1551, 10.32604/cmc.2020.011829 | |
56. | Ting Chen, Kai Pu, Lanzhen Bian, Min Rao, Jing Hu, Rugang Lu, Jinyue Xia, Process Optimization Method for Day Ward Based on Bayesian Decision-Tree, 2022, 32, 1079-8587, 513, 10.32604/iasc.2022.022510 | |
57. | Wei Gao, Haixu Xi, Gyun Yeol Park, Context-Aware Service Model of a Mobile Library Based on Internet of Things, 2022, 33, 1079-8587, 1893, 10.32604/iasc.2022.023207 | |
58. | Zhoubao Sun, Xiaodong Zhang, Haoyuan Li Yan Xiao, Haifeng Guo, Recommender Systems Based on Tensor Decomposition, 2020, 66, 1546-2226, 621, 10.32604/cmc.2020.012593 | |
59. | Haixu Xi, Wei Gao, Gyun Yeol Park, Situation Awareness Data Fusion Method Based on Library Events, 2022, 42, 0267-6192, 1047, 10.32604/csse.2022.022051 | |
60. | Antonios Makris, Ioannis Kontopoulos, Evangelos Psomakelis, Stylianos Nektarios Xyalis, Theodoros Theodoropoulos, Konstantinos Tserpes, Performance Analysis of Storage Systems in Edge Computing Infrastructures, 2022, 12, 2076-3417, 8923, 10.3390/app12178923 | |
61. | Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, JinDong Xue, Jinyue Xia, Conveyor-Belt Detection of Conditional Deep Convolutional Generative Adversarial Network, 2021, 69, 1546-2226, 2671, 10.32604/cmc.2021.016856 | |
62. | Jin Wang, Wei Ou, Osama Alfarraj, Amr Tolba, Gwang-Jun Kim, Yongjun Ren, Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain, 2023, 45, 0267-6192, 1805, 10.32604/csse.2023.029622 | |
63. | Yuqi Fan, Huanyu Wu, Hye-Young Paik, DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system, 2021, 124, 0167739X, 33, 10.1016/j.future.2021.04.020 | |
64. | Giacomo Butte, Yady Tatiana Solano-Correa, Maria Valasia Peppa, Diana Marcela Ruíz-Ordóñez, Rachael Maysels, Nasser Tuqan, Xanthe Polaine, Carolina Montoya-Pachongo, Claire Walsh, Thomas Curtis, A Framework for Water Security Data Gathering Strategies, 2022, 14, 2073-4441, 2907, 10.3390/w14182907 | |
65. | Aparna R, Sanjay Raj R, Swapnonil Bandopadhyay, Anu Vikram K, Sonali Pandey, 2021, BlockDrive: A Deduplication framework for Cloud using edge-level blockchain, 978-1-6654-0430-3, 1, 10.1109/ICCICT50803.2021.9510039 | |
66. | He Xue, Dajiang Chen, Ning Zhang, Hong-Ning Dai, Keping Yu, Integration of blockchain and edge computing in internet of things: A survey, 2022, 0167739X, 10.1016/j.future.2022.10.029 | |
67. | Ling Wang, Shan Ji, Zhaokang Wang, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren, Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data, 2022, 34, 1079-8587, 221, 10.32604/iasc.2022.027536 | |
68. | Yibin Xu, Yangyu Huang, Segment Blockchain: A Size Reduced Storage Mechanism for Blockchain, 2020, 8, 2169-3536, 17434, 10.1109/ACCESS.2020.2966464 | |
69. | Adeel Ahmed, Saima Abdullah, Muhammad Bukhsh, Israr Ahmad, Zaigham Mushtaq, An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain, 2022, 10, 2169-3536, 11404, 10.1109/ACCESS.2022.3146295 | |
70. | Xiaona Hu, Baiqing Zhou, Jinyue Xia, Yao Chen, Gang Hu, Energy-saving-oriented Berth Scheduling Model at Bulk Terminal, 2022, 33, 1079-8587, 1801, 10.32604/iasc.2022.027034 | |
71. | Dengzhi Liu, Zhimin Li, Chen Wang, Yongjun Ren, Enabling secure mutual authentication and storage checking in cloud-assisted IoT, 2022, 19, 1551-0018, 11034, 10.3934/mbe.2022514 | |
72. | N. Krishnaraj, Kiranmai Bellam, B. Sivakumar, A. Daniel, 2022, Chapter 10, 978-3-030-70500-8, 207, 10.1007/978-3-030-70501-5_10 | |
73. | Xianhui Chen, Design and implementation of decentralized E-commerce model based on edge computing, 2021, 10641246, 1, 10.3233/JIFS-219066 | |
74. | Hao Yan, Yanan Liu, Shuo Qiu, Shengzhou Hu, Weijian Zhang, Jinyue Xia, Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain, 2022, 41, 0267-6192, 1129, 10.32604/csse.2022.022317 | |
75. | Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Hasan Kahtan, Blockchain technology as a Fog computing security and privacy solution: An overview, 2022, 182, 01403664, 129, 10.1016/j.comcom.2021.11.005 | |
76. | Baiqing Zhou, Na Li, Duan Lu, Jinyue Xia, Correlation Analysis between Economic Growth and Environmental Quality, 2022, 41, 0267-6192, 127, 10.32604/csse.2022.017750 | |
77. | Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba, Yongjun Ren, S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT, 2022, 1533-5399, 10.1145/3511902 | |
78. | Dan Wang, Lanzheng Bian, Xiaoyan Hao, Yiming Liu, Jinyue Xia, Jing Hu, Early Rehabilitation After Craniosynostosis Surgery, 2022, 72, 1546-2226, 3899, 10.32604/cmc.2022.026660 | |
79. | Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren, Consensus Mechanism of Blockchain Based on PoR with Data Deduplication, 2022, 34, 1079-8587, 1473, 10.32604/iasc.2022.029657 | |
80. | Jin Wang, Wei Ou, Wenhai Wang, R. Simon Sherratt, Yongjun Ren, Xiaofeng Yu, Data Security Storage Mechanism Based on Blockchain Network, 2023, 74, 1546-2226, 4933, 10.32604/cmc.2023.034148 | |
81. | Zhaoyan Wang, In-Young Ko, 2023, Edge-Cloud Collaboration Architecture for Efficient Web-Based Cognitive Services, 978-1-6654-7578-5, 124, 10.1109/BigComp57234.2023.00028 | |
82. | Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li, Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory, 2024, 159, 0167739X, 533, 10.1016/j.future.2024.05.045 | |
83. | Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin, Merkle trees in blockchain: A Study of collision probability and security implications, 2024, 26, 25426605, 101193, 10.1016/j.iot.2024.101193 | |
84. | D. Shivaramakrishna, M. Nagaratna, A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control, 2023, 84, 11100168, 275, 10.1016/j.aej.2023.10.054 | |
85. | Yadong Zhang, Yujuan Zheng, Chen Yin, Chunju Shi, 2024, Application of Secure Data Storage and Transmission in Cloud Computing Based on Blockchain Technology, 9798400709920, 200, 10.1145/3687311.3687348 | |
86. | Imran Khan, Yasar Majib, Rehmat Ullah, Omer Rana, Blockchain Applications for Internet of Things — A Survey, 2024, 27, 25426605, 101254, 10.1016/j.iot.2024.101254 | |
87. | Minyu Teng, Jingxuan Han, Jintao Xie, Jiayao Gao, Jiangfeng Li, Yang Shi, Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage, 2024, 20, 1550-4859, 1, 10.1145/3687127 | |
88. | Amad Alanhdi, László Toka, A Survey on Integrating Edge Computing With AI and Blockchain in Maritime Domain, Aerial Systems, IoT, and Industry 4.0, 2024, 12, 2169-3536, 28684, 10.1109/ACCESS.2024.3367118 | |
89. | Fangpeng Jin, Mi Zou, Xiaoyun Peng, Hua Lei, Yongjun Ren, Deep Learning-Enhanced Internet of Things for Activity Recognition in Post-Stroke Rehabilitation, 2024, 28, 2168-2194, 3851, 10.1109/JBHI.2023.3332735 | |
90. | Haijun Bao, Minghao Yuan, Haitao Deng, Jiang Xu, Yekang Zhao, Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain, 2024, 10, 24058440, e34458, 10.1016/j.heliyon.2024.e34458 | |
91. | Tongrui Zhang, Dat Tien Doan, Jing Kang, Application of building information modeling-blockchain integration in the Architecture, Engineering, and Construction / Facilities Management industry: A review, 2023, 77, 23527102, 107551, 10.1016/j.jobe.2023.107551 | |
92. | Yongjun Ren, Long Chen, Yongmei Bai, Jiale Ye, Yekang Zhao, Blockchain-based cross-domain query integrity verification mechanism for outsourced database, 2025, 92, 09205489, 103926, 10.1016/j.csi.2024.103926 | |
93. | Yekang Zhao, Wangchen Dai, Shiren Wang, Liang Xi, Shenqing Wang, Feng Zhang, A Review of Cuckoo Filters for Privacy Protection and Their Applications, 2023, 12, 2079-9292, 2809, 10.3390/electronics12132809 | |
94. | Jiale Ye, Yongmei Bai, Jiang Xu, Shitao Huang, Zhaoyang Han, Wei Wan, Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments, 2024, 13, 2079-9292, 4167, 10.3390/electronics13214167 | |
95. | Xiaolong Wang, Qianjun Wu, Yuhang Chen, Caijun Zhang, Wei Yang, Kaiqiang Xian, 2024, Generic Storage of Multi-form Data for Power Grid Business System, 9798400709784, 202, 10.1145/3677182.3677218 | |
96. | Yongjun Ren, Zhiying Lv, Neal N. Xiong, Jin Wang, HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse, 2024, 20, 1551-6857, 1, 10.1145/3594542 | |
97. | Haitao Deng, Jing Hu, Rohit Sharma, Mingsen Mo, Yongjun Ren, NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory, 2023, 206, 01403664, 1, 10.1016/j.comcom.2023.04.026 | |
98. | Xia Zhang, Haitao Deng, Rui Wu, Jingjing Ren, Yongjun Ren, PQSF: post-quantum secure privacy-preserving federated learning, 2024, 14, 2045-2322, 10.1038/s41598-024-74377-6 | |
99. | Utsa Roy, Nirnay Ghosh, BloAC: A blockchain-based secure access control management for the Internet of Things, 2024, 87, 22142126, 103897, 10.1016/j.jisa.2024.103897 | |
100. | Wenjing Lv, Jue Chen, Songlin Cheng, Xihe Qiu, Dongmei Li, QoS-driven resource allocation in fog radio access network: A VR service perspective, 2024, 21, 1551-0018, 1573, 10.3934/mbe.2024068 | |
101. | Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan, Distributed medical data storage model based on blockchain technology, 2024, 27, 1386-7857, 4757, 10.1007/s10586-023-04207-3 | |
102. | M. Nalini, R. Thilagavathy, K. Bhargavi, K. Thinakaran, Optimizing Storage Efficiency Through Pipelining and Parallelization for Enhanced Data Deduplication, 2024, 33, 0218-1266, 10.1142/S0218126624502591 | |
103. | Mingjia Han, Xinyi Yang, Huachang Su, Yekang Zhao, Ding Huang, Yongjun Ren, Spatio-Temporal Big Data Collaborative Storage Mechanism Based on Incremental Aggregation Subvector Commitment in On-Chain and Off-Chain Systems, 2024, 13, 2220-9964, 280, 10.3390/ijgi13080280 | |
104. | Ruikui Ma, Qiuqian Wang, Xiangxi Bu, Xuebin Chen, Real-Time Detection of DDoS Attacks Based on Random Forest in SDN, 2023, 13, 2076-3417, 7872, 10.3390/app13137872 | |
105. | Jungwon Seo, Sooyong Park, SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse, 2024, 151, 0167739X, 85, 10.1016/j.future.2023.09.022 | |
106. | Amerah Alabrah, A Novel Neural Network Architecture Using Automated Correlated Feature Layer to Detect Android Malware Applications, 2023, 11, 2227-7390, 4242, 10.3390/math11204242 | |
107. | Yizhe Zhou, Xianwei Zhu, Ailin Chen, Zhouyang Zhang, Pengchong Han, Feng Zhang, Zhaoyang Han, Jiang Xu, Bo Lan, Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption, 2024, 17, 1936-6442, 1021, 10.1007/s12083-024-01622-0 | |
108. | Xingchen Liu, Shaohui Zhang, Haiping Huang, Reza Malekian, A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage, 2024, 17, 1936-6442, 985, 10.1007/s12083-024-01635-9 | |
109. | Yehia Ibrahim Alzoubi, Ali Aljaafreh, Blockchain-Fog Computing Integration Applications: A Systematic Review, 2023, 23, 1314-4081, 3, 10.2478/cait-2023-0001 | |
110. | Haixu Xi, Feng Zhang, Yintong Wang, Transformer Machine Translation Model Incorporating Word Alignment Structure, 2024, 70, 0098-3063, 1010, 10.1109/TCE.2023.3332878 | |
111. | R.P. Puneeth, G Parthasarathy, A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology, 2024, 120, 00457906, 109676, 10.1016/j.compeleceng.2024.109676 | |
112. | JiaJun Liu, Jie Zhang, JieWu Leng, Combining permissioned blockchain and Bayesian best-worst method for transparent supplier selection in supply chain management, 2024, 67, 1674-7321, 2579, 10.1007/s11431-024-2677-0 | |
113. | Wanchun Dou, Xiaolong Xu, Shui Yu, 2023, Chapter 3, 978-981-99-5731-6, 39, 10.1007/978-981-99-5732-3_3 | |
114. | Qiang Shu, Yan Li, Wei Gao, Emergency treatment mechanism of laboratory safety accidents in university based on IoT and context aware computing, 2023, 9, 24058440, e19406, 10.1016/j.heliyon.2023.e19406 | |
115. | Ruyan Liu, Xiaofeng Yu, Yuan Yuan, Yongjun Ren, BTDSI: A blockchain-based trusted data storage mechanism for Industry 5.0, 2023, 35, 13191578, 101674, 10.1016/j.jksuci.2023.101674 | |
116. | Xiaowan Wang, Huiyin Xie, Shan Ji, Liang Liu, Ding Huang, Blockchain-based fake news traceability and verification mechanism, 2023, 9, 24058440, e17084, 10.1016/j.heliyon.2023.e17084 | |
117. | Jia Ni, Guowei Fang, Yekang Zhao, Jingjing Ren, Long Chen, Yongjun Ren, Distributed Group Key Management Based on Blockchain, 2024, 13, 2079-9292, 2216, 10.3390/electronics13112216 | |
118. | Linchen Liu, Ruyan Liu, Zhiying Lv, Ding Huang, Xing Liu, Dual blockchain-based data sharing mechanism with privacy protection for medical internet of things, 2024, 10, 24058440, e23575, 10.1016/j.heliyon.2023.e23575 | |
119. | Lili Cheng, Zhiying Lv, Osama Alfarraj, Amr Tolba, Xiaofeng Yu, Yongjun Ren, Secure cross-chain interaction solution in multi-blockchain environment, 2024, 10, 24058440, e28861, 10.1016/j.heliyon.2024.e28861 | |
120. | Yongjing Zhang, Zhouyang Zhang, Shan Ji, Shenqing Wang, Shitao Huang, Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning, 2024, 13, 2079-9292, 848, 10.3390/electronics13050848 | |
121. | Hongwu Qin, Chao Xue, Xiuqin Ma, Ying Si, Zhenxin Jiang, A storage mechanism of data access record on consortium chain based on master-slave blocks, 2024, 10, 24058440, e32088, 10.1016/j.heliyon.2024.e32088 | |
122. | Ran Wang, Cheng Xu, Xiaotong Zhang, Toward Materials Genome Big-Data: A Blockchain-Based Secure Storage and Efficient Retrieval Method, 2024, 35, 1045-9219, 1630, 10.1109/TPDS.2024.3426275 | |
123. | Aiting Yao, Gang Li, Xuejun Li, Frank Jiang, Jia Xu, Xiao Liu, Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions, 2023, 19, 25900056, 100293, 10.1016/j.array.2023.100293 | |
124. | Hanqi Sun, Wanquan Zhu, Ziyu Sun, Mingsheng Cao, Wenbin Liu, FMDL: Federated Mutual Distillation Learning for Defending Backdoor Attacks, 2023, 12, 2079-9292, 4838, 10.3390/electronics12234838 | |
125. | Lin Ge, Tao Jiang, Hongquan Wei, Selection of node with editing rights and privacy protection mechanisms based on dual-blockchain, 2023, 35, 13191578, 101849, 10.1016/j.jksuci.2023.101849 | |
126. | Ying Huang, Smart home system using blockchain technology in green lighting environment in rural areas, 2024, 10, 24058440, e26620, 10.1016/j.heliyon.2024.e26620 | |
127. | Chen Zhonghua, S. B. Goyal, Anand Singh Rajawat, Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing, 2024, 80, 0920-8542, 1396, 10.1007/s11227-023-05517-4 | |
128. | Kefei Lu, Zhongyuan Qin, Liquan Chen, 2023, LN-PCA: Differential Privacy Protection of Medical Data Based on Principal Component Analysis Adding Laplace Noise, 9781450399029, 697, 10.1145/3594315.3594393 | |
129. | Honghui Fan, Jiahe Huang, Xianzhen Huang, Hongjin Zhu, Huachang Su, BI-RRT*: An improved path planning algorithm for secure and trustworthy mobile robots systems, 2024, 10, 24058440, e26403, 10.1016/j.heliyon.2024.e26403 | |
130. | Haotian Luo, Niansong Mei, Chong Du, EMR sharing system with lightweight searchable encryption and rights management, 2024, 27, 1386-7857, 6341, 10.1007/s10586-024-04294-w | |
131. | Ailin Chen, Shaoyuan Yu, Xinyi Yang, Ding Huang, Yongjun Ren, IoT data security in outsourced databases: A survey of verifiable database, 2024, 10, 24058440, e28117, 10.1016/j.heliyon.2024.e28117 | |
132. | Shaoyuan Yu, Jing Yang, Jia Ni, Chunyi Chen, Tao Yu, Ailin Chen, Jian Geng, Hua Zhong, Weihua Weng, Tao Wei, Secure traceability mechanism of green electricity based on smart contracts and provenance model, 2024, 10, 24058440, e32091, 10.1016/j.heliyon.2024.e32091 | |
133. | Yongjing Zhang, Guannan Li, Wangchen Dai, Chengxin Hong, Jin Qian, Zhaoyang Han, IoT-based generalized multi-granulation sequential three-way decisions, 2023, 209, 01403664, 402, 10.1016/j.comcom.2023.07.031 | |
134. | Xiaofeng Yu, Ruyan Liu, Lewis Nkenyereye, Zhiming Wang, Yongjun Ren, ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed–Solomon Codes, 2024, 70, 0098-3063, 3792, 10.1109/TCE.2024.3373435 | |
135. | Yangyang Guo, Hongye Liu, Yaojin Sun, Yongjun Ren, Virtual human pose estimation in a fire education system for children with autism spectrum disorders, 2024, 30, 0942-4962, 10.1007/s00530-024-01274-3 | |
136. | Jiachen Shen, Yekang Zhao, Shitao Huang, Yongjun Ren, Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption, 2024, 13, 2079-9292, 4478, 10.3390/electronics13224478 | |
137. | Guowei Fang, Yi Sun, Mutiq Almutiq, Wei Zhou, Yekang Zhao, Yongjun Ren, Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services, 2024, 28, 2168-2194, 6298, 10.1109/JBHI.2023.3272021 | |
138. | Meenakshi Kandpal, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, Rabindra Barik, Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach, 2024, 37, 0353-3670, 317, 10.2298/FUEE2402317K | |
139. | Ziyuan Zhou, Long Chen, Yekang Zhao, Xinyi Yang, Zhaoyang Han, Zheng He, Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration, 2024, 24, 1424-8220, 7487, 10.3390/s24237487 | |
140. | Nomula Ashok, T. Judgi, 2024, Advanced Techniques in Dynamic Key Management and Multilayered Security for Securing Cloud Infrastructures Using Key-Aggregate Encryption Method, 979-8-3315-1809-7, 1290, 10.1109/ICICNIS64247.2024.10823242 | |
141. | Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan, Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment, 2025, 25, 1424-8220, 550, 10.3390/s25020550 | |
142. | Yongjun Ren, Zhiming Wang, Pradip Kumar Sharma, Fayez Alqahtani, Amr Tolba, Jin Wang, Zero Trust Networks: Evolution and Application from Concept to Practice, 2025, 82, 1546-2226, 1593, 10.32604/cmc.2025.059170 | |
143. | Qianqi Sun, Fenhua Bai, An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain, 2024, 139, 1526-1506, 1733, 10.32604/cmes.2023.044558 | |
144. | Jin Wang, Guoshu Huang, R. Simon Sherratt, Ding Huang, Jia Ni, Data Secure Storage Mechanism for IIoT Based on Blockchain, 2024, 78, 1546-2226, 4029, 10.32604/cmc.2024.047468 | |
145. | Nothile C. Masango, Jeffrey O. Agushaka, Mercy C. Amaefule, Olutosin Taiwo, Peiying Zhang, Absalom E. Ezugwu, Kashif Saleem, Aseel Smerat, Laith Abualigah, Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism, 2025, 2025, 1687-1499, 10.1186/s13638-025-02439-y | |
146. | Akhilesh Sharma, Preeti Chandrakar, Saru Kumari, Chien-Ming Chen, FinSec: A Consortium Blockchain-Enabled Privacy-Preserving and Scalable Framework For Customer Data Protection In FinTech, 2025, 18, 1936-6442, 10.1007/s12083-025-01955-4 |