期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Reaction environment self-modification on low-coordination Ni^(2+)octahedra atomic interface for superior electrocatalytic overall water splitting 被引量:14
1
作者 Kaian Sun Lei Zhao +12 位作者 Lingyou Zeng Shoujie Liu Houyu Zhu Yanpeng Li Zheng Chen Zewen Zhuang Zhaoling Li Zhi Liu Dongwei Cao Jinchong Zhao Yunqi Liu Yuan Pan Chen Chen 《Nano Research》 SCIE EI CAS CSCD 2020年第11期3068-3074,共7页
Large scale synthesis of high-efficiency bifunctional electrocatalyst based on cost-effective and earth-abundant transition metal for overall water splitting in the alkaline environment is indispensable for renewable ... Large scale synthesis of high-efficiency bifunctional electrocatalyst based on cost-effective and earth-abundant transition metal for overall water splitting in the alkaline environment is indispensable for renewable energy conversion.In this regard,meticulous design of active sites and probing their catalytic mechanism on both cathode and anode with different reaction environment at molecular-scale are vitally necessary.Herein,a coordination environment inheriting strategy is presented for designing low-coordination Ni^(2+)octahedra(L-Ni-8)atomic interface at a high concentration(4.6 at.%).Advanced spectroscopic techniques and theoretical calculations reveal that the self-matching electron delocalization and localization state at L-Ni-8 atomic interface enable an ideal reaction environment at both cathode and anode.To improve the efficiency of using the self-modification reaction environment at L-Ni-8,all of the structural features,including high atom economy,mass transfer,and electron transfer,are integrated together from atomic-scale to macro-scale.At high current density of 500 mA/cm2,the samples synthesized at gram-scale can deliver low hydrogen evolution reaction(HER)and oxygen evolution reaction(OER)overpotentials of 262 and 348 mV,respectively. 展开更多
关键词 atomic interface effect overall water splitting high current density reaction environment self-modification density functional theory
原文传递
A Smart Obfuscation Approach to Protect Software in Cloud
2
作者 Lei Yu Yucong Duan 《Computers, Materials & Continua》 SCIE EI 2023年第9期3949-3965,共17页
Cloud computing and edge computing brought more software,which also brought a new danger of malicious software attacks.Data synchronization mechanisms of software can further help reverse data modifications.Based on t... Cloud computing and edge computing brought more software,which also brought a new danger of malicious software attacks.Data synchronization mechanisms of software can further help reverse data modifications.Based on the mechanisms,attackers can cover themselves behind the network and modify data undetected.Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks,when attackers intrude cloud server to access the source or binary codes.Therefore,we proposed a novel method to resist this kind of reverse engineering by breaking these rules.Our method is based on software obfuscations and encryptions to enhance the security of distributed software and cloud services in the 5G era.Our method is capable of(1)replacing theoriginal assembly codes of theprotectedprogramwithequivalent assembly instructions inan iteration way,(2)obfuscating the control flow of the protected program to confuse attackers meanwhile keeps the program producing the same outputs,(3)encrypting data to confuse attackers.In addition,the approach can periodically and automatically modify the protected software binary codes,and the binary codes of the protected software are encrypted to resist static analysis and dynamic analysis.Furthermore,a simplified virtual machine is implemented to make the protected codes unreadable to attackers.Cloud game is one of the specific scenarios which needs low latency and strong data consistency.Cheat engine,Ollydbg,and Interactive Disassembler Professional(IDA)are used prevalently for games.Our improved methods can protect the software from the most vulnerable aspects.The improved dynamic code swapping and the simplified virtual machine technologies for cloud games are the main innovations.We inductively learned that our methods have been working well according to the security mechanisms and time complexity analysis.Experiments show that hidden dangers can be eliminated with efficient methods:Execution time and file sizes of the target codes can be multiple times than that of the original program codes which depend on specific program functions. 展开更多
关键词 OBFUSCATION self-modification ENCRYPTION edge computing
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部