Publications by authors named "Zhaowei Hu"

Background: Chronic rejection is a major cause of long-term kidney allograft failure, characterized by persistent inflammation and progressive fibrosis. Macrophages are central mediators of this process, but their phenotypic heterogeneity and regulatory mechanisms in chronic rejection remain incompletely understood.

Methods: We performed single-cell transcriptomic analysis on renal allograft biopsies from patients with different types of rejection and on a time-course rat model of chronic rejection.

View Article and Find Full Text PDF

To address privacy leakage risks arising from low collaborative user engagement, third-party trust deficits, and insufficient collaboration timeliness in location-based services (LBS), this paper proposes a dual-protection framework integrating blockchain technology and threshold cryptography for safeguarding location privacy. The framework employs asymmetric encryption with Shamir's (t, n) secret sharing to encrypt user queries, distributing decryption key fragments to collaborative users while generating n anonymous service requests through location generalization strategies. A temporary private blockchain constructed using smart contracts ensures confidential data transmission, supported by a dynamic privacy parameter configuration system based on Byzantine fault tolerance.

View Article and Find Full Text PDF

The discovery and synthesis of new NLO materials in the ultraviolet (UV) region are crucial to developing laser technology. The chemical substitution strategy is an effective pathway to design potential UV or DUV NLO crystals. Herein, two new compounds, KNaCaY(BO) and KNaCaLu(BO), have been synthesized using KBO·4HO as the template.

View Article and Find Full Text PDF

Various methods such as k-anonymity and differential privacy have been proposed to safeguard users' private information in the publication of location service data. However, these typically employ a rigid "all-or-nothing" privacy standard that fails to accommodate users' more nuanced and multi-level privacy-related needs. Data is irrecoverable once anonymized, leading to a permanent reduction in location data quality, in turn significantly diminishing data utility.

View Article and Find Full Text PDF

It is a new attack model to mine user's activity rule from user's massive data. In order to solve the privacy leakage problem caused by user tendency in current privacy preserving methods, an extended differential privacy preserving method based on user's tendency is proposed in the paper. By constructing a Markov chain, and using the Markov decision process, it equivalently expresses user's tendency as measurable state transition probability, which can transform qualitative descriptions of user's tendency into a quantitative representation to achieve an accurate measurement of the user tendency.

View Article and Find Full Text PDF

Unlabelled: Lithium-ion capacitors (LICs) are promising energy storage devices because they feature the high energy density of lithium-ion batteries and the high power density of supercapacitors. However, the mismatch of electrochemical reaction kinetics between the anode and cathode in LICs makes exploring anode materials with fast ion diffusion and electron transfer channels an urgent task. Herein, the two-dimensional (2D) TiC MXene with controllable terminal groups was introduced into 1D carbon nanofibers to form a 3D conductive network by the electrospinning strategy.

View Article and Find Full Text PDF

Birefringent materials are key components to control the light polarization in laser science and technology as well as optical communication. However, the performance of current commercial birefringent materials has been limited by the magnitude of birefringence, optical transparency range, or the attainability of large-scale single crystals. To explore new birefringent materials, we strategically incorporated a lone pair cation (Se) with large optical anisotropy, an alkali metal, and halogen ions (Rb and Cl) with superior UV transparent capacity; thus a new compound, RbCl·(HSeO), was successfully discovered with the aid of the facile hydrothermal method.

View Article and Find Full Text PDF

Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed. By protecting sensitive location points on the trajectory and their affiliated sensitive points, this method combines the sensitivity of the user's trajectory location and user privacy protection requirements and privacy budget to propose a (R,Ɛ) -extended differential privacy protection model. Using autocorrelation Laplace transform, specific Gaussian white noise is transformed into noise that is related to the user's real trajectory sequence in both time and space.

View Article and Find Full Text PDF

Boride-based cermet can serve as a good protective coating for low-corrosion and wear-resistant materials, such as carbon steels, due to their mechanical and chemical properties. In this study, MB (M: Mo, Ni, Fe, and Cr) boride-based cermet coatings were fabricated on Q235 steel with mixed powders of Mo, B, Ni60, and Cr by laser cladding synthesis, and the effects of laser power on the properties of the cermet layer were investigated. Three laser powers (2200, 2500, and 2800 W) were used at the same scanning speed.

View Article and Find Full Text PDF