Author of the publication

High VHL Expression Reverses Warburg Phenotype and Enhances Immunogenicity in Kidney Tumor Cells.

, , , , , , , and . Genom. Proteom. Bioinform., 20 (4): 657-669 (August 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trusted de-swinging k-anonymity scheme for location privacy protection., , , , , , and . J. Cloud Comput., (2022)Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model., , , , and . J. Cloud Comput., 13 (1): 4 (December 2024)A mobile energy trading scheme based on Lightning Network., , , and . Concurr. Comput. Pract. Exp., (2023)Is semi-selfish mining available without being detected?, , , , , and . Int. J. Intell. Syst., 37 (12): 10576-10597 (December 2022)LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection., , , , , , , and . IEEE Access, (2019)DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity., , , , and . IEEE Access, (2020)A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature., , , , , , and . IEEE Access, (2019)Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games., , , , and . Symmetry, 15 (2): 443 (February 2023)An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model., , , , , and . J. Organ. End User Comput., 34 (10): 1-17 (2022)PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs., , , , , and . CoRR, (2021)