
Yufeng Liu
Articles
-
Dec 6, 2024 |
cell.com | Jinkyu Park |Muhammad Riaz |Lingfeng Qin |Wei Zhang |Saba Fooladi |Mehmet Kural | +26 more
Keywordsendothelial cellhuman induced pluripotent stem cellsingle ventricle congenital heart defecttissue-engineered vascular conduitflow bioreactorshear stress trainingGet full text accessLog in, subscribe or purchase for full access. References1. de Leval, M.R. ∙ Deanfield, J.E.Four decades of Fontan palliationNat. Rev. Cardiol. 2010; 7:520-5272. Hoffman, J.I.E. ∙ Kaplan, S. The incidence of congenital heart diseaseJ. Am. Coll. Cardiol. 2002; 39:1890-19003. Samánek, M.
-
Nov 29, 2024 |
pubs.acs.org | Yufeng Liu |Guiyuan Zhang |Dong Wei |Hao Zhang
-
Aug 1, 2024 |
nature.com | Linus Manubens-Gil |Yufeng Liu |Alessandro Bria |Lei Qu |Lin Gu |Weidong Cai | +20 more
Correction to: Nature Methods https://doi.org/10.1038/s41592-023-01848-5, published online 17 April 2023. In the version of the article initially published, the Acknowledgements did not include thanks to H. Mansvelder (Vrije Universiteit Amsterdam), C. de Kock (Vrije Universiteit Amsterdam), R. Benavides-Piccione and J. DeFelipe (Instituto Cajal - CSIC). Additionally, Supplementary Table 1 has been updated to separate rows 27 and 28.
-
Sep 1, 2023 |
arxiv.org | Hui Shen |Shankar Bhamidi |Yufeng Liu |Vladas Pipiras
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website. Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them. Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.
-
Jun 15, 2023 |
mdpi.com | Tao Feng |Yufeng Liu
Abstract:In the blockchain network, the communication delay between different nodes is a great threat to the distributed ledger consistency of each miner. Blockchain is the core technology of Bitcoin. At present, some research has proven the security of the PoW protocol when the number of delay rounds is small, but in complex asynchronous networks, the research is insufficient on the security of the PoW protocol when the number of delay rounds is large.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →