skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The DOI auto-population feature in the Public Access Repository (PAR) will be unavailable from 4:00 PM ET on Tuesday, July 8 until 4:00 PM ET on Wednesday, July 9 due to scheduled maintenance. We apologize for the inconvenience caused.


Search for: All records

Creators/Authors contains: "Wang, Xin"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available April 3, 2026
  2. Free, publicly-accessible full text available March 1, 2026
  3. Magnesium (Mg) alloys are promising lightweight structural materials whose limited strength and room‐temperature ductility limit applications. Precise control of deformation‐induced twinning through microstructural alloy design is being investigated to overcome these deficiencies. Motivated by the need to understand and control twin formation during deformation in Mg alloys, a series of magnesium‐yttrium (Mg–Y) alloys are investigated using electron backscatter diffraction (EBSD). Analysis of EBSD maps produces a large dataset of microstructural information for >40000 grains. To quantitatively determine how processing parameters and microstructural features are correlated with twin formation, interpretable machine learning (ML) is employed to statistically analyze the individual effects of microstructural features on twinning. An ML classifier is trained to predict the likelihood of twin formation, given inputs including grain microstructural information and synthesis and deformation conditions. Then, feature selection is used to score the relative importance of these inputs for twinning in Mg–Y alloys. It is determined that using information only about grain size, grain orientation, and total applied strain, the ML model can predict the presence of twinning and that other parameters do not significantly contribute to increasing the model's predictive accuracy. Herein, the utility of ML for gaining new fundamental insights into materials processing is illustrated. 
    more » « less
    Free, publicly-accessible full text available April 18, 2026
  4. Abstract Metallic materials under high stress often exhibit deformation localization, manifesting as slip banding. Over seven decades ago, Frank and Read introduced the well-known model of dislocation multiplication at a source, explaining slip band formation. Here, we reveal two distinct types of slip bands (confined and extended) in compressed CrCoNi alloys through multi-scale testing and modeling from microscopic to atomic scales. The confined slip band, characterized by a thin glide zone, arises from the conventional process of repetitive full dislocation emissions at Frank–Read source. Contrary to the classical model, the extended band stems from slip-induced deactivation of dislocation sources, followed by consequent generation of new sources on adjacent planes, leading to rapid band thickening. Our findings provide insights into atomic-scale collective dislocation motion and microscopic deformation instability in advanced structural materials. 
    more » « less
    Free, publicly-accessible full text available April 16, 2026
  5. Abstract Cyanobacteria contribute to roughly a quarter of global net carbon fixation. During diel light/dark growth, dark respiration substantially lowers the overall photosynthetic carbon yield in cyanobacteria and other phototrophs. How respiratory pathways participate in carbon resource allocation at night to optimize dark survival and support daytime photosynthesis remains unclear. Here, using the cyanobacterium Synechococcus elongatus PCC 7942, we show that phosphoketolase integrates into a respiratory network in the dark to best allocate carbon resources for amino acid biosynthesis and to prepare for photosynthesis reinitiation upon photoinduction. Moreover, we show that the respiratory Entner–Doudoroff pathway in S. elongatus is incomplete, with its key enzyme 2-keto-3-deoxy-6-phosphogluconate aldolase exhibiting alternative oxaloacetate decarboxylation activity that modulates daytime photosynthesis. This activity allows for the bypassing of the tricarboxylic acid cycle when ATP and NADPH consumption for biosynthesis is excessive and imbalanced relative to their production by the light reactions, thereby preventing relative NADPH accumulation and ensuring optimal photosynthetic carbon yield. Optimizing these metabolic processes offers opportunities to enhance photosynthetic carbon yield in cyanobacteria and other photosynthetic organisms under diel light/dark cycles. 
    more » « less
    Free, publicly-accessible full text available December 23, 2025
  6. Free, publicly-accessible full text available March 30, 2026
  7. Free, publicly-accessible full text available October 1, 2025
  8. Emerging technologies drive the ongoing transformation of Intelligent Transportation Systems (ITS). This transformation has given rise to cybersecurity concerns, among which data poisoning attack emerges as a new threat as ITS increasingly relies on data. In data poisoning attacks, attackers inject malicious perturbations into datasets, potentially leading to inaccurate results in offline learning and real-time decision-making processes. This paper concentrates on data poisoning attack models against ITS. We identify the main ITS data sources vulnerable to poisoning attacks and application scenarios that enable staging such attacks. A general framework is developed following rigorous study process from cybersecurity but also considering specific ITS application needs. Data poisoning attacks against ITS are reviewed and categorized following the framework. We then discuss the current limitations of these attack models and the future research directions. Our work can serve as a guideline to better understand the threat of data poisoning attacks against ITS applications, while also giving a perspective on the future development of trustworthy ITS. Emerging technologies drive the ongoing transformation of Intelligent Transportation Systems (ITS). This transformation has given rise to cybersecurity concerns, among which data poisoning attack emerges as a new threat as ITS increasingly relies on data. In data poisoning attacks, attackers inject malicious perturbations into datasets, potentially leading to inaccurate results in offline learning and real-time decision-making processes. This paper concentrates on data poisoning attack models against ITS. We identify the main ITS data sources vulnerable to poisoning attacks and application scenarios that enable staging such attacks. A general framework is developed following rigorous study process from cybersecurity but also considering specific ITS application needs. Data poisoning attacks against ITS are reviewed and categorized following the framework. We then discuss the current limitations of these attack models and the future research directions. Our work can serve as a guideline to better understand the threat of data poisoning attacks against ITS applications, while also giving a perspective on the future development of trustworthy ITS. 
    more » « less
    Free, publicly-accessible full text available August 1, 2025
  9. Free, publicly-accessible full text available August 7, 2025
  10. Free, publicly-accessible full text available October 21, 2025