- Blockchain Technology Applications and Security
- Spam and Phishing Detection
- Cybercrime and Law Enforcement Studies
- Crime, Illicit Activities, and Governance
- Advanced machining processes and optimization
- Industrial Vision Systems and Defect Detection
- Network Security and Intrusion Detection
- Advanced Machining and Optimization Techniques
- Advanced Malware Detection Techniques
- AI in Service Interactions
- Topic Modeling
- Data Quality and Management
- Fault Detection and Control Systems
- Immune Response and Inflammation
- Probiotics and Fermented Foods
- Big Data and Business Intelligence
- User Authentication and Security Systems
- Cryptography and Data Security
- Metal Alloys Wear and Properties
- Laser Material Processing Techniques
- FinTech, Crowdfunding, Digital Finance
- Speech and dialogue systems
- Immunotherapy and Immune Responses
- Digital Transformation in Industry
- Internet Traffic Analysis and Secure E-voting
Beijing University of Posts and Telecommunications
2021-2023
Nanchang University
2021-2023
Columbia University
2023
Agency for Science, Technology and Research
2020-2021
The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized (DEXs) are introduced to allow users trade without transferring custody their assets middlemen, thus eliminating security and privacy issues traditional CEX. Uniswap, as most prominent DEX, is continuing attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect characterize scam tokens on...
DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can easily be taken down authorities and registrars. Due this, there have efforts build a decentralized name service gives greater control owners. The Ethereum Name Service (ENS) is major example. Yet, no existing work systematically studied this emerging system, particularly regarding security misbehavior. To address...
Gamma-aminobutyric acid (GABA) has positive effects on many physiological processes. Lactic bacterial production of GABA is a future trend. This study aimed to produce sodium-ion-free fermentation process for Levilactobacillus brevis CD0817. In this fermentation, both the seed and media used L-glutamic instead monosodium L-glutamate as substrate. We optimized key factors influencing formation, adopting Erlenmeyer flask fermentation. The values glucose, yeast extract, Tween 80, manganese ion,...
Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our community. In work, we...
Traditionally, there are two major limitations for machine learning (ML)-assisted manufacturing applications. First, it would require a tremendous amount of manual data annotations ML models. Second, models often learned offline and unable to capture the dynamism adapt changes over time. In this paper, we propose framework based on concept cognitive analytics with unsupervised health monitoring, anomaly detection predictive maintenance. The experimental results an industrial robot...
The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized (DEXs) are introduced to allow users trade without transferring custody their assets middlemen, thus eliminating security and privacy issues traditional CEX. Uniswap, as most prominent DEX, is continuing attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect characterize scam tokens on...
DNS has always been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks. Besides, domain names are not fully controlled by users, which can be easily taken down authorities and registrars. Since blockchain unique properties like immutability decentralization, it seems promising build a decentralized name service on blockchain. Ethereum Name Service (ENS), as novel built atop Etheruem, received great attention from community. Yet, no existing work...
The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Uniswap, as most prominent decentralized exchange (DEX), is continuing to attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect and characterize scam tokens on Uniswap. We investigate landscape Uniswap from different perspectives based its transactions. Then, propose an accurate approach flagging have identified over 10K listed which...
In advanced manufacturing industries, there is a need to monitor the health of tools with aim enhancing its lifetime. Often due several reasons such as cost and time, many organizations are faced difficulty in collecting complete degradation data for monitoring tool. As such, this makes tool wear prognostics challenging problem real world. Although have been number studies on prognosis, where unavailable still challenge. This paper presents framework prognosis when limited. First, we present...
In advanced manufacturing, the tool quality is critical to ensure product quality, and thus needs be closely monitored. However, directly measuring can time-consuming impractical for continuous manufacturing. this work, leveraging on Internet of Things (IoT) infrastructure machine learning techniques, two important metrics turning machinery tools, namely surface roughness flank wear, are modeled using easily available sensory data from machines, including vibration data, force cutting...
Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth cryptocurrency-themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our...
Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth cryptocurrency-themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our...
The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At same time, attacks on DeFi applications (apps) are increasing. However, to best our knowledge, existing smart contract vulnerability detection tools cannot directly detect attacks. That's because they lack capability recover and understand high-level semantics, e.g., a user trades token pair <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">X</monospace>...
The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Uniswap, as most prominent decentralized exchange (DEX), is continuing to attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect and characterize scam tokens on Uniswap. We investigate landscape Uniswap from different perspectives based its transactions. Then, propose an accurate approach flagging have identified over 10K listed which...
Maintaining a consistent persona is key quality for any open domain dialogue system. Current state-of-the-art systems do this by training agents with supervised learning or online reinforcement (RL). However, trained often lack consistency as they are never punished uttering contradictions. Additional RL can alleviate some of these issues, however the process expensive. Instead, we propose an offline framework to improve systems. Our allows us combine advantages previous methods...
Maintaining a consistent persona is key quality for any open domain dialogue system. Current state-of-the-art systems do this by training agents with supervised learning or online reinforcement (RL). However, trained often lack consistency as they are never punished uttering contradictions. Additional RL can alleviate some of these issues, however the process expensive. Instead, we propose an offline framework to improve systems. Our allows us combine advantages previous methods...
The research of location privacy protection has a very important significance for the emergence and sustenance web-based communities in big data era. method differential position is model strictly measurement privacy. However, under multi-positions, it will bring much bigger errors by adopting adding noise to protect multi-positions. In this paper, author puts forward new multi-positions based on mechanism centroid positions compares with independent noise. experiment shows that better than...