- Optical Wireless Communication Technologies
- Indoor and Outdoor Localization Technologies
- Semiconductor Lasers and Optical Devices
- Mobile Ad Hoc Networks
- Speech and Audio Processing
- Network Security and Intrusion Detection
- Photonic and Optical Devices
- Anomaly Detection Techniques and Applications
- Advanced Photonic Communication Systems
- IoT and Edge/Fog Computing
- Retinal Imaging and Analysis
- Opportunistic and Delay-Tolerant Networks
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- Cerebrovascular and Carotid Artery Diseases
- Service-Oriented Architecture and Web Services
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Intracranial Aneurysms: Treatment and Complications
- Wireless Communication Security Techniques
- Advanced Wireless Communication Technologies
- Corporate Finance and Governance
- Wireless Signal Modulation Classification
- Advanced Authentication Protocols Security
- Photonic Crystals and Applications
Chengdu University
2007-2025
Sichuan University
2015-2025
Shanghai University of International Business and Economics
2022-2025
Tsinghua Sichuan Energy Internet Research Institute
2022-2023
National Chung Hsing University
2021-2022
Guizhou University
2021-2022
Pfizer (United Kingdom)
2021
Shanghai University of Finance and Economics
2020
Sichuan Academy Of Social Sciences
2020
Chang Gung University
2013
In recent years, microblog systems such as Twitter and Sina Weibo have averaged multimillion active users. On the other hand, system has become a new means of rumor-spreading platform. this paper, we investigate machine-learning-based rumor identification approaches. We observed that feature design selection stronger impact on accuracy than machine-learning algorithms. Meanwhile, publishers' behavior may diverge from normal users', post different responses post. However, mass posts not been...
Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify transactions in applications. Although the TTP-based paradigm provides customers with convenience, it causes a whole set of inevitable problems such security threats, privacy vulnerabilities, censorship. The is not suitable all modern networks, e.g., 5G beyond which been evolving support ubiquitous, decentralized, autonomous services. Driven by vision blockchain technologies, there has shift...
Abstract Background Exposure to environmental endocrine‐disrupting chemicals ( EDC s) is associated with allergy, chronic inflammation, and immunodeficiency. Phthalates, the common s used in plastic industry, may act as adjuvants disrupt immune system enhance allergy. Plasmacytoid DC pDC are predominant cells secreting type I interferon IFN ) against infection professional antigen‐presenting regulating adaptive immunity. However, effects of phthalates on function unknown. Methods Circulating...
An intracranial aneurysm is a cerebrovascular disorder that can result in various diseases. Clinically, diagnosis of an utilizes digital subtraction angiography (DSA) modality as gold standard. The existing automatic computer-aided (CAD) research studies with DSA were based on classical image processing (DIP) methods. However, the feature extraction methods badly hampered by complex vascular distribution, and sliding window time-consuming during searching extraction. Therefore, developing...
Limited biomarkers have been identified as prognostic predictors for stage III colon cancer. To combat this shortfall, we developed a computer-aided approach which combing convolutional neural network with machine classifier to predict the prognosis of cancer from routinely haematoxylin and eosin (H&E) stained tissue slides. We trained model by using 101 cancers West China Hospital (WCH). The predictive effectivity was validated 67 WCH 47 Cancer Genome Atlas Colon Adenocarcinoma database....
Advanced metering infrastructure (AMI) is a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication key agreement (AKA) protocol needed AMI systems to ensure confidentiality integrity communication data. Since devices are connected open network generally deployed outdoors with limited computation, communication, storage, designing suitable AKA challenging task. Researchers still looking good ways make SG secure efficient...
Active speaker detection is a challenging task in audiovisual scenarios, with the aim to detect who speaking one or more scenarios. This has received considerable attention because it crucial many applications. Existing studies have attempted improve performance by inputting multiple candidate information and designing complex models. Although these methods achieved excellent performance, their high memory computational power consumption render application resource-limited scenarios...
In this paper, we examine the impact of eponymy (i.e. naming a firm after its owner) on innovation activity firms. We report that eponymous firms generally have lower level innovation, specifically, fewer patents. After classifying total patents into invention patents, utility model and design find reduced levels are predominantly evident in decreased numbers Our findings robust employing alternative measures propensity score matching, regression methods. difference-in-differences to address...
Internet of Things (IoT) user authentication protocols enable secure and session key negotiation between users IoT devices via an intermediate server, allowing to access sensor data or control remotely. However, the existing schemes often assume that servers (registration center servers) are fully trusted, overlooking potential risk insider attackers. Moreover, most lack critical security properties, such as resistance ephemeral secret leakage attacks offline password guessing attacks, they...
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor networks (WSNs) face potential threats due to various attacks, among which the most threatening attack is wormhole attack. Wormhole severely imperils WSNs difficult be detected, for it causes incorrect routing by private tunnels damages in terms of data leakage, dropping, delayed delivery. However, existing solutions based on additional hardware, incur high communication overhead, or fail give...
Due to the great success of Vision Transformer (ViT) in image classification tasks, many pure architectures for human action recognition have been proposed. However, very few works attempted use conduct bimodal recognition, i.e., both skeleton and RGB modalities recognition. As proved previous works, modality are complementary each other tasks. How a Transformer-based framework is challenge. In this paper, we propose RGBSformer, novel two-stream using modalities. Using only videos, can...
In this paper, we propose and demonstrate a secure private non-orthogonal multiple access (NOMA) based visible light communication (VLC) system.Orthogonal frequency division multiplexing (OFDM) modulation is applied in the system two-level chaotic encryption scheme further implemented, which can guarantee both security of legitimate users against eavesdroppers privacy among all users.An experimental demonstration with two one eavesdropper successfully verifies feasibility proposed NOMA VLC...
Due to sulfur agglomeration and drastic volume expansion during charging, a significant challenge for lithium–sulfur battery applications is achieve favorable energy densities while realizing substantial loading.
Recently, the use of wireless channel state information (CSI) to generate encryption keys in physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on variability channel, reciprocity, and spatial decorrelation ensure security, making it more lightweight providing strong randomness. This article proposes a key generation scheme for LAN MIMO systems based feature fusion autoencoder (FFAEncoder) address issue high disagreement rate...
Reliable and robust airport flight ground service resources collaborative scheduling has emerged as an issue of major concern at congested airports, which great significance on quality operation efficiency. Due to the uncertainty process multiple vehicles in operations, combination simulation optimization (sim-opt) techniques been proven be effective means solve problem. However, existing models still have limitations reliability feasible solutions robustness evaluations. In this work, we...
Angle-based localization of a source at unique coordinates in the three-dimensional (3-D) space utilizes traditionally two-dimensional (2-D) angle arrival (AOA) measurements from planar arrays. This paper investigates positioning performance and develops an optimal solution for 3-D using one-dimensional (1-D) (SA) that has appeal involving linear arrays only. The by SA is less understood algorithms literature are suboptimal have restrictions on altitudes orientations array receivers....
In the Industrial Internet, computing- and power-limited mobile devices (MDs) in production process can hardly support computation-intensive or time-sensitive applications. As a new computing paradigm, edge (MEC) almost meet requirements of latency calculation by handling tasks approximately close to MDs. However, limited battery capacity MDs causes unreliable task offloading MEC, which will increase system overhead reduce economic efficiency manufacturing actual production. To make scheme...
Locating a device is basic element for many Internet of Things (IoT) applications. In particular, it often demands an algorithm having low complexity to limit the energy consumption and most important, sufficient robustness without knowing in near-field point localization or far-field direction arrival (DOA) estimation. This article proposes new that can achieve two purposes, with theoretical analysis validate optimal accuracy real data experiment support promising performance. The first...