- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Mobile Agent-Based Network Management
- Adversarial Robustness in Machine Learning
- Network Traffic and Congestion Control
- Security and Verification in Computing
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- Security in Wireless Sensor Networks
- Cloud Computing and Resource Management
- UAV Applications and Optimization
- Cryptographic Implementations and Security
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Wireless Networks and Protocols
- IL-33, ST2, and ILC Pathways
- Distributed and Parallel Computing Systems
- Nuclear Receptors and Signaling
- Video Surveillance and Tracking Methods
Xinjiang University
2024-2025
Xidian University
2012-2025
Tianjin University
2024
Chongqing Medical University
2024
Jiangsu Normal University
2024
Tibet University
2024
The Affiliated Yongchuan Hospital of Chongqing Medical University
2024
Southeast University
2024
Tongji University
2023
Ministry of Ecology and Environment
2023
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems exist no comparative studies different same protocols and data. The motivation behind this competition compare performance state-of-the-art algorithms on database a unique evaluation method. Six teams from universities around world have participated in contest. Use or multiple motion, texture analysis liveness detection appears be trend competition. Most are able...
Vehicle detection and tracking technology plays an important role in intelligent transportation management control systems. This paper proposes a novel vehicle method for small target vehicles to achieve high accuracy based on the attention mechanism. We first develop new model (YOLOv5-NAM) by adding normalization-based module (NAM) classical YOLOv5s model. By exploiting YOLOv5-NAM as detector, we then propose real-time (JDE-YN), where feature extraction process is embedded prediction head...
Porous carbon-based hydrogel evaporators show extensive application potential in the field of solar-driven water evaporation due to their wide availability, excellent hydrophilicity, and abundant porous structure. However, closed pore structure single-molecule cross-linked high production cost nanoporous carbon materials not only affect salt resistance but also restrict its large-scale application. Herein, we developed a uniform APRC-PVA/PEG evaporator by integrating poly(vinyl alcohol)...
Circadian genes control most of the physiological functions in cancer cells, including cell proliferation, migration, and invasion. The CLOCK BMAL1 complex plays a central role circadian rhythms. Previous studies have shown that may act as oncogenes or tumor-suppressor genes. In addition, F-actin, regulated by RHOA, has been to participate tumor progression. However, roles regulation progression via RHOA-ROCK-CFL pathway remain largely unclear. Here we first indicate rearrangement F-actin is...
In this study, oxygen-doped carbon nitride (O–C 3 N 4 ) was prepared by thermal polymerization and applied to activate peroxymonosulfate (PMS) for tetracycline (TC) degradation.
This paper proposes a trust ant colony routing algorithm by introducing node evaluation model based on the D-S evidence theory into protocol to improve security of wireless sensor networks. To reduce influence conflict evidences caused malicious nods, consistent intensity is introduced preprocess before using combination rule reliability evaluation. The nodes with high values will be selected as insure security, and are used heuristic functions algorithm. simulation tests conducted network...
At present, the access control schemes in power grid are centralized. In centralized system, data of network sensor nodes is transmitted by nodes, and itself may be illegally tamped with or lost, which can lead to reduced system reliability. For this feature, we apply blockchain technology design schemes. paper, propose a blockchain-based scheme that suitable for multiple scenarios smart grid. Our based on an identity-based combined encryption, signature signcryption scheme. addition,...
The Southwest Alpine Canyon Area of China was one the regions in world that suffered from severe soil erosion. focus this research to understand response land use change on loss by water erosion alpine canyon Southeast Tibet, we analyzed characteristics temporal and spatial dynamics Niyang River Basin 1990 2020 using GIS statistical methods, assessed RUSLE model. For purpose, meteorological, soil, topographic, remote sensing data were collected. results showed area cropland construction...
For the first time, a tungsten coil (TC) was employed to trap Zn and Cd at room temperature release them by heating simultaneously.
The advances in deep neural networks (DNNs) have driven many companies to offer their carefully-trained DNNs as inference services for clients’ private data. privacy concerns increasingly motivated the need (PI), where DNN inferences are performed directly on encrypted data without revealing client’s inputs server or server’s proprietary weights client. However, existing cryptographic protocols PI suffer from impractically high latency, stemming mostly non-linear operators like ReLU...
Intelligent vehicles integrate offloading into traditional transportation systems and migrate tasks from resourceconstrained to other or infrastructures for collaborative through this technology, effectively improving the overall utility reducing task computing time. However, few of existing schemes have considered mobility characteristics vehicles, which leads frequent failures. In paper, we take future motion trajectory, resource load, delay account propose a dynamic scheme based on...
Abstract Bilinguals may choose to speak a language either at their own will or in response an external demand, but the underlying neural mechanisms two contexts is poorly understood. In present study, Chinese–English bilinguals named pairs of pictures three conditions: during forced-switch, naming altered between 1 and 2. During non-switch, used was same. free-naming, same different languages were participants' will. While behavioural switching costs observed free-naming forced-switching,...
As convolutional neural networks (CNNs) exhibit remarkable performance in various inference tasks, it is increasingly important to enable Internet of Things (IoT) devices perform CNN-based applications. Many companies provide their carefully trained as services for resource-constrained clients (e.g., IoT devices). However, the use CNN many applications raises privacy concerns. Cryptographic a way efficiently and, at same time, preserve both client's input data and server's proprietary model....