- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Face recognition and analysis
- Cloud Data Security Solutions
- Mathematical Control Systems and Analysis
- Opportunistic and Delay-Tolerant Networks
- Market Dynamics and Volatility
- Radar Systems and Signal Processing
- Privacy, Security, and Data Protection
- Fractal and DNA sequence analysis
- Transport and Logistics Innovations
- Olfactory and Sensory Function Studies
- Vehicular Ad Hoc Networks (VANETs)
- Topic Modeling
- Business Process Modeling and Analysis
- Wireless Signal Modulation Classification
- Big Data and Business Intelligence
- Financial Markets and Investment Strategies
- Face Recognition and Perception
- Advanced Data Processing Techniques
- Blockchain Technology Applications and Security
- Islamic Finance and Banking Studies
- Color perception and design
- Generative Adversarial Networks and Image Synthesis
- Linguistics and Cultural Studies
Inner Mongolia University
2024
Northwest Normal University
2023
CentraleSupélec
2023
Institut d'Électronique et des Technologies du numéRique
2023
University of Colorado Boulder
2022
Nanjing University of Information Science and Technology
2011
Jiangxi Normal University
2005
In this paper, we adopt the classification of personal information and hierarchy services to build a privacy system, in which one communicates with each other via pipes different security levels. level, has corresponding rights access other. The requesters are not able be infringed based on that service obtains from providers. Privacy system can decrease interaction, while circumstance strengthens enhances preserving. Thus strike balance between two goals Ubiquitous Computing: interaction
The Intelligent Transportation System (ITS) is an important part of modern transportation infrastructure, employing a combination communication technology, information processing and control systems to manage networks. This integration various components such as roads, vehicles, systems, expected improve efficiency safety by providing better information, services, coordination modes. In recent years, graph-based machine learning has become increasingly research focus in the field ITS aiming...
Recent deep-learning techniques have made it possible to manipulate facial expressions in digital photographs or videos, however, these still lack fine and personalized ways control their creation. Moreover, current technologies are highly dependent on large labeled databases, which limits the range complexity of that can be modeled. Thus, cannot deal with non-basic emotions. In this paper, we propose a novel interdisciplinary approach combining Generative Adversarial Network (GAN) technique...
Facial expression-based technologies have flooded our daily lives. However, most are limited to Ekman's basic facial expressions and rarely deal with more than ten emotional states. This is not only due the lack of prototypes for complex emotions but also time-consuming laborious task building an extensive labeled database. To remove these obstacles, we were inspired by a psychophysical approach affective computing, so-called reverse correlation process (RevCor), extract mental what given...
Edge computing bring storage, computing, processing, and networking closer to the devices that generate or consume data than traditional models based entirely on cloud, which is a set of edge technologies. nodes take some encryption decryption work for users, reducing network latency computational burden lightweight end certain extent. Attribute-based algorithm combined with searchable algorithm, achieve flexible access search encrypted data. Access policies are usually published in plain...