Dinghua Wang

ORCID: 0000-0001-6705-1652
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Tunneling and Rock Mechanics
  • Advanced Surface Polishing Techniques
  • Advanced machining processes and optimization
  • Drilling and Well Engineering
  • Network Security and Intrusion Detection
  • Metal Alloys Wear and Properties
  • Advanced materials and composites
  • Internet Traffic Analysis and Secure E-voting
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing

National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2022-2023

With the substantial increase in number of smart cars, vehicular ad hoc network (VANET), where data can be shared between vehicles to enrich existing vehicle services and improve driving safety, is gaining more attention, thus creating a efficient intelligent transportation system. Moreover, in-depth research development 6G AI technology further strengthen interconnection various entities VANET realize edge intelligence, which fundamentally enhances efficiency sharing. However, reliable...

10.1155/2022/5031112 article EN Wireless Communications and Mobile Computing 2022-07-19

This paper introduces a process route for remanufacturing repair disc cutter rings (hereinafter referred to as rings) employed in Full-face rock tunnel boring machines (TBMs) based on Metal Active Gas Arc Welding (MAG). The study centers two key thermal treatment processes, namely preheating and post-weld tempering. research finite element (FE) simulation experimental methods investigate the impact of these processes performance with uniform wear. Simulation analysis revealed that absence...

10.2139/ssrn.4522360 preprint EN 2023-01-01

An anonymous proxy system, such as Shadowsocks, creates a secure tunnel between the user and server, effectively concealing raw traffic from any network elements along transmission path. While this enhances privacy, it also presents challenge for inspection. Identifying application associated with is crucial, but can be challenging task when dealing encrypted over Shadowsocks. Current research on analysis assumes that bi-directional used testing. However, in reality, inspection typically...

10.1109/dsc59305.2023.00086 article EN 2023-08-18
Coming Soon ...