Rui Wang

ORCID: 0000-0001-7099-0968
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Advanced Decision-Making Techniques
  • Blockchain Technology Applications and Security
  • Security and Verification in Computing
  • Network Traffic and Congestion Control
  • User Authentication and Security Systems
  • Access Control and Trust
  • Corrosion Behavior and Inhibition
  • Metalloenzymes and iron-sulfur proteins
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Interconnection Networks and Systems
  • Advanced Optical Network Technologies
  • Advanced Authentication Protocols Security
  • Power Systems and Renewable Energy
  • Data Visualization and Analytics
  • Graph Theory and Algorithms
  • Sharing Economy and Platforms
  • Economic Development and Regional Competitiveness

Zhongyuan University of Technology
2024

State Grid Corporation of China (China)
2024

Google (United States)
2021-2023

First Research Institute of the Ministry of Public Security
2021-2022

Chongqing Metrology Quality Inspection and Research Institute
2019

Beijing Jiaotong University
2019

Shandong University of Science and Technology
2015-2018

Ningbo University
2018

Shandong University
2015-2016

State Key Laboratory of Microbial Technology
2016

Software-Defined Networking (SDN) and OpenFlow (OF) protocol have brought a promising architecture for the future networks. However, centralized control programmable characteristics also bring lot of security challenges. Distributed denial-of-service (DDoS) attack is still threat to SDN. To detect DDoS in SDN, many researches collect flow tables from switch do anomaly detection controller. But large scale network, collecting process burdens communication overload between switches Sampling...

10.1109/trustcom.2015.389 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2015-08-01

Acidithiobacillus caldus (A. caldus) is a common bioleaching bacterium that possesses sophisticated and highly efficient inorganic sulfur compound metabolism network. Thiosulfate, central intermediate in the network of A. other sulfur-oxidizing microorganisms, can be metabolized via tetrathionate (S4I) pathway catalyzed by thiosulfate:quinol oxidoreductase (Tqo or DoxDA) hydrolase (TetH). In caldus, there an additional two-component system called RsrS-RsrR. Since rsrS rsrR are arranged as...

10.3389/fmicb.2016.01755 article EN cc-by Frontiers in Microbiology 2016-11-03

To reduce cost, datacenter network operators are exploring blocking designs. An example of such a design is "spine-free" form Fat-Tree, in which pods directly connect to each other, rather than via spine blocks. maintain application-perceived performance the face dynamic workloads, these new designs must be able reconfigure routing and inter-pod topology. Gemini system designed achieve goals on commodity hardware while reconfiguring infrequently, rendering practical enough for deployment...

10.48550/arxiv.2110.08374 preprint EN other-oa arXiv (Cornell University) 2021-01-01

There exist a lot of medium access control (MAC) protocols for wireless sensor networks. However, they consider mainly energy efficiency rather than latency which is important in delay sensitive mobile Therefore, new MAC protocol called MS-MAC proposed suitable to both stationary and MSMAC uses an adaptive frame structure improved well known S-MAC overcome the performance problems caused by packets environment. The selection monitor nodes periodic scheduling synchronization are used predict...

10.14257/ijunesst.2016.9.6.09 article EN International Journal of u- and e- Service Science and Technology 2016-06-30

Software-Defined Networking (SDN) and OpenFlow have brought a promising architecture for the future networks. However, there are still lot of security challenges to SDN. To protect SDN from Distributed denial-of-service (DDoS) flooding attack, this paper extends flow entry counters adds mark action OpenFlow, then proposes an entropy-based distributed attack detection model, novel IP traceback source filtering response mechanism in with OpenFlow-based Deterministic Packet Marking. It achieves...

10.4018/ijisp.2015070102 article EN International Journal of Information Security and Privacy 2015-07-01

Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this very difficult to trace due strong anonymity Tor. Through conducting experiments in different network environment making analyzation security, results demonstrate effectiveness attack, strategy defense also discussed.

10.1051/matecconf/202133608007 article EN cc-by MATEC Web of Conferences 2021-01-01

As the carrier of knowledge, but also subject innovation elements, talents are extremely important for development industrial clusters. This paper focuses on siphon effect that shows aggregation as clusters, finding positive effects clusters and giving corresponding suggestions measures to enhance ability competitiveness

10.1109/fskd.2018.8687143 article EN 2018-07-01

The boom of Internet applications has resulted in ever increasing demands for new network services support. Different require different QoS, protocols and security mechanisms to be deployed the network. These demand evolve keep pace with change application requirements. Unfortunately, current Internet's functions are very hard expand cope changing environment. A extensible adaptive node architecture ENN is proposed this paper achieving an evolutionary New services, protocols, control...

10.1109/icnsc.2008.4525319 article EN 2008-04-01

According to the idea of zero trust, this paper proposed an anonymous identity authentication scheme based on hash functions and pseudo-random number generators, which effectively increased anonymity confidentiality when users use mobile networks, ensure security server. This first used single-packet technology realize application stealth. Secondly, generators were replace public key cryptosystems time synchronization systems, improved system performance. Thirdly, different methods set save...

10.1109/icpeca53709.2022.9718888 article EN 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA) 2022-01-21

甘蓝型油菜烯脂酰-CoA 还原酶基因 BnECR 的克隆及功能分析 倪 郁 张飞萃 王亚超 蒲 飞 王 瑞 柴友荣 李加纳 西南大学农学与生物科技学院, 重庆 400715 摘 要: 反式烯脂酰-CoA 还原酶(trans-2,3-enoyl-CoA reductase, ECR)是催化超长链脂肪酸(VLCFAs)合成的脂肪酰 -CoA 延长酶之一。根据已报道拟南芥 ECR 基因设计引物, 采用 RACE (rapid amplification of cDNA ends)方法从甘蓝 型油菜中克隆 的全长 序列和对应的基因组序列, 命名为 (GenBank 登录号分别为 FJ899705 和 FJ899706)。序列分析结果显示, 序列为 1 328 bp, 对应的基因组序列为 2 093 由 4 个外显子 组成, 在 ORF 的上

10.3724/sp.j.1006.2011.00424 article VI ACTA AGRONOMICA SINICA 2011-05-27

The expansion of the scale Power Internet Things stimulated by development Energy makes growth in demand for effective authentication and access control technologies cross-domain data exchange. Based on cross-chain technology blockchain cuckoo filter, this paper proposes a scheme Things. Firstly, architecture is established. Combined with existing used intra-domain authentication, process based proposed to realize automatic transmission credentials from application domain domain. filter...

10.1155/2023/4778967 article EN Wireless Communications and Mobile Computing 2023-04-29

Three prominent traffic features including peak alignment, stable ranking, and gravity model, have guided the design of current Google Jupiter fabrics in engineering, topology capacity planning.

10.1364/ofc.2023.w3a.2 article EN Optical Fiber Communication Conference (OFC) 2022 2023-01-01

In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its capability generating public key from node identity directly, compared with traditional...

10.1155/2023/6187353 article EN Journal of Sensors 2023-07-19

Cloud computing network is a comprehensive system with high performance and super service capability, which mainly integrated several relative low-cost entities through cloud technology. Through research of technology task classification scheduling load balance cluster, we integrate effectively this two kinds technologies meet the basic requirement preliminary. System test result shows that more efficient stable. Load implemented by virtual VIP technology, can bear large number concurrent...

10.1117/12.887707 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2010-12-26
Coming Soon ...