- Software-Defined Networks and 5G
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Advanced Decision-Making Techniques
- Blockchain Technology Applications and Security
- Security and Verification in Computing
- Network Traffic and Congestion Control
- User Authentication and Security Systems
- Access Control and Trust
- Corrosion Behavior and Inhibition
- Metalloenzymes and iron-sulfur proteins
- Privacy-Preserving Technologies in Data
- Cryptographic Implementations and Security
- Interconnection Networks and Systems
- Advanced Optical Network Technologies
- Advanced Authentication Protocols Security
- Power Systems and Renewable Energy
- Data Visualization and Analytics
- Graph Theory and Algorithms
- Sharing Economy and Platforms
- Economic Development and Regional Competitiveness
Zhongyuan University of Technology
2024
State Grid Corporation of China (China)
2024
Google (United States)
2021-2023
First Research Institute of the Ministry of Public Security
2021-2022
Chongqing Metrology Quality Inspection and Research Institute
2019
Beijing Jiaotong University
2019
Shandong University of Science and Technology
2015-2018
Ningbo University
2018
Shandong University
2015-2016
State Key Laboratory of Microbial Technology
2016
Software-Defined Networking (SDN) and OpenFlow (OF) protocol have brought a promising architecture for the future networks. However, centralized control programmable characteristics also bring lot of security challenges. Distributed denial-of-service (DDoS) attack is still threat to SDN. To detect DDoS in SDN, many researches collect flow tables from switch do anomaly detection controller. But large scale network, collecting process burdens communication overload between switches Sampling...
Acidithiobacillus caldus (A. caldus) is a common bioleaching bacterium that possesses sophisticated and highly efficient inorganic sulfur compound metabolism network. Thiosulfate, central intermediate in the network of A. other sulfur-oxidizing microorganisms, can be metabolized via tetrathionate (S4I) pathway catalyzed by thiosulfate:quinol oxidoreductase (Tqo or DoxDA) hydrolase (TetH). In caldus, there an additional two-component system called RsrS-RsrR. Since rsrS rsrR are arranged as...
To reduce cost, datacenter network operators are exploring blocking designs. An example of such a design is "spine-free" form Fat-Tree, in which pods directly connect to each other, rather than via spine blocks. maintain application-perceived performance the face dynamic workloads, these new designs must be able reconfigure routing and inter-pod topology. Gemini system designed achieve goals on commodity hardware while reconfiguring infrequently, rendering practical enough for deployment...
There exist a lot of medium access control (MAC) protocols for wireless sensor networks. However, they consider mainly energy efficiency rather than latency which is important in delay sensitive mobile Therefore, new MAC protocol called MS-MAC proposed suitable to both stationary and MSMAC uses an adaptive frame structure improved well known S-MAC overcome the performance problems caused by packets environment. The selection monitor nodes periodic scheduling synchronization are used predict...
Software-Defined Networking (SDN) and OpenFlow have brought a promising architecture for the future networks. However, there are still lot of security challenges to SDN. To protect SDN from Distributed denial-of-service (DDoS) flooding attack, this paper extends flow entry counters adds mark action OpenFlow, then proposes an entropy-based distributed attack detection model, novel IP traceback source filtering response mechanism in with OpenFlow-based Deterministic Packet Marking. It achieves...
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this very difficult to trace due strong anonymity Tor. Through conducting experiments in different network environment making analyzation security, results demonstrate effectiveness attack, strategy defense also discussed.
As the carrier of knowledge, but also subject innovation elements, talents are extremely important for development industrial clusters. This paper focuses on siphon effect that shows aggregation as clusters, finding positive effects clusters and giving corresponding suggestions measures to enhance ability competitiveness
The boom of Internet applications has resulted in ever increasing demands for new network services support. Different require different QoS, protocols and security mechanisms to be deployed the network. These demand evolve keep pace with change application requirements. Unfortunately, current Internet's functions are very hard expand cope changing environment. A extensible adaptive node architecture ENN is proposed this paper achieving an evolutionary New services, protocols, control...
According to the idea of zero trust, this paper proposed an anonymous identity authentication scheme based on hash functions and pseudo-random number generators, which effectively increased anonymity confidentiality when users use mobile networks, ensure security server. This first used single-packet technology realize application stealth. Secondly, generators were replace public key cryptosystems time synchronization systems, improved system performance. Thirdly, different methods set save...
甘蓝型油菜烯脂酰-CoA 还原酶基因 BnECR 的克隆及功能分析 倪 郁 张飞萃 王亚超 蒲 飞 王 瑞 柴友荣 李加纳 西南大学农学与生物科技学院, 重庆 400715 摘 要: 反式烯脂酰-CoA 还原酶(trans-2,3-enoyl-CoA reductase, ECR)是催化超长链脂肪酸(VLCFAs)合成的脂肪酰 -CoA 延长酶之一。根据已报道拟南芥 ECR 基因设计引物, 采用 RACE (rapid amplification of cDNA ends)方法从甘蓝 型油菜中克隆 的全长 序列和对应的基因组序列, 命名为 (GenBank 登录号分别为 FJ899705 和 FJ899706)。序列分析结果显示, 序列为 1 328 bp, 对应的基因组序列为 2 093 由 4 个外显子 组成, 在 ORF 的上
The expansion of the scale Power Internet Things stimulated by development Energy makes growth in demand for effective authentication and access control technologies cross-domain data exchange. Based on cross-chain technology blockchain cuckoo filter, this paper proposes a scheme Things. Firstly, architecture is established. Combined with existing used intra-domain authentication, process based proposed to realize automatic transmission credentials from application domain domain. filter...
Three prominent traffic features including peak alignment, stable ranking, and gravity model, have guided the design of current Google Jupiter fabrics in engineering, topology capacity planning.
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its capability generating public key from node identity directly, compared with traditional...
Cloud computing network is a comprehensive system with high performance and super service capability, which mainly integrated several relative low-cost entities through cloud technology. Through research of technology task classification scheduling load balance cluster, we integrate effectively this two kinds technologies meet the basic requirement preliminary. System test result shows that more efficient stable. Load implemented by virtual VIP technology, can bear large number concurrent...