- Recommender Systems and Techniques
- Cloud Computing and Resource Management
- Advanced Graph Neural Networks
- Caching and Content Delivery
- Quantum Computing Algorithms and Architecture
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- GNSS positioning and interference
- Quantum-Dot Cellular Automata
- Topic Modeling
- Scientific Computing and Data Management
- Advanced Frequency and Time Standards
- IoT and Edge/Fog Computing
- Network Time Synchronization Technologies
- Indoor and Outdoor Localization Technologies
- Web Data Mining and Analysis
- Quantum Information and Cryptography
- Information and Cyber Security
- Service-Oriented Architecture and Web Services
- Software Engineering Research
- Advanced Decision-Making Techniques
- Inertial Sensor and Navigation
- Advanced Malware Detection Techniques
- Advancements in PLL and VCO Technologies
- Digital Marketing and Social Media
National University of Defense Technology
2007-2024
Shanghai Electric (China)
2024
Wuhan University of Technology
2024
Shandong Institute of Business and Technology
2023
Shandong Institute of Commerce & Technology
2023
China State Construction Engineering (China)
2023
Suqian University
2022
Qiannan Normal College For Nationalities
2022
Guizhou University
2022
Tiandi Science & Technology (China)
2021
In today’s dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk of cyberattacks are both increasing. This means that organizations need to have a strong understanding their internal CTI external CTI. The potential for cybersecurity knowledge graphs is evident in ability aggregate represent about threats, as well manage reason with knowledge. While most existing research has focused on how create full graph, utilize graph tackle real-world industrial difficulties...
Cloud computing is becoming the new generation infrastructure, and many cloud vendors provide different types of services. How to choose best services for specific applications very challenging. Addressing this challenge requires balancing multiple factors, such as business demands, technologies, policies preferences in addition requirements. This paper recommends a mechanism selecting public service at levels Infrastructure Service (IaaS) Platform (PaaS). A systematic framework associated...
Traditional recommendation systems (RSs) recommend users to personal items according their pre-behaviors infer users' preference. Although researchers have made some improvements, which take time factor into traditional systems, on catching changes of interest, it is difficult always compute the preference fluctuations. Therefore, solve mentioned above problems, we add fluctuations collaborative filtering systems. In this paper, will quantify user's change. Besides, also adapts recommending...
In the era of Internet Things (IoT), increasing numbers applications face challenge using current data management systems to manage massive volume operational gener-ated by sensors and devices. Databases based on time series model, like PI Server, are developed handle such with technology (OT) characteristics (high volume, long lifecycle, simple format). However, while achieving excellent write performance, these database provide limited query capabilities. this paper, we present...
High frequency of network security incidents has also brought a lot negative effects and even huge economic losses to countries, enterprises individuals in recent years. Therefore, more attention been paid the problem security. In order evaluate newly included vulnerability text information accurately, reduce workload experts false rate traditional method. Multiple deep learning methods for classification evaluation are proposed this paper. The standard Cross Site Scripting (XSS) data is...
Understanding perturbations at the single-cell level is essential for unraveling cellular mechanisms and their implications in health disease. The growing availability of biological data has driven development a variety silico perturbation methods designed analysis, which offer means to address many inherent limitations experimental approaches. However, these computational are often tailored specific scenarios validated on limited datasets metrics, making evaluation comparison challenging....
In this article, a novel R-convolution kernel, named the fast quantum walk kernel (FQWK), is proposed for unattributed graphs. FQWK, similarity of neighborhood-pair substructure between two nodes measured via superposition amplitude walks those nodes. The interference in kind local substructures provides more information on so that FQWK can capture finer-grained structural features addition, to efficiently compute transition amplitudes multistep discrete-time walks, recursive method...
Managing computation resources in a cost-effective way has become the core competence for Cloud provider to win over market because of "pay-as-you-go" business model. Therefore, VM placement more and important research practices management by determining at what condition on which physical server should be placed so that SLA can guaranteed servers' utilization improved. Much existing work simply formulates above issue bin-packing problem, does not take relationships into account. However,...
On account of the complexity programs, it is a difficult work to recognize all addressable expressions, which one preconditions sound static analysis. This paper introduces an approach recognizing expressions C program. Firstly, we induce grammar patterns mapping each kind them node abstract syntax tree (AST), providing corresponding naming rule and type inference rule. Then, demonstrate that recognizes based on AST. In order validate adequacy our approach, five real-world programs are...
Cloud computing is becoming a viable solution for scientific research and several open-source cloud solutions are available to support studies. However, little has been done systematically investigate the performance of these in supporting pursuits. Taking dust storm forecasting as an example, we test three popular solutions, namely Eucalyptus, OpenNebula, CloudStack, on same hardware compare against bare cluster. We find that: (1) compared cluster, about 10% virtualization management...
The isomorphism problem involves judging whether two graphs are topologically the same and producing structure-preserving mapping. It is widely used in various areas. Diverse algorithms have been proposed to solve this polynomial time, with help of quantum walks. Some these algorithms, however, fail find Moreover, most very limited performance on regular which generally difficult deal due their symmetry. We propose IsoMarking discover an mapping effectively, based walk sensitive topological...
Time-hopping signal structure is adopted for overcoming the near-far problem in Ground-based Navigation System. The model of TH-CDMA presented. To track pulse signals with pseudorandom active-timeslot, tracking loops time-varying sampling periods are designed. linear second order TVSP-PLL stability analyzed based on First Method Lyapunov system. A transient-response simulation provided as a verification. ranging performance TVSP-DLL evaluated. hardware experiment and MATLAB used to verify...
Image-based virtual try-on aims to transfer a target clothing onto specific person. A significant challenge is arbitrarily matched and person lack corresponding ground truth supervised learning. recent pioneering work leveraged an improved cycleGAN enable one network generate the desired image for another during training. However, there no difference in result distribution before after changes. Therefore, using two different networks unnecessary may even increase difficulty of convergence....
In the domain of cybersecurity, available annotated data are often scarce, especially for Chinese cybersecurity datasets, necessitating manual construction datasets. The scarcity samples is one challenges in researching “no-relation” class. Since annotation process typically focuses only on known relation classes, there usually no training This poses a zero-shot classification problem, where during process, tendency to classify into class with relationship. Zero-shot tasks particularly...
Long-endurance unmanned aerial vehicles (LE-UAVs) are extensively used due to their vast coverage and significant payload capacities. However, limited autonomous intelligence necessitates the intervention of ground control resources (GCRs), which include one or more operators, during mission execution. The performance these missions is notably affected by varying effectiveness different GCRs fatigue levels. Current research on multi-UAV planning inadequately addresses critical factors. To...