- Cryptography and Data Security
- Energy Efficient Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Indoor and Outdoor Localization Technologies
- User Authentication and Security Systems
- Vehicular Ad Hoc Networks (VANETs)
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- RFID technology advancements
- Internet Traffic Analysis and Secure E-voting
- Mobile Ad Hoc Networks
- Chaos-based Image/Signal Encryption
- Advanced Battery Materials and Technologies
- Privacy, Security, and Data Protection
- Cryptographic Implementations and Security
- Quantum Information and Cryptography
- Advancements in Battery Materials
- Underwater Vehicles and Communication Systems
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
- Advanced Authentication Protocols Security
- Network Packet Processing and Optimization
- IPv6, Mobility, Handover, Networks, Security
Chinese Academy of Medical Sciences & Peking Union Medical College
2023-2025
University of Michigan
2010-2025
Command Hospital
2025
University of Michigan–Dearborn
2015-2024
Northeast Electric Power University
2021-2024
Tongji Hospital
2016-2024
Huazhong University of Science and Technology
2010-2024
Jinan Institute of Quantum Technology
2023-2024
University of Science and Technology of China
2024
BGI Genomics
2024
Quantum key distribution (QKD) aims to generate secure private keys shared by two remote parties. With its security being protected principles of quantum mechanics, some technology challenges remain towards practical application QKD. The major one is the distance limit, which caused fact that a signal cannot be amplified while channel loss exponential with for photon transmission in optical fiber. Here using 3-intensity sending-or-not-sending protocol actively-odd-parity-pairing method, we...
Data clustering is an important data mining technology that plays a crucial role in numerous scientific applications. However, it challenging due to the size of datasets has been growing rapidly extra-large scale real world. Meanwhile, MapReduce desirable parallel programming platform widely applied kinds process fields. In this paper, we propose efficient density-based algorithm and implement by 4-stages paradigm. Furthermore, adopt quick partitioning strategy for large non-indexed data. We...
The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. ability to efficiently verify all (or some) log entries important any application employing techniques. In this article, we begin examining state of art in identify some problems inherent systems based on trusted third-party servers. We then propose a different approach upon recently developed Forward-Secure Sequential Aggregate (FssAgg) authentication Our offers...
Nitrogen-doped carbon-covered Na3V2(PO4)2F3 (NVPF/C-PDPA) composites have been successfully prepared by self-polymerization of dopamine on the NVPF surface and subsequent sintering. The X-ray diffraction results show that NVPF/C-PDPA has good crystallinity introducing does not affect lattice structure NVPF. high-resolution transmission electron microscopy, high-angle annular dark-field images, energy dispersive spectroscopy analyses reveal particles are covered a complete uniform covering...
<title>ABSTRACT</title> <p>With recent advancements in the automotive world and introductions of autonomous vehicles, cybersecurity has become a main primary issue for every automaker. In order to come up with measures detect protect against malicious attacks, intrusion detection systems (IDS) are commonly used. These identify attacks while comparing normal behavior abnormalities. this paper, we propose novel, two-stage IDS based on deep-learning rule-based systems. The...
Though representing a promising approach for personalization, targeting, and recommendation, aggregation of user profiles from multiple social networks will inevitably incur serious privacy leakage issue. In this paper, we propose Novel Heterogeneous De-anonymization Scheme (NHDS) aiming at de-anonymizing heterogeneous networks. NHDS first leverages the network graph structure to significantly reduce size candidate set, then exploits profile information identify correct mapping users with...
Global investment and recent advancements in vehicle automation are making autonomous cooperative automated driving (AD) a reality. Not only will vehicles incorporate more electronics connectivity than ever before, but also, notably, they transfer control responsibility of monitoring the environment from human driver to robotic system. While prior work has assessed provided security solutions for non-automated vehicles, there is much understand regarding implications AD. In this work, we...
Layered LiNi1/3Co1/3Mn1/3O2 (NCM333) is successfully coated by fast ionic conductor LiTi2(PO4)3 (LTP) via a wet chemical method. The effects of LTP on the physicochemical properties and electrochemical performance are studied. results reveal that highly layered structure NCM333 can be well maintained with less cation mixing after coating. about 5 nm thickness surface NCM333. Such an coating layer effectively suppress side reactions between electrolyte but will not hinder lithium ion...
With recent advancements in the automotive world and introduction of autonomous vehicles, security has become a real important issue. Modern vehicles have tens Electronic Control Units (ECUs) connected to in-vehicle networks. As de facto standard for network communication, Controller Area Network (CAN) target cyber attacks. Anomaly-based Intrusion Detection System (IDS) is considered as an effective approach secure CAN detect malicious Currently, there are two primary approaches used...
Wireless sensors are employed in a wide range of applications. One common feature many sensor settings is the need to communicate sensed data some collection point or sink. This communication can be direct (to mobile collector) indirect-via other towards remote In either case, might not able sink at will. Instead it collect and wait (for potentially long time) for signal upload accumulated directly. hostile setting, may compromised its post-compromise manipulated. important issue forward...
With recent advances in technology, various wearable sensors have been developed for the monitoring of human physiological parameters. A Body Sensor Network (BSN) consisting such and biomedical sensor nodes placed on, near or within a body can be used real-time health monitoring. In this paper, we describe an on-going effort to develop system interconnected BSNs soldiers. We discuss background application scenario project. preliminary prototype present blast source localization application.
Short-range wireless communication technologies have been used in many security-sensitive smartphone applications and services such as contactless micro payment device pairing. Typically, the data confidentiality of existing short-range systems relies on so-called "key-exchange then encryption" mechanism, which is inefficient, especially for short sessions. In this work, we present <formula formulatype="inline" xmlns:mml="http://www.w3.org/1998/Math/MathML"...
In this study, low cost anthracite-derived dual-phase carbon-coated Li3V2(PO4)3 composites have been successfully prepared via a traditional solid-phase method. XRD results show that the as-prepared samples high crystallinity and anthracite introduction has no influence on LVP crystal structure. The LVP/C particles are uniformly covered with carbon layer composed of amorphous graphitic carbon. effect amount battery performance as cathode material also studied. composite obtained 10 wt %...