- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Indoor and Outdoor Localization Technologies
- Network Packet Processing and Optimization
- Mobile Crowdsensing and Crowdsourcing
- Sparse and Compressive Sensing Techniques
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Opinion Dynamics and Social Influence
- Opportunistic and Delay-Tolerant Networks
- Security in Wireless Sensor Networks
- Library Science and Administration
- Algorithms and Data Compression
- Privacy-Preserving Technologies in Data
- Geomechanics and Mining Engineering
- Advanced Battery Technologies Research
- Biometric Identification and Security
- Gene Regulatory Network Analysis
- Grey System Theory Applications
- User Authentication and Security Systems
- Cloud Computing and Resource Management
- Peer-to-Peer Network Technologies
- Microwave Imaging and Scattering Analysis
- Distributed Sensor Networks and Detection Algorithms
University of Science and Technology of China
2012-2020
University of Science and Technology Chittagong
2016
Université du Québec
2014
General Administration of Sport of China
2014
South China University of Technology
2013
Regular expression pattern matching is the foundation and core engine of many network functions, such as intrusion detection, worm traffic analysis, web applications so on. DFA-based solutions suffer exponentially exploding state space cannot be remedied without sacrificing speed. Given this scalability problem methods, there has been increasing interest in NFA-based methods for memory efficient regular matching. To achieve high speed using NFA, it requires potentially massive parallel...
Regular expression pattern matching is the foundation and core engine of many network functions, such as intrusion detection, worm traffic analysis, web applications so on. DFA-based solutions suffer exponentially exploding state space cannot be remedied without sacrificing speed. Given this scalability problem methods, there has been increasing interest in NFA-based methods for memory efficient regular matching. To achieve high speed using NFA, it requires potentially massive parallel...
As wearable devices gain widespread acceptance among the general population, there is a crying need to ensure that relevant privacy and security vulnerabilities are minimize hazards. Biometrics become very important in our daily lives due its relative convenience compared with traditional personal identification data. In this paper, We propose live biometric recognition method of ECG for devices. Specifically, we locate feature points recognize Q-R-S wave, P R wave respectively. Then analyze...
In the past few years, a large variety of IoT applications has been witnessed by fast proliferation devices (e.g., environment surveillance devices, wearable city-wide NB-IoT devices). However, launching data collection from these mass raises challenge due to limited computation, storage, bandwidth, and energy support. Existing solutions either rely on traditional gathering methods relaying each node sink, which keep unaltered but suffering costly communication, or tackle spacial in proper...
The Internet has become one of the most important elements in our daily lives. There are plenty interactive applications available for billions users that provide different kinds interactions. These user interactions may form an intermittently connected network information propagation. In such networks, e.g., forum, website, and tweeter-like online social applications, behavior generally exhibits temporally varying features due to extensive temporal-spatial diversity sparsity among ( as...
In social activities, people are interested in some statistical data, such as purchase records, monthly consumption, and health which usually utilized recommendation systems. And it is seductive for them to acquire the ranking of these data among friends or other communities. meantime, they want their privacy be confidential. Therefore, a strategy presented allow users obtain result calculating while preserving data. this method, firstly polynomial approximation function model set up each...
Motivated by the observation that there is an increasingly aggravated conflict between expanding sensor capabilities for sensing service/content and limited network performance in wireless multimedia networks (usually caused cost, congestion, packet loss, resource limit, etc.), we provide a bottom-up approach to speedup leveraging group of nodes' (fog nodes) capacity piling them up as considerable amount fastlane service. Specifically, our based on following designs: 1. A novel way...
This paper is motivated by the task of modeling routing decisions with sequential forwarding interactions in multi-agent networks topology uncertainties, e.g., agents' mobility traces uncertain speed and direction, links to someone unknown stranger social networks, both making their come across at time location. Since most designs assume that behaviors be regular or known probability distribution envision future as stable/predictable (namely limited uncertainty), these approaches may suffer...
Clone attack is considered as a severely destructive threat in Internet of Things (IoT), because: 1) the may be easily launched due to deficiency hardware architecture and limited resources against physical capture compromise 2) it trigger large variety insider outsider attacks. Different from traditional clone detection approaches that ground on amount data traversing network (e.g., locations identities), this article tackles problem by answering following fundamental questions: do we...
With the increasing popularity of electric vehicles, there will be huge amount vehicles visiting battery charging station to change their batteries. In station, a robotic arm may move back and forth thousands times batteries for every day, which results in energy consumption. However, it is difficult design good dispatch method minimize consumption since arrivals are real-time unpredictable. this paper, under actual application scenario, we propose an effective algorithm address issue....
Motivated by the observation that there is an increasingly aggravated conflict between expanding sensor capabilities for sensing service/content and limited network performance in wireless networks (usually caused cost, congestion, packet loss, resource limit, etc.), we provide a bottom-up approach to speedup leveraging group of nodes (fog nodes) capacity piling them up as considerable amount fastlane service. Based on theoretical analysis, it’s shown our could achieve global optimal...