- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Neural Networks and Applications
- Fuzzy Logic and Control Systems
- Quantum Computing Algorithms and Architecture
- Network Security and Intrusion Detection
- Neural Networks and Reservoir Computing
- Quantum Information and Cryptography
- Technology and Security Systems
- Educational Technology and Assessment
- Blockchain Technology Applications and Security
- Higher Education and Teaching Methods
- Magnetism in coordination complexes
- Software-Defined Networks and 5G
- Advanced Decision-Making Techniques
- Fault Detection and Control Systems
- Lanthanide and Transition Metal Complexes
- Software Testing and Debugging Techniques
- Advanced Malware Detection Techniques
- Differential Equations and Numerical Methods
- Information and Cyber Security
- Service-Oriented Architecture and Web Services
- Freezing and Crystallization Processes
- Web Data Mining and Analysis
- Modeling and Simulation Systems
Jiangnan University
2015-2025
Northeast Normal University
2024
Chinese Academy of Sciences
2022-2023
Institute of Microelectronics
2022-2023
Jiangsu University
2020-2021
Tsinghua University
2012-2020
Hangzhou Normal University
2016-2019
Jilin Agricultural University
2019
Wuxi Institute of Technology
2017
Hangzhou Dianzi University
2008-2016
Abstract Controlling and programming quantum devices to process information by the unit of dit, i.e., qudit, provides possibilities for noise-resilient communications, delicate molecular simulations, efficient computations, showing great potential enhance capabilities qubit-based technologies. Here, we report a programmable qudit-based processor in silicon-photonic integrated circuits demonstrate its enhancement computational parallelism. The monolithically integrates all key functionalities...
Data-driven machine learning, especially deep learning technology, is becoming an important tool for handling big data issues in bioinformatics. In DNA sequences are often converted to numerical values representation and feature various applications. Similar conversion occurs Genomic Signal Processing (GSP), where genome transformed into signal extraction recognition. This kind of also called encoding scheme. The diverse schemes can greatly affect the performance GSP applications models....
Computations performed by using convolutional layers in deep learning require significant resources; thus, their scope of applicability is limited. When neural network models are employed an edge-computing system, the limited computational power and storage resources edge devices can degrade inference performance, a considerable amount computation time, result increased energy consumption. To address these issues, this study presents convolutional-layer partitioning model, based on fused...
In multi-UAV-assisted mobile edge computing (MEC), insufficient consideration of collaborative computation in inter-UAV communication can significantly reduce computational service capabilities. For this problem, we present a MEC offloading optimization model that jointly optimizes task decision, UAV resource allocation, trajectories and establish through communication. First, to solve the issue, define weighted utility function balances delay energy consumption. Then, tackle continuous...
We designed, fabricated, and characterized a programmable qudit-based quantum processor on silicon. implemented several algorithms with qudits, showing the logarithmic speed-up, photon detection rate enhancement accuracy improvement in information processing.
Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, paper proposes several gait feature identification algorithms. First, combination with the collected information of individuals from triaxial accelerometers on smartphones, is preprocessed, multimodal fusion used existing standard datasets to yield a synthetic dataset; then, characteristics biological information, Convolutional Neural...
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on web, we have developed Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm. Initially, are collected and converted into a standardized text format. Subsequently, five tactics category labels annotated, creating multi-label dataset for classification. Addressing limitations low execution efficiency scalability in sequential deep forest algorithm, our PDFMLC...
In order to overcome the challenges of inadequate classification accuracy in existing fake cybersecurity threat intelligence mining methods and lack high-quality public datasets for training models, we propose a novel approach that significantly advances field. We improved attention mechanism designed generative adversarial network based on generate intelligence. Additionally, refine text tokenization techniques design detection model detect threats Using our STIX-CTIs dataset, method...
In cloud data center, without efficient virtual machine placement, the overload of any types resources on physical machines (PM) can easily cause waste other resources, and frequent costly (VM) migration, which further negatively affects quality service (QoS). To address this problem, in paper we propose an evidence-efficient affinity propagation scheme for VM placement (EEAP-VMP), is capable balancing workload across various running PMs. Our approach models problem searching desirable...
Two solvent-free polymorphs of a chiral iron(ii) complex have been obtained, and their polymorphism dependent spin-crossover ferroelectric properties demonstrated. Polymorph I shows gradual behavior, whereas polymorph II remains in high-spin state but typical feature.
AJAX (Asynchronous JavaScript and XML) is becoming more popular with the prosperity of web 2.0. However, traditional crawlers fail to retrieve information from applications because complex operations. Moreover, a single application one URL may have different page states, which violates rule that corresponds unique page. The can be modeled as state transition graph crawl traverse without prior knowledge its structure. In this paper, we distinguished events are not well defined in previous...
Abstract VM consolidation has been proposed as an effective solution to improve resource utilization and energy efficiency through migration. Improper placement during may cause frequent migrations constant on–off switching of PMs, which can significantly hurt QoS increase consumption. Most existing algorithms on efficient suffer the problem easily falling into a sub-optimum prematurely since they are heuristic. Also, do not achieve good balance between multiple different goals, such...
Two iron(ii) molecular isomers, namely face-Λ-[Fe(L1)3](ClO4)2 (1a) (L1 = R-1-phenyl-N-((1-hexyl-5-methyl-1H-imidazol-2-ylmethylene)ethanamine)) and face-Λ-[Fe(L2)3](ClO4)2 (1b) (L2 R-1-phenyl-N-(1-hexyl-4-methyl-1H-imidazol-2-ylmethylene)ethanamine), are obtained via a well-designed strategy based on the tautomerization of 4(5)-methylimidazole group. Structural investigations reveal that two isomers extremely similar with only differences in methyl group position ligands. The center is...
Unprecedented 1D coaxial heterogeneous nanocomposites with spin-crossover and conductive properties were obtained by <italic>in situ</italic> growing classic magnetic bistable compounds on silver nanowires.
In this work, pyrazine (A), aminopyrazine (B), quinoxaline (C), and 5,6,7,8-tetrahydroquinoxaline (D) have been screened out among a large number of derivatives to construct Hofmann-type metal-organic frameworks (MOFs) Fe(L)[M(CN)4 ] (M=Pt, Pd) with similar 3D pillared-layer structures. X-ray single-crystal diffraction reveals that the alternate linkage between M FeII ions through cyano bridges forms 2D extended metal cyanide sheets, ligands A-D acted as vertical columns connect sheets give...