- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Nanoparticle-Based Drug Delivery
- Caching and Content Delivery
- Smart Grid Security and Resilience
- Constructed Wetlands for Wastewater Treatment
- HVDC Systems and Fault Protection
- Software-Defined Networks and 5G
- Ocular Surface and Contact Lens
- Soil Carbon and Nitrogen Dynamics
- Natural Compound Pharmacology Studies
- Age of Information Optimization
- Phosphorus and nutrient management
- Peer-to-Peer Network Technologies
- Satellite Communication Systems
- Security and Verification in Computing
- Wireless Signal Modulation Classification
- Myasthenia Gravis and Thymoma
- Advanced NMR Techniques and Applications
- Meningioma and schwannoma management
- Music and Audio Processing
- Face and Expression Recognition
- Music Technology and Sound Studies
Northeastern University
2024
Wenzhou Medical University
2023
North China Electric Power University
2016-2022
Tsinghua University
2022
Beijing Normal University
2022
Liaoning University
2021
National Taiwan University
2020
Computer Network Information Center
2020
Chinese Academy of Sciences
2020
State Grid Corporation of China (China)
2020
With the development of knowledge music composition and recent increase in demand, an increasing number companies research institutes have begun to study automatic generation music. However, previous models limitations when applying song generation, which requires both melody arrangement. Besides, many critical factors related quality a such as chord progression rhythm patterns are not well addressed. In particular, problem how ensure harmony multi-track is still underexplored. To this end,...
Background and purpose: Gambogic acid (GA) is a natural compound that exhibited promising multi-target antitumor activity against several types of cancer. However, the clinical application this drug limited due to its poor solubility low tumor cell-specific delivery. In study, monomeric dimeric Cyclo (Arg-Gly-Asp) c(RGD) targeting peptides (c(RGDfK) E-[c(RGDfK)2]) were used modify GA loaded nanostructured lipid carriers (NLC) reduce limitations associated with improve activity. Methods:...
Summary The increase of security incidents brings a challenge to the cloud computing security. Intrusion detection technologies have been applied protect information in from being compromised, and complicated learning‐based methods used improve performance intrusion systems. Higher quality well‐formed samples are crucial algorithm. Therefore, we mainly study model based on data optimization processing. In this article, establish an algorithm ensemble support vector machine with bag...
Sustainable phosphorus (P) recovery from sewage sludge is crucial to reconciling the simultaneous shortage and excess of P. In this study, magnetic biochar (MBC) was synthesized innovatively applied enhance P as vivianite. The effects anaerobic digestion (AD) time, hydrothermal (HT) pretreatment temperature MBC dose on vivianite formation were investigated using batch experiments a modified sequential extraction protocol. fractionation results showed that concentration pure vivianite-bound...
With the development of second generation (2G) high-temperature superconducting (HTS) tapes, several cabling configurations, such as twisting stacked-tapes cable and conductor on round core cables, have been proposed, some prototypes were developed. Alternating current (ac) losses arise in HTS tapes ac operations, those are an important consideration for applications since they influence stability operating cost. Conventionally, a technique is used to effectively reduce losses. This paper...
The wireless power terminals are deployed in harsh public places and lack strict control, facing security problems. Thus, they faced with problems such as illegal counterfeit terminal access, unlawful control of connected terminals, etc. intrusion detection system based on machine learning artificial intelligence significantly improve the side's abnormal capacity. In this article, we aim at identifying behavior a double Hidden Markov Model (HMM), which solves computational complexity problem...
对FY-3A卫星近四年的辐射剂量数据进行分析,结果表明,在1mm铝的等效屏蔽厚度下,星内辐射剂量存在显著的方向性差异,+<em>Y</em>向剂量增长变化显著大于+<em>Z</em>向.深入分析剂量变化与带电粒子辐射关系后发现,太阳质子事件期间的高能质子增长不会对辐射剂量增长变化产生显著影响;而高能电子是剂量增长变化的主要贡献者,其中扰动导致的高能电子通量强增长是使得辐射剂量显著增加的主要原因,并显著影响到卫星+<em>Y</em>向.进一步与工程常用SPENVIS剂量计算结果的对比表明,实测能更好地反映剂量动态变化和方向差异.综上,实测剂量数据对于同类工程星内器件的合理布局和工程防护设计具有一定指导和参考价值.
This paper investigates K-filter-based distributed adaptive output-feedback bipartite tracking problem for multi-agent systems with unknown control direction. The agents are partitioned into two groups, where belonging to the same group cooperative while distinct competitive. Firstly, unmeasurable state variables of system under direction estimated through K-filters. Then, a neighbourhood error is introduced transform structurally balanced network network. Based on K-filters, error,...
Serverless computing, or Function-as-a-Service, is gaining continuous popularity due to its pay-as-you-go billing model, flexibility, and low costs. These characteristics, however, bring additional security risks, such as the Denial-of-Wallet (DoW) attack, serverless tenants. In this paper, we perform a real-world DoW attack on commodity platforms evaluate severity. To identify attacks, design, implement, Gringotts, an accurate, easy-to-use detection system with negligible performance...
Abstract With the implementation of energy Internet, ‘Internet+power’, power IOT, and digital transformation upgrading strategy, marketing system has carried out massive metering acquisition load control terminals, which are interactive open accessed. Also, it enhanced coordinated operation with core systems such as dispatching, transportation inspection. The current protection is mainly based on traditional passive defense concepts technologies isolation protection, cannot meet demand high...
With the programmability of software defined networking (SDN), it is convenient to manage network through master and slave controllers that also provide failover mechanism. To achieve load balancing among SDN low response time, we should dynamically assign under bandwidth constraint, so consumption important. In this paper, formulate as mix integer linear programming model figure out NP-hard. Thus, propose a two-phase algorithm handle it. first phase, use k-means clustering avoid achieving...
Due to its openness and simplicity, Modbus TCP has wide applications facilitate the actual management control in industrial wireless fields. However, potential security vulnerabilities can also create lots of complicated information challenges, which are increasingly threatening availability real-time traffic delivery. Although anomaly detection been recognized as a workable measure identify attacks, critical step successfully extract data characteristics is an extremely difficult task. In...
In recent years, the large-scale dynamic HTTP requests have raised great challenges for traditionaldetection system in web applications. general, intrusion detection is classified into misuse detectionand anomaly detection. Misuse has its own disadvantages poor adaptabilityand high-cost of renewal and maintenance. Therefore, emergedas improvement which can identify previously unknown attacks. However,learning-based prone to result high false positives. This paper presentsa hierarchical that...
Soil carbon (C) cycling plays critical role in regulating global C budget and atmosphere CO2 concentration. The ongoing warming potentially accelerates soil loss induced by microbial respiration (MR) makes a large source to atmosphere. Quantifying the drivers of MR its response rising temperature (also called sensitivity, Q10) is high priority order improve modelling prediction terrestrial cycle under warming. In this study, we applied standardized sampling along 9 gradients from 400 m 1100...