- Advanced Battery Technologies Research
- Blockchain Technology Applications and Security
- Refrigeration and Air Conditioning Technologies
- Network Security and Intrusion Detection
- Building Energy and Comfort Optimization
- Educational Technology and Assessment
- Advanced Malware Detection Techniques
- Higher Education and Teaching Methods
- Advanced Thermodynamic Systems and Engines
- Anomaly Detection Techniques and Applications
- Underground infrastructure and sustainability
- Urban Heat Island Mitigation
- Software System Performance and Reliability
- E-commerce and Technology Innovations
- Spam and Phishing Detection
- Internet Traffic Analysis and Secure E-voting
- Electric and Hybrid Vehicle Technologies
- IL-33, ST2, and ILC Pathways
- Geothermal Energy Systems and Applications
- Brain Tumor Detection and Classification
- Cloud Data Security Solutions
- HER2/EGFR in Cancer Research
- Face recognition and analysis
- Education and Work Dynamics
- Polymer Nanocomposites and Properties
University of Electronic Science and Technology of China
2016-2024
Southeast University
2013-2022
Gansu Agricultural University
2022
Affiliated Hospital of Hebei University
2014
North China University of Science and Technology
2014
The University of Adelaide
2013
Northeast Agricultural University
2013
Heilongjiang Institute of Technology
2012
Xi'an University of Science and Technology
2012
Hunan Institute of Engineering
2009
Phishing attacks are common online, which have resulted in financial losses through using either malware or social engineering. Thus, phishing email detection with high accuracy has been an issue of great interest. Machine learning-based methods, particularly Support Vector (SVM), proved to be effective. However, the parameters kernel method, whose default is that class numbers reciprocals general, affect classification SVM. In order improve accuracy, this paper proposes a model, called...
The new term "ant tribe", is referring to a social group of low-income college graduates that are in search work and livelihood the big cities (Lian Si, 2009). It estimated this has already surpassed more than 3 million people, with rapidly increasing rate 0.2-0.3 people year. investigation carried out on issues involved 327 including 192 tribe" group. survey put forwards three typical characteristics four basic features. psychological state been analyzed from aspects author financial...
Blockchains, with intricate architectures, encompass various components, e.g., consensus network, smart contracts, decentralized applications, and auxiliary services. While offering numerous advantages, these components expose attack surfaces, leading to severe threats blockchains. In this study, we unveil a novel surface, i.e., the state storage, in The based on Merkle Patricia Trie, plays crucial role maintaining blockchain state. Besides, design Nurgle, first Denial-of-Service targeting...
Enrolling adequate numbers of patients into the control arm randomized controlled trials (RCTs) often presents barriers. There is interest in leveraging real‐world data (RWD) from electronic health records (EHRs) to construct external (EC) arms supplement RCT and form hybrid (HC) arms. This investigation showed use an HC second‐line metastatic pancreatic ductal adenocarcinoma (PDAC). The experimental (atezolizumab + PEGylated recombinant human hyaluronidase (Atezo PEGPH20)) was compared with...
Advanced cyberattacks are often featured by multiple types, layers, and stages, with the goal of cheating monitors. Existing anomaly detection systems usually search logs or traffics alone for evidence attacks but ignore further analysis about attack processes. For instance, traffic methods can only detect flows roughly fail to reconstruct event process reveal current network node status. As a result, they cannot fully model complex multistage attack. To address these problems, we present...
Tokens have become an essential part of blockchain ecosystem, so recognizing token transfer behaviors is crucial for applications depending on blockchain. Unfortunately, existing solutions cannot recognize accurately and efficiently because their incomplete patterns inefficient designs. This work proposes TokenAware , a novel online system behaviors. To improve accuracy, infers from modifications internal bookkeeping smart contract recording the information holders (e.g., addresses shares)....
712 Background: The MORPHEUS platform comprises multiple Ph Ib/II trials to identify early efficacy signals and safety of treatment (tx) combinations across cancers. Due the immune-mediated effects BL-8040, a high-affinity antagonist for CXCR4, it was tested with atezo (anti-PD-L1) in pts advanced/metastatic (m) PDAC GC. Methods: In 2 separate randomized trials, mPDAC or advanced/mGC who progressed on 1L chemo received either + BL-8040 (BL-8040 1.25 mg/kg SC D1-5, then TIW 1200 mg IV Q3W)...
The intestinal flora maintained by the immune system plays an important role in healthy colon. However, of ILC3s-TD IgA-colonic mucosal axis ulcerative colitis (UC) and whether it could become innovative pathway for treatment UC is unknown. Yujin Powder a classic prescription dampness-heat type intestine disease traditional Chinese medicine has therapeutic effects on UC. Hence, present study aimed to investigate regulatory mechanism alcoholic extracts (YJP-A) via axis. mouse model was...
In recent years, with the increase in scale and complexity of system software, how to effectively capture, analyze locate abnormal behavior generated during operation has increasingly become a recognized problem software testing field. Traditional white-box-based anomaly detection methods need provide source code cannot detect behaviors that occur when program is running. Black-box-based rely on test cases have low coverage. Anomaly based logs can alleviate abovementioned problems. However,...
Exploring mechanisms for internal data sharing within government departments is important in advancing digital and intelligent society. This paper based on the establishment of decentralized nodes external network departments, constructing a node, establishing model blockchain. Subsequently, integrating attribute fields from into shared model, accompanied by formulation data-sharing rules through smart contracts, serves to streamline implementation efficient secure cross-validation across...
Power batteries of hybrid-power gas engine heat pump (HPGHP) often encounter frequent charge and discharge operations, which have an adverse effect on nature conversion efficiency system. In order to improve the dynamic economic performance HPGHP, this paper raises a coaxial HPGHP facility, takes LiFePO4 battery as auxiliary power source drive compressor. Logic threshold control strategy is put forward distribute between pack. Test research was operated verify advantageous HPGHP. The results...
<title>Abstract</title> Coverage analysis is increasingly important for enhancing deep learning (DL) framework testing. However, current code coverage analyzers face challenges with low compatibility and high overhead when applied to DL frameworks. Our findings indicate that state-of-the-art Python analyzers, such as coverage.py SlipCover, introduce an of at least 1 \(\times\) . In the context C coverage, widely-used analyzer gcc compatible only TensorFlow imposes a substantial...
The internet has quickly become one of the primary means communication in our society. Various types network applications more and more, it also increases risk security users. Botnets risks, order to prevent this danger or threat, we have detect them prevention. In study, use fuzzy algorithm identify botnet, is simple high testing speed efficiency. experiment, consider various botnet attacks, development appropriate classification blur detection algorithm, final evaluation.
In order to solve the problem of profit sharing between contractor and subcontractor under background construction supply chain, we base on successful application performance in chain profits, successfully them. We select engineering cost, period quality project as three key indicators according characteristics then, identify each index weight, determine target performance, calculate for indicator value, finally obtain coefficient, share profits by it. The results show that, subcontractor's...