- Software-Defined Networks and 5G
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Magnetic properties of thin films
- Chaos-based Image/Signal Encryption
- Advanced Optical Network Technologies
- IoT and Edge/Fog Computing
- Magnetic Properties and Applications
- Advanced Steganography and Watermarking Techniques
- Network Traffic and Congestion Control
- Ultrasound Imaging and Elastography
- Surface and Thin Film Phenomena
- Cryptographic Implementations and Security
- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Advanced Malware Detection Techniques
- Flow Measurement and Analysis
- Insurance and Financial Risk Management
- Magnetic and transport properties of perovskites and related materials
- Access Control and Trust
- Internet of Things and Social Network Interactions
- Network Packet Processing and Optimization
- Advanced Memory and Neural Computing
Southeast University
2008-2024
Second Affiliated Hospital of Fujian Medical University
2022-2024
Fujian Medical University
2022-2024
Jiangsu University
2008-2022
Intel (United Kingdom)
2019-2021
Intel (United States)
2018
Anhui University
2013-2016
Southwest University
2008-2009
Shanxi Agricultural University
2008
Pennsylvania State University
1996
<b>Highlights</b> <list list-type=bullet><list-item> The proposed system aims to reduce the high cost of wide-area agricultural production caused by uneven distribution machinery resources in different regions. </list-item><list-item> solves current problem that differences business models regions make it hard establish a centralized dispatching platform. It can also improve utilization rate and solve trust between participants. We implement our on Hyperledger Fabric meets needs all farmers...
Aiming to embed large amount of data while minimize the sum costs all changed pixels, a novel high capacity hiding scheme based on (7, 4) Hamming code is realized by family algorithms. Firstly, n (n = 1, 2, 3) cover pixels are assigned one set according payload. Then, 128 binary strings length seven divided into eight sets syndrome every string. Binary that share same classified set. Finally, string in certain determined be embedded chosen modify some least significant bits pixels. The...
Blockchain technology finds widespread application in the management of Internet Things (IoT) devices. In response to challenges posed by performance scalability and convergence multiple ledgers stemming from an expanding network, this study introduces concept Co-Sharding . Within framework, ledger maintained sub-chains overseeing IoT operations distinct geographic regions is conceptualized as a shard within Large-scale (LIoT) ledger. Meanwhile, elected nodes each region assume...
The ubiquity of mobile devices equipped with various sensors has promoted the advent a novel data sensing paradigm. Based on traditional static mode, (sensor) nodes collaboratively collect sensor nodes. This large volume hybrid sensed is then sent to storage for flexible management and top-<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:math> query services. One crucial security issue that compromised node may falsify or drop some...
Payment channel (PC) greatly improves blockchain scalability by allowing an unlimited number of off-chain transactions instead committing every transaction to the blockchain. However, one PC just confines two nodes. Thus, for a node, like Cafe, who frequently receives money from multiple nodes, massive PCs need be created, which leads massively and repeatedly information addition channels costs much fees. In this paper, we introduce multi-node payment (MPC) method solve problem above. MPC...
LEACH exhausts a few nodes much earlier than others, which remarkably decreases the lifetime of whole network. An improved method based on time slots to prolong minimum in is presented, cluster-head selecting approach difference cluster size and responsibility mechanism for active node makes energy consumption uniform cluster. Simulation comparison show that effective extending network more saving some related work.
To solve the problems of limited energy nodes and security routing in wireless sensor networks, load-balanced secure protocol (LSRP), a for is proposed. Based on structured topology hexagonal mesh, hops at different directions are calculated optimal route transmitting data packets LSRP. Depending characters hops, can rapidly find among multiple routes by policy twice probability selection. Data breach prevented encryption, realized one-way hash key chain symmetric authentication. LSRP offers...
This paper presents a secure group communication scheme to relieve the bottleneck problem of vehicular authentication efficiency using batch verification accelerate speed during construction phase. We use certificateless public key cryptosystem encryption overcome escrow problem. Specific revocation malicious vehicles, bloom filter is applied issuing information revoked vehicles instead time-consuming list. By performance evaluation, proposed outperforms previously reported schemes in terms...
Network measurement is critical in network management such as performance monitoring, diagnosis, and traffic engineering. However, conventional solutions are limited by simple fixed functionalities well coarse-grained statistics which often fail to precisely illustrate conditions. In this paper, we propose an event-driven declarative query language, EQuery, for programmable order design sophisticated tasks enable event mechanism avoid human intervene. Furthermore, a compiler support the...
The P4 language was originally proposed as a means of providing programmable network data plane functions with the potential to implement, understand, and interpret custom protocols. However, recompilation process re-instantiation on target device introduces measurable downtime for services. In this work, we present Ripple, an efficient, runtime reconfigurable engine multicore systems eliminate process. Ripple framework adopts "generic static" philosophy, uses highly optimized universal...
As SDN-based networking infrastructure continues to evolve, an increasing number of traditional network functions are deployed over virtualized network. Like networks, traffic monitoring in a Software Defined Network is critical order ensure security and performance the underlying infrastructure. In context deployment TAP service has been reported as effective VNF that can provide same capabilities physical TAP. Unfortunately, para-virtualization environment, e.g. OVS, where inter-VM...
One of the major drawbacks ultrasonic Doppler instruments in measuring blood flow is their inability to measure velocity perpendicular beam. Time domain RF echo or speckle tracking has been studied as an alternative overcome this problem. By acquiring two-dimensional (2-D) signals, both lateral (perpendicular beam) and axial (parallel velocities can be calculated with 2-D pattern correlation algorithms. disadvantages current algorithms extensive computation time involved computing...
Time delay estimation is a very important operation in ultrasound time-domain flow mapping and correction of phase aberration an array transducer. As the interest increases application one half-dimensional (1.5-D) two-dimensional (2-D) transducers to improving image quality three-dimensional (3-D) imaging, need simple, fast, sufficiently accurate algorithms for real-time time becomes exceedingly crucial. In this paper, we present adaptive time-delay algorithm which minimizes problem noise...