- Complex Network Analysis Techniques
- Human Mobility and Location-Based Analysis
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Network Traffic and Congestion Control
- Peer-to-Peer Network Technologies
- Advanced MIMO Systems Optimization
- Chaos-based Image/Signal Encryption
- Caching and Content Delivery
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Wireless Communication Security Techniques
- Software-Defined Networks and 5G
- Reinforcement Learning in Robotics
- Topic Modeling
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Wireless Communication Networks Research
- Cellular Automata and Applications
- Network Security and Intrusion Detection
- Distributed Control Multi-Agent Systems
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- Theoretical and Computational Physics
- Generative Adversarial Networks and Image Synthesis
Longhua Hospital Shanghai University of Traditional Chinese Medicine
2025
Shanghai University of Traditional Chinese Medicine
2025
Shanghai Jiao Tong University
2005-2025
Tsinghua University
2015-2024
ShanghaiTech University
2023-2024
China United Network Communications Group (China)
2024
Beijing University of Chinese Medicine
2024
Risun (China)
2024
PLA Rocket Force University of Engineering
2024
Xi’an Children’s Hospital
2024
The growing popularity and development of data mining technologies bring serious threat to the security individual,'s sensitive information. An emerging research topic in mining, known as privacy-preserving (PPDM), has been extensively studied recent years. basic idea PPDM is modify such a way so perform algorithms effectively without compromising information contained data. Current studies mainly focus on how reduce privacy risk brought by operations, while fact, unwanted disclosure may...
Rapid progresses have been achieved in the photonic applications of two-dimensional materials such as graphene, transition metal dichalcogenides, and topological insulators. The strong light–matter interactions large optical nonlinearities these atomically thin layered make them promising saturable absorbers for pulsed laser applications. Either Q-switching or mode-locking pulses with particular output characteristics can be by using different absorbers. However, it remains still very...
With emergency of demands for local area services, device-to-device (D2D) communication is proposed as a vital technology component the next generation cellular system to improve spectral reuse and enhance capacity. These benefits depend on efficient interference management resource allocation. Existing works usually consider these problems under restricted consisting pair D2D users user. In this paper, we address uplink allocation problem multiple from game theory point view. Combing...
Vehicular fog computing (VFC) has been expected as a promising scheme that can increase the computational capability of vehicles without relying on servers. Comparing with accessing remote cloud, VFC is suitable for delay-sensitive tasks because its low-latency vehicle-to-vehicle (V2V) transmission. However, due to dynamic vehicular environment, how motivate share their idle resource while simultaneously evaluating service availability in terms vehicle mobility and heterogeneous networks...
Vehicular edge computing (VEC) is an effective method to increase the capability of vehicles, where vehicles share their idle resources with each other. However, due high mobility it challenging design optimal task allocation policy that adapts dynamic vehicular environment. Further, computation offloading often occurs between unfamiliar how motivate while guaranteeing reliability resource in one main challenge. In this paper, we propose a blockchain-enabled VEC framework ensure and...
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensively Voice over Internet Protocol (VoIP). study reveals that, contrary to existing thought, VoIP are more suitable than active streams; that is, attains larger capacity under same imperceptibility. By analyzing concealment codec with 6.3 kb/s, authors propose new different speech parameters frames....
In the long pursuit of smart robotics, it has been envisioned to empower robots with human-like senses, especially vision and touch. While tremendous progress made in image sensors computer over past decades, tactile sense abilities are lagging behind due lack large-scale flexible sensor array high sensitivity, spatial resolution, fast response. this work, we have demonstrated a 64 × record-high resolution 0.9 mm (equivalently 28.2 pixels per inch) by integrating high-performance...
In this paper, colocated MIMO radar waveform design is considered by minimizing the integrated side-lobe level to obtain beam patterns with lower levels than competing methods. First, a quadratic programming problem formulated using criteria for minimal level. A theorem derived that provides closed-form analytical optimal solution appears be an extension of Rayleigh quotient minimization possibly singular matrix in form. Such singularities are shown occur interest, but proofs optimum these...
Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information. Unfortunately, continuously for suspicious activities presents difficult challenges because may arise anywhere at any time attackers constantly modify attack dynamics evade detection. In this paper, we propose a method early Using only few observation points, our proposed can monitor the macroscopic effect...
In next generation networks, mobile communication calls for service with higher quality, which brings new challenge mobility management. Thereinto, utilization and improvement of prediction helps preserving resource providing better performance. So this paper aims to propose a theoretical factual method perform in cellular network. By analyzing the demand character kind personal large spacial temporal scale, it is concluded that Hidden Markov Model fits system modeling. However, classical...
As the volume of mobile traffic has been growing quickly in recent years, reducing congestion networks become an important problem networking research. Researchers found out that inhomogeneity spatio-temporal distribution data leads to extremely insufficient utilization network resources. Thus, it is fundamentally understand this help us make better resource planning or introduce new management tools such as time-dependent pricing reduce congestion. However, due requirement a large dataset,...
Wireless virtualization has been proposed as a promising way to overcome the current plight of wireless network, i.e. spectrum crisis, by enabling multiple concurrent virtual networks running on shared substrate resource. However, making efficient use underlying requires effectively assigning physical resources several networks. Since opportunistic sharing makes communication more intelligent and efficient, we present an based resource allocation scheme for virtualization. First, formulate...
In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although the UAV are quite similar to traditional mobile ad hoc networks, special characteristics of application scenario have not considered literature. this paper, we propose a distributed gateway selection algorithm with dynamic network partition by taking into account networks....
Knowledge graphs (KGs) can help enhance recommendations, especially for the data-sparsity scenarios with limited user-item interaction data. Due to strong power of representation learning graph neural networks (GNNs), recent works KG-based recommendation deploy GNN models learn from both knowledge and bipartite graph. However, these have not well considered hierarchical structure graph, leading sub-optimal results. Despite benefit structure, leveraging it is challenging since always...
Efficient key-value (KV) cache compression is critical for scaling transformer-based Large Language Models (LLMs) in long sequences and resource-limited settings. Existing methods evict tokens based on their positions or importance scores, but position-based strategies can miss crucial information outside predefined regions, while those relying global scores resulting strong regional biases, limiting the KV cache's overall context retention potentially impairing performance of LLMs complex...
Given concerns about treatment, there is uncertainty surrounding the effect of prior malignancy on survival individuals with metastatic colorectal cancer. This study sought to evaluate how impacts patients cancer (mCRC). Patients diagnosed stage IV mCRC (per American Joint Committee Cancer [AJCC] 6th edition) between 2004 and 2015 were identified from Surveillance, Epidemiology, End Results (SEER) database. Those without a history assigned control group, whereas those research group....
Vehicular fog computing (VFC) has been expected as a promising paradigm that can improve the computational capability of vehicles, where vehicles share their idle resource among each other. Considering limited single vehicle and short vehicle-to-vehicle (V2V) link duration, binary task offloading may suffer from long execution time V2V interruption, which not be appropriate for some computation-intensive tasks. partial computation is to solution tasks are divided into several parts executed...
This paper proposes a semi-analytic finite element method to treat the open boundary axisymmetric electrostatic field problems. The is applied computing potential distribution of high voltage porcelain metal oxide arrester (MOA). numerical example shows good agreement between calculated and measured results.
The benefits of Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative relay for secure communication are investigated within Wyner's wiretap channel. We characterize the secrecy rate when source, destination, eavesdropper all use single antenna channel conditions fix. Both AF DF strategies proved theoretically to be able facilitate communication. Detailed analysis scheme reveals a trade off between area request rate. In addition, constraints in discussed used explain differences...