- Advanced Malware Detection Techniques
- Fatigue and fracture mechanics
- Railway Engineering and Dynamics
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Mechanical stress and fatigue analysis
- Structural Health Monitoring Techniques
- Advanced Computational Techniques and Applications
- Gear and Bearing Dynamics Analysis
- Human Mobility and Location-Based Analysis
- Green IT and Sustainability
- Engineering Applied Research
- Anomaly Detection Techniques and Applications
- Caching and Content Delivery
- Biometric Identification and Security
- Civil and Geotechnical Engineering Research
- Advanced Welding Techniques Analysis
- Web Data Mining and Analysis
- Engineering Structural Analysis Methods
- Service-Oriented Architecture and Web Services
- Advanced Sensor and Control Systems
- Security and Verification in Computing
- Machine Fault Diagnosis Techniques
- Advanced Data Storage Technologies
- Tribology and Lubrication Engineering
Chinese Academy of Sciences
2010-2025
Huazhong University of Science and Technology
2015-2025
Wuchang University of Technology
2025
Wuhan National Laboratory for Optoelectronics
2024-2025
Institute of Microelectronics
2025
University of Chinese Academy of Sciences
2011-2025
Shanghai Technical Institute of Electronics & Information
2025
Beijing Jiaotong University
2015-2024
Shanghai Institute of Organic Chemistry
2023-2024
Chongqing University of Arts and Sciences
2021-2024
Kalman filter is a minimum-variance estimation for dynamic systems and has attracted much attention with the increasing demands of target tracking. Various algorithms was proposed deriving optimal state in last thirty years. This paper briefly surveys recent developments about (KF), Extended (EKF) Unscented (UKF). The basic theories are introduced, merits demerits them analyzed compared. Finally relevant conclusions development trends given.
With small cell networks becoming core parts of the fifth generation (5G) cellular networks, it is an important problem to evaluate impact user mobility on 5G networks. However, tendency and clustering habits in human activities have not been considered traditional models. In this paper, behaviors are first performance for based individual model (IMM). As key contributions, pause probability, arrival, departure probabilities derived paper evaluating a hotspot-type network. Furthermore,...
Alibaba runs the largest e-commerce platform in world serving more than 600 million customers, with a GMV (gross merchandise value) exceeding USD 768 billion FY2018. Online transactions have three notable characteristics: (1) drastic increase of per second kickoff major sales and promotion events, (2) large number hot records that can easily overwhelm system buffers, (3) quick shift "temperature'' (hot v.s. warm cold) different due to availability promotions on categories over short time...
Learning low-dimensional representations of networks has proved effective in a variety tasks such as node classification, link prediction and network visualization. Existing methods can effectively encode different structural properties into the representations, neighborhood connectivity patterns, global role similarities other high-order proximities. However, except for objectives to capture properties, most them suffer from lack additional constraints enhancing robustness representations....
A rising number of embedded devices are reachable in the cyberspace, such as routers, cameras, printers, etc. Those usually run firmware whose code is proprietary with few public documents. Furthermore, most images cannot be analyzed dynamic analysis due to various hardware-specific peripherals. As a result, it hinders traditional static and techniques. In this paper, we propose binary approach, DTaint, detect taint-style vulnerabilities firmware. The vulnerability typical class weakness,...
Post-training quantization(PTQ) has been widely studied in recent years because it does not require retraining the network or entire training dataset. However, naively applying PTQ method to quantize low-level image tasks such as learned compression(LIC) usually incurs significant accuracy degradation. Existing solutions often aim optimize calibration process minimize quantization loss context of uniform quantization, which makes difficult further reduce loss. This work achieves accurate...
Abstract With the rapid development of social media, astrology-related virtual communities have gained significant popularity in China. However, mechanisms behind formation astrological addiction behaviors within remain largely unexplored. This study, based on Stimulus-Organism-Response (S-O-R) theory, investigates how community environmental characteristics and user traits influence through mediation blogger trust. The results show that both atmosphere (CA) expertise (PK) significantly...
In eastern Asia, several Middle-Late Pleistocene human fossils, such as the Dali, Jinniushan, Hualongdong, and Harbin crania, evidently resemble each other are phylogenetically closer to H. sapiens than neanderthalensis or archaic humans.1Ni X. Ji Q. Wu W. et al.Massive cranium from establishes a new Middle lineage in China.The Innovation. 2021; 2 (this issue, 100130)https://doi.org/10.1016/j.xinn.2021.100130Abstract Full Text PDF Google Scholar The is best preserved of this group. It shows...
Nowadays, the industrial control system (ICS) plays a vital role in critical infrastructures like power grid. However, there is an increasing security concern that ICS devices are being vulnerable to malicious users/attackers, where any subtle changing or tampering attack would cause significant damage manufacturing. In this paper, we propose iFinger, novel detection approach designed mitigate attacks adapting various scenes. We take advantage of important insight protocol packets include...
Abstract Abnormal signals are inevitable in big data acquired from harsh industrial environments. detection is a crucial component of condition monitoring for rotating parts and also the premise cleaning, compensation, mining. To detect abnormal segments rolling bearings, this paper proposes dynamic adaptive local outlier factor (DALOF) anomaly method. First, segmentation method based on sliding windows designed to determine samples with variable lengths. Then, time-domain feature extraction...
Modern software systems are increasingly relying on dependencies from the ecosystem. A recent estimation shows that around 35% of an open-source project's code come its depended libraries. Unfortunately, libraries often threatened by various vulnerability issues, and number disclosed vulnerabilities is increasing steadily over years. Such can pose significant security threats to whole ecosystem, not only vulnerable themselves, but also corresponding downstream projects. Many Software...