- Security and Verification in Computing
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Higher Education and Teaching Methods
- Recommender Systems and Techniques
- Innovative Microfluidic and Catalytic Techniques Innovation
- Service-Oriented Architecture and Web Services
- Privacy-Preserving Technologies in Data
- Data Management and Algorithms
- IoT and Edge/Fog Computing
- Human Mobility and Location-Based Analysis
- Merger and Competition Analysis
- Legal Education and Practice Innovations
- Ethics in Clinical Research
- Ocean Acidification Effects and Responses
- Advanced Sensor and Control Systems
- Radiation Effects in Electronics
- Migration, Health and Trauma
- Customer Service Quality and Loyalty
- Cloud Computing and Resource Management
- Environmental Policies and Emissions
- Advanced Data Storage Technologies
- Interpreting and Communication in Healthcare
- VLSI and Analog Circuit Testing
Peking University
2021-2022
Putian University
2022
Shanghai International Studies University
2022
Indiana University Bloomington
2021-2022
Zhejiang Lab
2022
Indiana University
2021
Shandong University
2018
Mongolian University of Science and Technology
2014
Hiroshima University
2012-2013
Liaoning University of Technology
2011
Ensuring the proper use of sensitive data in analytics under complex privacy policies is an increasingly critical challenge. Many existing approaches lack portability, verifiability, and scalability across diverse processing frameworks. We introduce Picachv, a novel security monitor that automatically enforces policies. It works on relational algebra as abstraction for program semantics, enabling policy enforcement query plans generated by programs during execution. This approach simplifies...
In order to describe the roadmap of current edge computing research activities, we first gave a brief overview most advanced surveys published in last six years. We found that has been adaptively integrated into growing number applications. Edge theory and technology will bring substantial innovation incentive, as well large application scenarios different fields, such assisted smart city, Internet Vehicles(IoV), Industrial many other fields. However, believe comprehensive investigation...
Abstract Concerns regarding inappropriate leakage of sensitive personal information as well unauthorized data use are increasing with the growth genomic repositories. Therefore, privacy and security have become increasingly important need to be studied. With many proposed protection techniques, their applicability in support biomedical research should understood. For this purpose, we organized a community effort past 8 years through integrating for analysis, anonymization sharing consortium...
Aim To analyse net effects of self-rated workload and nurse staffing (nurse-to-patient ratio staff skill mix) on work engagement among clinical nurses. Background Improving nurses' is necessary to enhance patient outcomes, so factors that influence should be explored. Methods A cross-sectional study was conducted in 1,428 registered nurses from 145 units 11 hospitals. hierarchical linear model used the data. Results Self-rated had a negative effect (β = −0.353, p < .001, size (f2) 14.20%),...
The recent wave of in-browser cryptojacking has ebbed away, due to the new updates mainstream cryptocurrrencies, which demand level mining resources browsers cannot afford. As replacements, resource-rich, loosely protected free Internet services, such as Continuous Integration (CI) platforms, have become attractive targets. In this paper, we report a systematic study on real-world illicit cryptomining public CI platforms (called Cijacking). Unlike cryptojacking, Cijacks masquerade jobs and...
Self-rated health has been widely used as a useful screening tool to subjectively evaluate individuals' status. Under the context of rapid growth aging, there was dramatic expansion in internal older migrants China. Serious concerns on issues status continue attract quite lot attention over past decades. Public education is one most important care services and methods improve However, previous studies focus utilization public such visiting doctors, physical examination, hospitalization....
With rapid growth of the GPS enabled mobile devices, location-based online social network services become very popular, and allow their users to share life experiences with location information. In this paper, we considered a method for recommending places user based on spatial databases services. We used user-based collaborative filtering make set recommend places. proposed method, calculate similarity users' check-in activities not only positions but also semantics such as "shopping",...
A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove a data owner the integrity of initial state an enclave, including program operate on her data. For this purpose, data-processing is supposed be open or third party, so its functionality can evaluated before trust being established. In real world, however, increasingly there are application scenarios in which itself needs protected (e.g., proprietary algorithm). So compliance with...
Trusted execution environments (TEE) such as In-tel's Software Guard Extension (SGX) have been widely studied to boost security and privacy protection for the computation of sensitive data human genomics. However, a performance hurdle is often generated by SGX, especially from small enclave memory. In this paper, we propose new Hybrid Secured Flow framework (called "HySec-Flow") large-scale genomic analysis using SGX platforms. Here, data-intensive computing tasks can be partitioned into...
With rapid growth of the GPS enabled mobile device, location-based online social network services become more and popular, allow their users to share life experiences with location information. In this paper, we considered a method for recommending places user based on spatial databases services. We used user-based collaborative filtering make set recommended places. proposed method, calculate similarity users' check-in activities not only positions but also semantics such as "shopping",...
As an emerging technique for confidential computing, trusted execution environment (TEE) receives a lot of attention. To better develop, deploy, and run secure applications on TEE platform such as Intel's SGX, both academic industrial teams have devoted much effort to developing reliable convenient containers. In this paper, we studied the isolation strategies 15 existing containers protect from potentially malicious operating systems (OS) or untrusted applications, using semi-automatic...
A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs a remote attestation to prove data owner the integrity of initial state an enclave, including program operate on her data. For this purpose, data-processing is supposed be open owner, so its functionality can evaluated before trust established. However, increasingly there are application scenarios in which itself needs protected. So compliance with privacy policies expected by should verified without...
Due to the absence of in-enclave isolation, today's trusted execution environment (TEE), specifically Intel's Software Guard Extensions (SGX), does not have capability securely run different users' tasks within a single enclave, which is required for supporting real-world services, such as an machine learning model that classifies data from various sources, or microservice (e.g., search) performs very small task (within sub-seconds) user and therefore cannot afford resources delay creating...
The backwardness of the Mongolian network teaching resources results in its low reuse rates and utilization. For this situation, a retrieval method semantic web based on curriculum areas was set up. Firstly, established ontology course ‘Artificial Intelligence ’in area teaching, it uses relationship database MySQL to record information, top that, similarity calculation reasoning rules do information reasoning, end, builds query prototype system field Mongolian teaching. Experimental show...
This paper firstly introduces the Clean Development Mechanism (CDM) and presents situation of iron steel industry CDM project. Then it further studies methodologies on assessment influence projects sustainable development, analyzes evaluates effecting China's development case Wugang Coke Dry Quenching Finally, makes some suggestions about how to promote for projects.
Secure Layered architecture(SLA) has been become a widely used Architecture model. Each layer represents kind of function. In the current process software development, most SLA is based on MVC: Model, View and Controller. Model that to communicate with database provides data for controller. Controller logical layer, it responsible handling provided from model serve view. And display data. The Three tier architecture(TTA) practical in development. But some project, whose business more complex...