Xuan Chen

ORCID: 0000-0001-9967-3974
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Technology and Security Systems
  • Advanced Decision-Making Techniques
  • Software System Performance and Reliability
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Recommender Systems and Techniques
  • Advanced Data Compression Techniques
  • Human Mobility and Location-Based Analysis
  • Data Mining Algorithms and Applications
  • Advanced Measurement and Detection Methods
  • Spam and Phishing Detection
  • Web Data Mining and Analysis
  • Infrared Target Detection Methodologies
  • CCD and CMOS Imaging Sensors
  • GABA and Rice Research
  • Big Data and Digital Economy
  • Advanced SAR Imaging Techniques
  • Software Engineering Research
  • Mobile and Web Applications
  • Cloud Computing and Remote Desktop Technologies
  • Software Engineering Techniques and Practices

Wuhan Polytechnic University
2020-2024

Fudan University
2023-2024

Tencent (China)
2023

Guangxi Normal University
2023

Chiba University
2020-2022

Sorbonne Université
2019

North China University of Science and Technology
2019

Zhejiang University of Science and Technology
2017

Zhejiang Industry Polytechnic College
2016

IBM (United States)
2014

10.1007/s12083-021-01148-9 article EN Peer-to-Peer Networking and Applications 2021-05-12

With data transparency and immutability, the blockchain can provide trustless decentralized services for Internet of Things (IoT) applications. However, most blockchain-IoT networks, especially those with a private blockchain, are built on top an infrastructure-based wireless network (i.e., using Wi-Fi access points or cellular base stations). Hence, they still under risk Single-Point-of-Failure (SPoF) layer, hindering decentralization merit, example, when stations get failures. This paper...

10.3390/fi13070168 article EN cc-by Future Internet 2021-06-28

Blockchain technologies have been emerging with the potential to disrupt many fields (e.g., cryptocurrencies replacing traditional ones, enabling trustworthy voting, etc.). The Internet of Things (IoT) has predictably strengthened when integrating private blockchain, such as Ethereum. In an IoT deployment Ethereum, a thorough understanding latency is critical issue that not adequately understood in literature. Motivated by that, this work aims comprehend performance Ethereum two popular...

10.1109/jiot.2022.3165666 article EN IEEE Internet of Things Journal 2022-04-07

10.1016/j.future.2019.01.037 article EN publisher-specific-oa Future Generation Computer Systems 2019-02-04

Abstract In recent years, China’s science and technology have developed rapidly, the surveying mapping industry has also made great breakthroughs. Traditional aerospace photogrammetry cannot collect more accurate information from modern mapping. UAV tilt been developed. can realistically reflect position appearance of features. only perform vertical data acquisition, but fast efficient acquisition different angles. Not that, greatly improved image matching measurement technology. This paper...

10.1088/1757-899x/612/3/032023 article EN IOP Conference Series Materials Science and Engineering 2019-10-01

There is an increasing interest in adopting distributed ledger technologies (DLTs) to IoT applications that enable secured interaction between devices without third-party involvement. Among recent advanced DLTs, Ethereum blockchain and IOTA Tangle are emerging as promising candidates for various use cases. Both offer IoT-friendly features such lightweight crypto, open-source implementations, energy-efficient operations, etc. So far, the two have only been qualitatively evaluated together...

10.1109/iscit52804.2021.9590601 article EN 2021-10-19

How to better conduct research resource scheduling has long been a direction of cloud computing.This paper, aiming at slow convergence and easiness falling local optimum ant colony algorithm,has integrated genetic algorithm into the obtained hybrid (ACA -GA); in initial solution algorithm, it adopted selection, crossover mutation operations obtain an effective solution; secondly, used perception threshold path setting regulate individual selection optimal path; finally, improved volatile...

10.14257/ijgdc.2016.9.6.01 article EN International Journal of Grid and Distributed Computing 2016-06-30

This study evaluated the changes in physicochemical properties and appearance quality of long-grain rice during grinding process using image technologies aimed to provide reference for future research. The brown milling was divided into three stages, flatbed scanning, scanning electron microscopy (SEM), X-ray micro-computed tomography (micro-CT), low-field nuclear magic resonance (LF-NMR), headspace–gas chromatography–ion mobility spectrometry (HS–GC–IMS) were employed examine volatile...

10.3390/foods13193033 article EN cc-by Foods 2024-09-24

Large Language Models (LLMs) have become integral to many applications, with system prompts serving as a key mechanism regulate model behavior and ensure ethical outputs. In this paper, we introduce novel backdoor attack that systematically bypasses these prompts, posing significant risks the AI supply chain. Under normal conditions, adheres strictly its prompts. However, our allows malicious actors circumvent safeguards when triggered. Specifically, explore scenario where an LLM provider...

10.48550/arxiv.2410.04009 preprint EN arXiv (Cornell University) 2024-10-04

Problem of cloud computing resource optimization has always been the research hotspot, as problems how to satisfy execution speed, average response time and system utilization rate in allocation greatest extent.The paper first established scheduling model computing, second, introduced Gaussian differential mutation into individuals bat algorithm narrow individual search space.The improved (GDMBA) accelerated convergence lowered local.Through comparison with classical test function, it is...

10.14257/ijgdc.2016.9.4.25 article EN International Journal of Grid and Distributed Computing 2016-04-30

In the cloud environment, different kinds of jobs (Flink, PyTorch, TensorFlow, AI-Serving) are running in same cluster with service-level agreements (SLA). To manage large amounts a environment efficiently, it is critical to build system optimize job performance consideration multiple predefined objectives. For example, one kind optimization target improving resource utilization jobs, other objectives guarantee SLA (e.g., throughput, response time, and so on). Currently, most existing...

10.1109/icde55515.2023.00262 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2023-04-01

Requirements include the core functionalities of software, however, due to their typical representations in natural language, professionals invest considerable effort modeling achieve more precise, coherent, and verifiable requirements analysis. This paper proposes a method called NL2PD for Problem Frames approach extract entities relationships from texts described language generate problem diagrams assist software Given document we can automatically required information diagrams, on top...

10.1109/re57278.2023.00052 article EN 2023-09-01

In this paper, a new two levels propagated neighborhoods based collaborative filtering method (PNCF) is proposed for developing effective and efficient recommendation system. Traditional (CF) algorithms focus on construct k-nearest neighborhood each item/user from user-item purchase/rating matrix, such as item-based k-nearest-neighbor (itemKNN) user-based (userKNN). However, the utilization of K-nearest singe always misses some nature neighbors due to inevitable data noise sparsity,...

10.1109/soli.2014.6960704 article EN 2014-10-01

10.14257/ijdta.2016.9.4.06 article EN International Journal of Database Theory and Application 2016-04-30

The phishing scam is a major kind of fraudulence in blockchain. And it has become an urgent issue to discern and prevent the fraudulent behaviors. However, large-scale dynamic nature transaction network imposes great challenges on identification analysis. While there have been many sophisticated machine learning approaches providing predictive capability terms detecting such cases, they usually offer little insight into essence those behaviors occasion when activities happen. Motivated by...

10.1145/3615522.3615540 article EN 2023-09-22

This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It constructed based on central idea of exploiting a safety management mobile terminal to further introduce over all layout, different sorts capacity and technology data base. The primary goal ensure university participating in activities while integrating other major functions together such as regional tracking localizing, information...

10.1109/iccse.2017.8085522 article EN 2017-08-01

In this article, from the perspective of rice processing loss, paper proposes a method to evaluate loss produced by enterprises using data analysis. The specific content is build fitting simulation model unit power consumption and production rate based on various types across country at different scales, equipment, technological processes, thereby establishing evaluation system; Based enterprise be evaluated, an optimization was constructed; results diagnosis were combined with losses...

10.1109/icicas51530.2020.00084 article EN 2021 International Conference on Intelligent Computing, Automation and Systems (ICICAS) 2020-12-01
Coming Soon ...