- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Technology and Security Systems
- Advanced Decision-Making Techniques
- Software System Performance and Reliability
- Service-Oriented Architecture and Web Services
- Advanced Computational Techniques and Applications
- Recommender Systems and Techniques
- Advanced Data Compression Techniques
- Human Mobility and Location-Based Analysis
- Data Mining Algorithms and Applications
- Advanced Measurement and Detection Methods
- Spam and Phishing Detection
- Web Data Mining and Analysis
- Infrared Target Detection Methodologies
- CCD and CMOS Imaging Sensors
- GABA and Rice Research
- Big Data and Digital Economy
- Advanced SAR Imaging Techniques
- Software Engineering Research
- Mobile and Web Applications
- Cloud Computing and Remote Desktop Technologies
- Software Engineering Techniques and Practices
Wuhan Polytechnic University
2020-2024
Fudan University
2023-2024
Tencent (China)
2023
Guangxi Normal University
2023
Chiba University
2020-2022
Sorbonne Université
2019
North China University of Science and Technology
2019
Zhejiang University of Science and Technology
2017
Zhejiang Industry Polytechnic College
2016
IBM (United States)
2014
With data transparency and immutability, the blockchain can provide trustless decentralized services for Internet of Things (IoT) applications. However, most blockchain-IoT networks, especially those with a private blockchain, are built on top an infrastructure-based wireless network (i.e., using Wi-Fi access points or cellular base stations). Hence, they still under risk Single-Point-of-Failure (SPoF) layer, hindering decentralization merit, example, when stations get failures. This paper...
Blockchain technologies have been emerging with the potential to disrupt many fields (e.g., cryptocurrencies replacing traditional ones, enabling trustworthy voting, etc.). The Internet of Things (IoT) has predictably strengthened when integrating private blockchain, such as Ethereum. In an IoT deployment Ethereum, a thorough understanding latency is critical issue that not adequately understood in literature. Motivated by that, this work aims comprehend performance Ethereum two popular...
Abstract In recent years, China’s science and technology have developed rapidly, the surveying mapping industry has also made great breakthroughs. Traditional aerospace photogrammetry cannot collect more accurate information from modern mapping. UAV tilt been developed. can realistically reflect position appearance of features. only perform vertical data acquisition, but fast efficient acquisition different angles. Not that, greatly improved image matching measurement technology. This paper...
There is an increasing interest in adopting distributed ledger technologies (DLTs) to IoT applications that enable secured interaction between devices without third-party involvement. Among recent advanced DLTs, Ethereum blockchain and IOTA Tangle are emerging as promising candidates for various use cases. Both offer IoT-friendly features such lightweight crypto, open-source implementations, energy-efficient operations, etc. So far, the two have only been qualitatively evaluated together...
How to better conduct research resource scheduling has long been a direction of cloud computing.This paper, aiming at slow convergence and easiness falling local optimum ant colony algorithm,has integrated genetic algorithm into the obtained hybrid (ACA -GA); in initial solution algorithm, it adopted selection, crossover mutation operations obtain an effective solution; secondly, used perception threshold path setting regulate individual selection optimal path; finally, improved volatile...
This study evaluated the changes in physicochemical properties and appearance quality of long-grain rice during grinding process using image technologies aimed to provide reference for future research. The brown milling was divided into three stages, flatbed scanning, scanning electron microscopy (SEM), X-ray micro-computed tomography (micro-CT), low-field nuclear magic resonance (LF-NMR), headspace–gas chromatography–ion mobility spectrometry (HS–GC–IMS) were employed examine volatile...
Large Language Models (LLMs) have become integral to many applications, with system prompts serving as a key mechanism regulate model behavior and ensure ethical outputs. In this paper, we introduce novel backdoor attack that systematically bypasses these prompts, posing significant risks the AI supply chain. Under normal conditions, adheres strictly its prompts. However, our allows malicious actors circumvent safeguards when triggered. Specifically, explore scenario where an LLM provider...
Problem of cloud computing resource optimization has always been the research hotspot, as problems how to satisfy execution speed, average response time and system utilization rate in allocation greatest extent.The paper first established scheduling model computing, second, introduced Gaussian differential mutation into individuals bat algorithm narrow individual search space.The improved (GDMBA) accelerated convergence lowered local.Through comparison with classical test function, it is...
In the cloud environment, different kinds of jobs (Flink, PyTorch, TensorFlow, AI-Serving) are running in same cluster with service-level agreements (SLA). To manage large amounts a environment efficiently, it is critical to build system optimize job performance consideration multiple predefined objectives. For example, one kind optimization target improving resource utilization jobs, other objectives guarantee SLA (e.g., throughput, response time, and so on). Currently, most existing...
Requirements include the core functionalities of software, however, due to their typical representations in natural language, professionals invest considerable effort modeling achieve more precise, coherent, and verifiable requirements analysis. This paper proposes a method called NL2PD for Problem Frames approach extract entities relationships from texts described language generate problem diagrams assist software Given document we can automatically required information diagrams, on top...
In this paper, a new two levels propagated neighborhoods based collaborative filtering method (PNCF) is proposed for developing effective and efficient recommendation system. Traditional (CF) algorithms focus on construct k-nearest neighborhood each item/user from user-item purchase/rating matrix, such as item-based k-nearest-neighbor (itemKNN) user-based (userKNN). However, the utilization of K-nearest singe always misses some nature neighbors due to inevitable data noise sparsity,...
The phishing scam is a major kind of fraudulence in blockchain. And it has become an urgent issue to discern and prevent the fraudulent behaviors. However, large-scale dynamic nature transaction network imposes great challenges on identification analysis. While there have been many sophisticated machine learning approaches providing predictive capability terms detecting such cases, they usually offer little insight into essence those behaviors occasion when activities happen. Motivated by...
This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It constructed based on central idea of exploiting a safety management mobile terminal to further introduce over all layout, different sorts capacity and technology data base. The primary goal ensure university participating in activities while integrating other major functions together such as regional tracking localizing, information...
In this article, from the perspective of rice processing loss, paper proposes a method to evaluate loss produced by enterprises using data analysis. The specific content is build fitting simulation model unit power consumption and production rate based on various types across country at different scales, equipment, technological processes, thereby establishing evaluation system; Based enterprise be evaluated, an optimization was constructed; results diagnosis were combined with losses...