- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Network Time Synchronization Technologies
- Geology and Paleoclimatology Research
- Soil erosion and sediment transport
- Digital Transformation in Industry
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Aeolian processes and effects
- Security in Wireless Sensor Networks
- Anomaly Detection Techniques and Applications
- Physical Unclonable Functions (PUFs) and Hardware Security
- Video Coding and Compression Technologies
- Hydrological Forecasting Using AI
- IPv6, Mobility, Handover, Networks, Security
- Network Traffic and Congestion Control
- Cloud Data Security Solutions
- Flood Risk Assessment and Management
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Natural Language Processing Techniques
- Cloud Computing and Resource Management
- Geochemistry and Geologic Mapping
- Optical measurement and interference techniques
Xinjiang University
2025
Institute of Earth Environment
2017-2024
Chinese Academy of Sciences
2015-2024
University of Chinese Academy of Sciences
2018-2024
Nanjing University of Posts and Telecommunications
2024
Technical Institute of Physics and Chemistry
2020-2024
Shenyang Institute of Computing Technology (China)
2019-2023
Zhejiang A & F University
2023
Sichuan University of Science and Engineering
2023
Kunming Institute of Botany
2023
The rise of big data age in the Internet has led to explosive growth size. However, trust issue become biggest problem data, leading difficulty safe circulation and industry development. blockchain technology provides a new solution this by combining non-tampering, traceable features with smart contracts that automatically execute default instructions. In paper, we present credible sharing model based on contract ensure resources.
With the widespread use of industrial Internet technology in intelligent production lines, number task requests generated by smart terminals is growing exponentially. Achieving rapid response to these massive tasks becomes crucial. In this paper we focus on multi-objective scheduling problem lines and propose a strategy based priority. First, set up cloud-fog computing architecture for built function scheduling, which minimizes service delay energy consumption tasks. addition, improved...
Predicting land susceptibility to wind erosion is necessary mitigate the negative impacts of on soil fertility, ecosystems, and human health. This study first attempt model hazards through application a novel approach, graph convolutional networks (GCNs), as deep learning models with Monte Carlo dropout. approach applied Semnan Province in arid central Iran, an area vulnerable dust storms climate change. We mapped 15 potential factors controlling erosion, including climatic variables,...
Spatial accurate mapping of land susceptibility to wind erosion is necessary mitigate its destructive consequences. In this research, for the first time, we developed a novel methodology based on deep learning (DL) and active (AL) models, their combination (e.g., recurrent neural network (RNN), RNN-AL, gated units (GRU), GRU-AL) three interpretation techniques synergy matrix, SHapley Additive exPlanations (SHAP) decision plot, accumulated local effects (ALE) plot) map global erosion....
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention both academia industry due to the sensitiveness system. In past decade, extensive research has been carried out on these security issues, but no single study exists that addresses them adequately, especially for some important properties, such as user anonymity forward secrecy. As a step towards this direction, paper, authors propose lightweight three-factor anonymous authentication...
Large language models (LLMs) introduce new security risks, but there are few comprehensive evaluation suites to measure and reduce these risks. We present BenchmarkName, a novel benchmark quantify LLM risks capabilities. two areas for testing: prompt injection code interpreter abuse. evaluated multiple state-of-the-art (SOTA) LLMs, including GPT-4, Mistral, Meta Llama 3 70B-Instruct, Code Llama. Our results show that conditioning away risk of attack remains an unsolved problem; example, all...
This paper proposes a functional safety and information security protection mechanism based on blockchain technology. The design of the basic level integration structure CPS distributed architecture related measures are introduced. An effective communication judgment error threshold is proposed, which stored judged by smart contract. And refund transaction with clock proposed to ensure execution mechanism. article takes cyber physical machine tool system as an example describe SIL method...
Rolling bearing fault diagnosis is of great significance to the safe and reliable operation manufacturing equipment. In actual complex environment, collected signals usually contain a large amount noises from resonances environment other components, resulting in nonlinear characteristics data. Existing deep-learning-based solutions for perform poorly classification performance under noises. To address above problems, this paper proposes an improved dilated-convolutional-neural network-based...
The kernel of Torreya grandis cv. 'Merrillii' (Cephalotaxaceae) is a rare nut with variety bioactive compounds and high economic value. β-sitosterol not only the most abundant plant sterol but also has various biological effects, such as antimicrobial, anticancer, anti-inflammatory, lipid-lowering, antioxidant, antidiabetic activities. In this study, squalene synthase gene from T. grandis, TgSQS, was identified functionally characterized. TgSQS encodes deduced protein 410 amino acids....
Abstract Blockchain-based cloud application (BCP) is an emerging architecture. By moving trust-critical functions onto blockchain, BCP offers unprecedented function transparency and data integrity. Ethereum by far the most popular blockchain platform chosen for BCP. In Ethereum, special programs named smart contracts are often used to implement key components design, users can send transactions contracts, which will automatically lead code execution state modification. However, unlike...
In recent years, as blockchain adoption has been expanding across a wide range of domains, e.g., digital asset, supply chain finance, etc., the confidentiality smart contracts is now fundamental demand for practical applications. However, while new privacy protection techniques keep coming out, how existing ones can best fit development settings little studied. Suffering from limited architectural support in terms programming interfaces, state-of-the-art solutions hardly reach general...
With the development of intelligent manufacturing, traditional industrial communication systems based on field bus and Ethernet can hardly meet its common requirements for complexity scalability in foreseeable future. In contrast, wireless network is not mature yet, there are still plenty problems velocity, stability, security other aspects. this paper, a model to enhance comprehensive performance networks proposed existing scheduling methods Time-sensitive networks. The composed 3 parts,...
This paper proposes a novel method for layered media transmission in mobile broadcast systems, which is referred to as the layer-mixed forward error correction (FEC). Unlike existing unequal protection and layer-aware FEC decode each layer symbols with probability, new approach capable of decoding data deterministically long enough are received corresponding specific layer. The lower always decoded prior upper layers, facilitates delivery scalable stream, especially TV services heterogeneous...