Fang Chen

ORCID: 0000-0002-0326-8737
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Peer-to-Peer Network Technologies
  • Information and Cyber Security
  • Stochastic Gradient Optimization Techniques
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Distributed and Parallel Computing Systems
  • Human-Automation Interaction and Safety
  • Bayesian Methods and Mixture Models
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Brain Tumor Detection and Classification
  • Online Learning and Analytics
  • Recommender Systems and Techniques
  • Advanced Data and IoT Technologies
  • Traffic and Road Safety
  • Topic Modeling
  • Online and Blended Learning
  • Privacy, Security, and Data Protection
  • Chaos-based Image/Signal Encryption
  • Cybersecurity and Cyber Warfare Studies
  • Cybercrime and Law Enforcement Studies
  • Network Traffic and Congestion Control
  • Adversarial Robustness in Machine Learning

PLA Information Engineering University
2021-2024

Zhengzhou University
2024

National Supercomputing Center in Wuxi
2024

Zhejiang A & F University
2024

Yunnan University
2011-2022

Hefei University of Technology
2022

BGI Group (China)
2022

State Grid Corporation of China (China)
2019-2021

University of Technology Sydney
2021

Shanghai University of Finance and Economics
2021

The development of artificial intelligence and worldwide epidemic events has promoted the implementation smart healthcare while bringing issues data privacy, malicious attack, service quality. Medical Internet Things (MIoT), along with technologies federated learning blockchain, become a feasible solution for these issues. In this paper, we present blockchain-based method in which edge nodes maintain blockchain to resist single point failure MIoT devices implement make full distributed...

10.1155/2021/4376418 article EN cc-by Computational Intelligence and Neuroscience 2021-01-01

Although a cyber-physical system (CPS) enhances the control flexibility by connecting physical devices to network, it also increases possibility of network attacks on system, which can cause damage both property and personnel. To achieve CPS security, this paper proposes security protection method based digital twin (DT). By constructing DT models layer collecting real-time data is improved from several aspects. First, we construct data-driven behavior model for introduce expert knowledge in...

10.1109/jiot.2024.3366904 article EN IEEE Internet of Things Journal 2024-02-19

Powdery mildew, caused by the biotrophic fungus Blumeria graminis f. sp. tritici (Bgt), is a prevalent disease in common wheat (Triticum aestivum L.) and causes serious yield losses worldwide. We used map-based approach to clone major broad-spectrum powdery mildew resistance gene PmCH1357 from breeding line CH1357. was mapped 526 kb region containing only TraesCS5D01G044600. The TraesCS5D01G044600 sequence of susceptibility allele Taichung 29 (TC29) identical that Chinese Spring, whereas...

10.1016/j.cj.2019.08.004 article EN cc-by-nc-nd The Crop Journal 2019-10-20

Abstract Maintaining an appropriate level of trust in automated driving (AD) is critical to safe driving. However, few studies have explored factors affecting AD general, and no study, as far known, has directly investigated whether driver personality influences system. The current study investigates the relation between AD, focusing on Level 2 AD. Participants were required perform a period simulator, during which their gaze behavior recorded, well subjective scores after In three distinct...

10.1007/s42154-019-00086-w article EN cc-by Automotive Innovation 2020-02-21

Embryo selection has been based on developmental and morphological characteristics. However, the presence of an important intra-and inter-observer variability standard scoring system (SSS) reported. A computer-assisted (CASS) potential to overcome most these disadvantages associated with SSS. The aims this study were construct a prediction model, data mining approaches, compare predictive performance models in SSS CASS evaluate whether using model would impact embryo for transfer. total 871...

10.1186/s12958-016-0145-1 article EN cc-by Reproductive Biology and Endocrinology 2016-03-02

The adoption of Artificial Intelligence (AI) is currently under scrutiny due to various concerns such as fairness, and how does the fairness an AI algorithm affects user's trust much legitimate pursue. In this regard, we aim understand relationship between induced algorithmic its perception in humans. particular, are interested whether these two positively correlated reflect substantive fairness. Furthermore, also study user decision making. To this, perform a simulate candidate shortlisting...

10.1109/besc53957.2021.9635182 preprint EN 2021-10-29

Active routers allow computation to be performed within the network by processing packets when they pass through routers. We design and implement a cluster-based active router system that provides multimedia stream transcoding service. The performance of is evaluated with three different load balancing schemes. evaluate out-of-order phenomenon analyze tradeoff between this speed. present stream-based round robin algorithm for service offered in demonstrate its superiority over conventional...

10.1109/ipdps.2003.1213131 article EN 2004-03-22

Gynostemma pentaphyllum (GP) is a plant commonly used in diabetic therapy China. GP having potent antioxidant effect against various free radicals. The purpose of the current investigation to identify cardioprotective streptozotocin (STZ)/ high fat diet (HFD) induced cardiac dysfunction rats via alteration AMPK/Nrf2/HO-1 pathway. Wistar were for protocol. received intraperitoneal injection STZ and HFD induce remodelling. Blood glucose level, insulin lipid parameters estimated. pressure heart...

10.5650/jos.ess21281 article EN cc-by-sa Journal of Oleo Science 2022-01-01

Journal Article From Hypotyposis to Metalepsis: Narrative Devices in Contemporary Fantastic Fiction Get access Fanfan Chen Department of English & Doctoral Program Comparative LiteratureNational Dong Hwa UniversityTaiwan ffchen@mail.ndhu.edu.tw/chenfantasticism@gmail.com Search for other works by this author on: Oxford Academic Google Scholar Forum Modern Language Studies, Volume 44, Issue 4, October 2008, Pages 394–411, https://doi.org/10.1093/fmls/cqn051 Published: 14 September 2008

10.1093/fmls/cqn051 article EN Forum for Modern Language Studies 2008-09-14

The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is urgent to use cyber threat intelligence deal with complex and changing environment. However, usually exists in an unstructured form, a huge amount data poses great challenge security analysts. To this end, paper proposes novel information extraction system combining multiple models, which contains four key steps: entity extraction, coreference resolution, relation knowledge graph...

10.1155/2022/8477260 article EN cc-by Security and Communication Networks 2022-12-09

Password-based authenticated key exchange (PAKE) allows participants sharing low-entropy passwords to agree on cryptographically strong session keys over insecure networks. In this paper, we present two PAKE protocols from lattices in the two-party and three-party settings, respectively, which can resist quantum attacks achieve mutual authentication. The paper rounds of communication by carefully utilizing splittable properties underlying primitive, a CCA (Chosen-Ciphertext Attack)-secure...

10.1155/2020/8893628 article EN Wireless Communications and Mobile Computing 2020-12-14

In this work we propose and evaluate a framework for efficient real-time dissemination of dynamic data in distributed simulation virtual environments scalable fashion. A peer-to-peer overlay is used to create self-organizing groups participants. Filters that combine application-level knowledge are utilized control the message propagations minimize end-to-end delays. Our approach enables nodes trade-off processing overhead consistency precision. results illustrate our techniques meet...

10.1109/isorc.2005.9 article EN 2005-06-07

We present a vector spline technique for field reconstruction. These splines are based on an energy minimization functional, which involves the divergence and rotational fields of approximated vector. This can be used to determine underlying coordinate transformation in image mapping.

10.1109/icpr.1998.711194 article EN 2002-11-27
Coming Soon ...