- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Peer-to-Peer Network Technologies
- Information and Cyber Security
- Stochastic Gradient Optimization Techniques
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Distributed and Parallel Computing Systems
- Human-Automation Interaction and Safety
- Bayesian Methods and Mixture Models
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Brain Tumor Detection and Classification
- Online Learning and Analytics
- Recommender Systems and Techniques
- Advanced Data and IoT Technologies
- Traffic and Road Safety
- Topic Modeling
- Online and Blended Learning
- Privacy, Security, and Data Protection
- Chaos-based Image/Signal Encryption
- Cybersecurity and Cyber Warfare Studies
- Cybercrime and Law Enforcement Studies
- Network Traffic and Congestion Control
- Adversarial Robustness in Machine Learning
PLA Information Engineering University
2021-2024
Zhengzhou University
2024
National Supercomputing Center in Wuxi
2024
Zhejiang A & F University
2024
Yunnan University
2011-2022
Hefei University of Technology
2022
BGI Group (China)
2022
State Grid Corporation of China (China)
2019-2021
University of Technology Sydney
2021
Shanghai University of Finance and Economics
2021
The development of artificial intelligence and worldwide epidemic events has promoted the implementation smart healthcare while bringing issues data privacy, malicious attack, service quality. Medical Internet Things (MIoT), along with technologies federated learning blockchain, become a feasible solution for these issues. In this paper, we present blockchain-based method in which edge nodes maintain blockchain to resist single point failure MIoT devices implement make full distributed...
Although a cyber-physical system (CPS) enhances the control flexibility by connecting physical devices to network, it also increases possibility of network attacks on system, which can cause damage both property and personnel. To achieve CPS security, this paper proposes security protection method based digital twin (DT). By constructing DT models layer collecting real-time data is improved from several aspects. First, we construct data-driven behavior model for introduce expert knowledge in...
Powdery mildew, caused by the biotrophic fungus Blumeria graminis f. sp. tritici (Bgt), is a prevalent disease in common wheat (Triticum aestivum L.) and causes serious yield losses worldwide. We used map-based approach to clone major broad-spectrum powdery mildew resistance gene PmCH1357 from breeding line CH1357. was mapped 526 kb region containing only TraesCS5D01G044600. The TraesCS5D01G044600 sequence of susceptibility allele Taichung 29 (TC29) identical that Chinese Spring, whereas...
Abstract Maintaining an appropriate level of trust in automated driving (AD) is critical to safe driving. However, few studies have explored factors affecting AD general, and no study, as far known, has directly investigated whether driver personality influences system. The current study investigates the relation between AD, focusing on Level 2 AD. Participants were required perform a period simulator, during which their gaze behavior recorded, well subjective scores after In three distinct...
Embryo selection has been based on developmental and morphological characteristics. However, the presence of an important intra-and inter-observer variability standard scoring system (SSS) reported. A computer-assisted (CASS) potential to overcome most these disadvantages associated with SSS. The aims this study were construct a prediction model, data mining approaches, compare predictive performance models in SSS CASS evaluate whether using model would impact embryo for transfer. total 871...
The adoption of Artificial Intelligence (AI) is currently under scrutiny due to various concerns such as fairness, and how does the fairness an AI algorithm affects user's trust much legitimate pursue. In this regard, we aim understand relationship between induced algorithmic its perception in humans. particular, are interested whether these two positively correlated reflect substantive fairness. Furthermore, also study user decision making. To this, perform a simulate candidate shortlisting...
Active routers allow computation to be performed within the network by processing packets when they pass through routers. We design and implement a cluster-based active router system that provides multimedia stream transcoding service. The performance of is evaluated with three different load balancing schemes. evaluate out-of-order phenomenon analyze tradeoff between this speed. present stream-based round robin algorithm for service offered in demonstrate its superiority over conventional...
Gynostemma pentaphyllum (GP) is a plant commonly used in diabetic therapy China. GP having potent antioxidant effect against various free radicals. The purpose of the current investigation to identify cardioprotective streptozotocin (STZ)/ high fat diet (HFD) induced cardiac dysfunction rats via alteration AMPK/Nrf2/HO-1 pathway. Wistar were for protocol. received intraperitoneal injection STZ and HFD induce remodelling. Blood glucose level, insulin lipid parameters estimated. pressure heart...
Journal Article From Hypotyposis to Metalepsis: Narrative Devices in Contemporary Fantastic Fiction Get access Fanfan Chen Department of English & Doctoral Program Comparative LiteratureNational Dong Hwa UniversityTaiwan ffchen@mail.ndhu.edu.tw/chenfantasticism@gmail.com Search for other works by this author on: Oxford Academic Google Scholar Forum Modern Language Studies, Volume 44, Issue 4, October 2008, Pages 394–411, https://doi.org/10.1093/fmls/cqn051 Published: 14 September 2008
The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is urgent to use cyber threat intelligence deal with complex and changing environment. However, usually exists in an unstructured form, a huge amount data poses great challenge security analysts. To this end, paper proposes novel information extraction system combining multiple models, which contains four key steps: entity extraction, coreference resolution, relation knowledge graph...
Password-based authenticated key exchange (PAKE) allows participants sharing low-entropy passwords to agree on cryptographically strong session keys over insecure networks. In this paper, we present two PAKE protocols from lattices in the two-party and three-party settings, respectively, which can resist quantum attacks achieve mutual authentication. The paper rounds of communication by carefully utilizing splittable properties underlying primitive, a CCA (Chosen-Ciphertext Attack)-secure...
In this work we propose and evaluate a framework for efficient real-time dissemination of dynamic data in distributed simulation virtual environments scalable fashion. A peer-to-peer overlay is used to create self-organizing groups participants. Filters that combine application-level knowledge are utilized control the message propagations minimize end-to-end delays. Our approach enables nodes trade-off processing overhead consistency precision. results illustrate our techniques meet...
We present a vector spline technique for field reconstruction. These splines are based on an energy minimization functional, which involves the divergence and rotational fields of approximated vector. This can be used to determine underlying coordinate transformation in image mapping.