Bo Gao

ORCID: 0000-0002-0601-306X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Evolutionary Game Theory and Cooperation
  • Privacy-Preserving Technologies in Data
  • Nonlinear Photonic Systems
  • Evolution and Genetic Dynamics
  • Opinion Dynamics and Social Influence
  • Nonlinear Waves and Solitons
  • Privacy, Security, and Data Protection
  • Complex Network Analysis Techniques
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Advanced Fiber Laser Technologies
  • Experimental Behavioral Economics Studies
  • Gene Regulatory Network Analysis
  • Cryptographic Implementations and Security
  • Adversarial Robustness in Machine Learning
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Laser-Matter Interactions and Applications
  • Fractional Differential Equations Solutions
  • Spectroscopy and Laser Applications
  • Microbial Metabolic Engineering and Bioproduction
  • Network Security and Intrusion Detection
  • Evolutionary Psychology and Human Behavior
  • Chaos-based Image/Signal Encryption
  • Generative Adversarial Networks and Image Synthesis
  • Data Stream Mining Techniques

Inner Mongolia University of Finance and Economics
2013-2023

Beijing Jiaotong University
2013-2023

Chinese Academy of Sciences
2016-2017

Institute of Computing Technology
2016-2017

KU Leuven
2015

Chongqing University of Technology
2015

Beijing University of Posts and Telecommunications
2013-2014

Centrum Wiskunde & Informatica
2010

Up to now, immunization of disease propagation has attracted great attention in both theoretical and experimental researches. However, vast majority existing achievements are limited the simple assumption single layer networked population, which seems obviously inconsistent with recent development complex network theory: each node could possess multiple roles different topology connections. Inspired by this fact, we here propose strategies on multiplex networks, including node-based random...

10.1371/journal.pone.0112018 article EN cc-by PLoS ONE 2014-11-17

Punishment widely exists in social and biological systems it has been proved to be an effective way promote cooperation evolutionary game previous work. In this paper, we introduce a new mechanism of punishment that the fine can multiplied if there are several punishers decide punish defector, which leads low payoff defector promotes level cooperation. This simulate group hunt is common natural animal world, for example, system, pack every individual cooperates with each other prey stronger...

10.1016/j.chaos.2018.12.040 article EN cc-by-nc-nd Chaos Solitons & Fractals 2019-02-06

Centralized spectrum management is one of the key dynamic access (DSA) mechanisms proposed to govern sharing between government incumbent users (IUs) and commercial secondary (SUs). In current centralized DSA designs, operation data both IUs SUs needs be shared with a central server. However, often classified information SU may also secret. The system design dissatisfies privacy requirement since server not necessarily trust-worthy for holding such sensitive data. To address issue, this...

10.1145/2942358.2942384 article EN 2016-07-05

We present an algebraic approach to reveal attractor transitions in Boolean networks under single control based on the recently developed matrix semitensor product theory. In this setting, reachability of attractors is estimated by state transition matrices. then propose procedures that compute shortest sequence and result each step input (control) exactly. The general derivation exemplified numerical simulations for two kinds gene regulation networks, protein-nucleic acid interactions...

10.1103/physreve.88.062706 article EN Physical Review E 2013-12-04

Seeking nodes whose removal can effectively dismantle networks is closely related to the robustness of under targeted attacks or malicious software. Modern systems, such as critical infrastructure and cyber-physical however, become increasingly dependent on others, which be encapsulated into framework interdependent networks. In this brief, we focus optimal dismantling networks, propose a novel algorithm, named inverse explosive percolation (IEP), find nodes. The IEP proceeds by first...

10.1109/tcsii.2018.2793257 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2018-01-15

Cascading failures and epidemic dynamics, as two successful application realms of network science, are usually investigated separately. How do they affect each other is still one open, interesting problem. In this letter, we couple both processes put them into the framework interdependent networks, where only supports dynamical process. Of particular interest, spontaneously form a feedback loop: virus propagation triggers cascading systems while suppress propagation. Especially, there exists...

10.1209/0295-5075/115/58004 article EN EPL (Europhysics Letters) 2016-09-01

Centralized spectrum management is one of the key dynamic access (DSA) mechanisms proposed to govern sharing between government incumbent users (IUs) and commercial secondary (SUs). In current centralized DSA designs, operation data both IUs SUs need be shared with a central server. However, are often classified information SU may also secrets. The system design dissatisfies privacy requirement SUs, since server not necessarily trustworthy for holding such sensitive data. To address issue,...

10.1109/jsac.2016.2633059 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2016-01-01

We consider an aspiration-based asymmetric individual activity co-evolutionary prisoner’s dilemma game model on the square lattice. In detail, each player has weight that evolves with its strategy. introduce setting only μ fractions of players in network chosen to be active can update their weights according whether payoffs satisfy aspirations. Therefore, our regarded as a type intrinsic motivation satisfaction. Through Monte Carlo simulations lattice, co-evolution mechanism been proven...

10.1063/5.0160264 article EN Chaos An Interdisciplinary Journal of Nonlinear Science 2023-09-01

In this paper, a higher-order variable-coefficient nonlinear Schrödinger equation is studied, which describes an inhomogeneous alpha helical protein with excitation and interaction under the continuum approximation. With aid of auxiliary function, we obtain Hirota's bilinear equations set integrable constraints. Using method symbolic computation, derive dark one-, two- N-soliton solutions. Influences variable coefficients on soliton velocity, amplitude, shape are analyzed. For instance, when...

10.1080/17455030.2017.1409914 article EN Waves in Random and Complex Media 2017-12-08

On-device intelligence (ODI) enables artificial (AI) applications to run on end devices, providing real-time and customized AI services without relying remote servers. However, training models for on-device deployment face significant challenges due the decentralized privacy-sensitive nature of users' data, along with end-side constraints related network connectivity, computation efficiency, etc. Existing paradigms, such as cloud-based training, federated learning, transfer fail sufficiently...

10.48550/arxiv.2404.10255 preprint EN arXiv (Cornell University) 2024-04-15

We construct a flexible lattice based scheme on semitensor product learning with errors (STP-LWE), which is variant of problem. have proved that STP-LWE hard when LWE hard. Our to be secure against indistinguishable chosen message attacks, and it can achieve balance between the security efficiency in hierarchical encryption systems. In addition, our almost as efficient dual GPV08.

10.1155/2014/341490 article EN cc-by Mathematical Problems in Engineering 2014-01-01

Dynamic spectrum access (DSA) technique has emerged as a fundamental approach to mitigate the scarcity problem. As key form of DSA, government is proposing release more federal for sharing with commercial wireless users. However, flourish federal-commercial hinges upon how privacy managed. In current DSA proposals, sensitive exclusion zone (E-Zone) information incumbent users (IUs) needs be shared system (SAS) realize allocation. SAS not necessarily trust-worthy holding IU E-Zone data,...

10.1109/icdcs.2017.322 article EN 2017-06-01

Boolean control networks have recently been attracting considerable interests as computational models for genetic regulatory networks. In this paper, we present an approach of impulsive attractor transitions in based on the recent developed matrix semitensor product theory. The reachability attractors is estimated, and controller also obtained. general derivation proposed here exemplified with a kind gene model, which protein-nucleic acid interactions network, numerical simulations.

10.1155/2013/674571 article EN Mathematical Problems in Engineering 2013-01-01
Coming Soon ...