- Evolutionary Game Theory and Cooperation
- Privacy-Preserving Technologies in Data
- Nonlinear Photonic Systems
- Evolution and Genetic Dynamics
- Opinion Dynamics and Social Influence
- Nonlinear Waves and Solitons
- Privacy, Security, and Data Protection
- Complex Network Analysis Techniques
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Advanced Fiber Laser Technologies
- Experimental Behavioral Economics Studies
- Gene Regulatory Network Analysis
- Cryptographic Implementations and Security
- Adversarial Robustness in Machine Learning
- Mathematical and Theoretical Epidemiology and Ecology Models
- Laser-Matter Interactions and Applications
- Fractional Differential Equations Solutions
- Spectroscopy and Laser Applications
- Microbial Metabolic Engineering and Bioproduction
- Network Security and Intrusion Detection
- Evolutionary Psychology and Human Behavior
- Chaos-based Image/Signal Encryption
- Generative Adversarial Networks and Image Synthesis
- Data Stream Mining Techniques
Inner Mongolia University of Finance and Economics
2013-2023
Beijing Jiaotong University
2013-2023
Chinese Academy of Sciences
2016-2017
Institute of Computing Technology
2016-2017
KU Leuven
2015
Chongqing University of Technology
2015
Beijing University of Posts and Telecommunications
2013-2014
Centrum Wiskunde & Informatica
2010
Up to now, immunization of disease propagation has attracted great attention in both theoretical and experimental researches. However, vast majority existing achievements are limited the simple assumption single layer networked population, which seems obviously inconsistent with recent development complex network theory: each node could possess multiple roles different topology connections. Inspired by this fact, we here propose strategies on multiplex networks, including node-based random...
Punishment widely exists in social and biological systems it has been proved to be an effective way promote cooperation evolutionary game previous work. In this paper, we introduce a new mechanism of punishment that the fine can multiplied if there are several punishers decide punish defector, which leads low payoff defector promotes level cooperation. This simulate group hunt is common natural animal world, for example, system, pack every individual cooperates with each other prey stronger...
Centralized spectrum management is one of the key dynamic access (DSA) mechanisms proposed to govern sharing between government incumbent users (IUs) and commercial secondary (SUs). In current centralized DSA designs, operation data both IUs SUs needs be shared with a central server. However, often classified information SU may also secret. The system design dissatisfies privacy requirement since server not necessarily trust-worthy for holding such sensitive data. To address issue, this...
We present an algebraic approach to reveal attractor transitions in Boolean networks under single control based on the recently developed matrix semitensor product theory. In this setting, reachability of attractors is estimated by state transition matrices. then propose procedures that compute shortest sequence and result each step input (control) exactly. The general derivation exemplified numerical simulations for two kinds gene regulation networks, protein-nucleic acid interactions...
Seeking nodes whose removal can effectively dismantle networks is closely related to the robustness of under targeted attacks or malicious software. Modern systems, such as critical infrastructure and cyber-physical however, become increasingly dependent on others, which be encapsulated into framework interdependent networks. In this brief, we focus optimal dismantling networks, propose a novel algorithm, named inverse explosive percolation (IEP), find nodes. The IEP proceeds by first...
Cascading failures and epidemic dynamics, as two successful application realms of network science, are usually investigated separately. How do they affect each other is still one open, interesting problem. In this letter, we couple both processes put them into the framework interdependent networks, where only supports dynamical process. Of particular interest, spontaneously form a feedback loop: virus propagation triggers cascading systems while suppress propagation. Especially, there exists...
Centralized spectrum management is one of the key dynamic access (DSA) mechanisms proposed to govern sharing between government incumbent users (IUs) and commercial secondary (SUs). In current centralized DSA designs, operation data both IUs SUs need be shared with a central server. However, are often classified information SU may also secrets. The system design dissatisfies privacy requirement SUs, since server not necessarily trustworthy for holding such sensitive data. To address issue,...
We consider an aspiration-based asymmetric individual activity co-evolutionary prisoner’s dilemma game model on the square lattice. In detail, each player has weight that evolves with its strategy. introduce setting only μ fractions of players in network chosen to be active can update their weights according whether payoffs satisfy aspirations. Therefore, our regarded as a type intrinsic motivation satisfaction. Through Monte Carlo simulations lattice, co-evolution mechanism been proven...
In this paper, a higher-order variable-coefficient nonlinear Schrödinger equation is studied, which describes an inhomogeneous alpha helical protein with excitation and interaction under the continuum approximation. With aid of auxiliary function, we obtain Hirota's bilinear equations set integrable constraints. Using method symbolic computation, derive dark one-, two- N-soliton solutions. Influences variable coefficients on soliton velocity, amplitude, shape are analyzed. For instance, when...
On-device intelligence (ODI) enables artificial (AI) applications to run on end devices, providing real-time and customized AI services without relying remote servers. However, training models for on-device deployment face significant challenges due the decentralized privacy-sensitive nature of users' data, along with end-side constraints related network connectivity, computation efficiency, etc. Existing paradigms, such as cloud-based training, federated learning, transfer fail sufficiently...
We construct a flexible lattice based scheme on semitensor product learning with errors (STP-LWE), which is variant of problem. have proved that STP-LWE hard when LWE hard. Our to be secure against indistinguishable chosen message attacks, and it can achieve balance between the security efficiency in hierarchical encryption systems. In addition, our almost as efficient dual GPV08.
Dynamic spectrum access (DSA) technique has emerged as a fundamental approach to mitigate the scarcity problem. As key form of DSA, government is proposing release more federal for sharing with commercial wireless users. However, flourish federal-commercial hinges upon how privacy managed. In current DSA proposals, sensitive exclusion zone (E-Zone) information incumbent users (IUs) needs be shared system (SAS) realize allocation. SAS not necessarily trust-worthy holding IU E-Zone data,...
Boolean control networks have recently been attracting considerable interests as computational models for genetic regulatory networks. In this paper, we present an approach of impulsive attractor transitions in based on the recent developed matrix semitensor product theory. The reachability attractors is estimated, and controller also obtained. general derivation proposed here exemplified with a kind gene model, which protein-nucleic acid interactions network, numerical simulations.