- Cloud Computing and Resource Management
- Rough Sets and Fuzzy Logic
- Distributed and Parallel Computing Systems
- Multi-Criteria Decision Making
- Fuzzy Logic and Control Systems
- Software System Performance and Reliability
- Advanced Algebra and Logic
- Advanced Data Storage Technologies
- Privacy-Preserving Technologies in Data
- Data Management and Algorithms
- Advanced Database Systems and Queries
- Network Security and Intrusion Detection
- Distributed systems and fault tolerance
- Advanced Computational Techniques and Applications
- Fuzzy Systems and Optimization
- Advanced Malware Detection Techniques
- Data Mining Algorithms and Applications
- Logic, Reasoning, and Knowledge
- Complex Network Analysis Techniques
- Web Data Mining and Analysis
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Software Reliability and Analysis Research
- Advanced Graph Neural Networks
Institute of Information Engineering
2015-2025
Chinese Academy of Sciences
2015-2025
University of Chinese Academy of Sciences
2016-2025
Southwestern University of Finance and Economics
2012-2024
Southwest University
2005-2024
University of Science and Technology Liaoning
2022
Art Institute of Portland
2020
Central South University
2016-2018
Institute of Computing Technology
2003-2013
Wuhan University of Science and Technology
2013
Abstract The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies. Despite initial explorations into the application LLMs in there is a lack comprehensive overview this research area. This paper addresses gap by providing systematic literature review, covering analysis over 300 works, encompassing 25 more than 10 downstream scenarios. Our three...
The Fermatean fuzzy set (FFS) is a momentous generalization of intuitionistic and Pythagorean that can more accurately portray the complex vague information elements has stronger expert flexibility during decision analysis. Combined Compromise Solution (CoCoSo) approach powerful decision-making technique to choose ideal objective by fusing three aggregation strategies. In this paper, an integrated, multi-criteria group-decision-making (MCGDM) based on CoCoSo FFS used assess green suppliers....
Automatic Text Summarization (ATS), utilizing Natural Language Processing (NLP) algorithms, aims to create concise and accurate summaries, thereby significantly reducing the human effort required in processing large volumes of text. ATS has drawn considerable interest both academic industrial circles. Many studies have been conducted past survey methods; however, they generally lack practicality for real-world implementations, as often categorize previous methods from a theoretical...
Causality analysis generates a dependency graph from system audit logs, which has emerged as an important solution for attack investigation. In the graph, nodes represent entities (e.g., processes and files) edges dependencies among process writing to file). Despite promising early results, causality often produces large (> 100,000 edges) it is daunting task security analysts inspect such To address challenges in investigation, we propose DEPCOMM, summarization approach that summary by...
Federated Learning (FL) is a promising approach to privacy-preserving machine learning. However, recent works reveal that gradients can leak private data. Using trusted SGX-processors for this task yields gradient-preserving but requires prevent exploitation of any side-channel attacks.
Cloud computing drives the design and development of diverse programming models for massive data processing. transformer framework aims to facilitate building data-parallel models. has two layers: a common runtime system model-specific system. using transformer, authors show how implement three models: dryad-like flow, MapReduce, All-Pairs.
Abstract In the age of big data, plenty valuable sensing data have been shared to enhance scientific innovation. However, this may cause unexpected privacy leakage. Although numerous preservation techniques, such as perturbation, encryption, and anonymization, proposed conceal sensitive information, it is usually at cost application utility. Moreover, most existing works did not distinguished underlying factors, features sampling rate, which contribute differently utility information implied...
Soft set theory and interval are all mathematical tools for dealing with uncertainties.This paper is devoted to the discussion of soft its application.The notion sets introduced by combining set.Several operations on presented in a manner parallel that used defining lattice structures established.In addition, based decision making problem analyzed.
Interval-valued fuzzy set (briefly, IVFS) is a generalization of that may better model imperfect information. Similarity measure useful tool for determining the similarity degree between two concepts. In this paper, definition IVFSs presented. Th ree approaches to constructing measures are proposed. Based on approaches, three computation formulae calculating obtained. The properties examined as whole.
Recent technological advances have accelerated the design and deployment of kinds secure applications on smartphones. Although users can access handle their data flexibly stably with mobile devices, not only computing it poses security challenges a new dimension that disclose lots sensitive privacy information over open devices networks as well. Thus, more malwares are emerging to compromise OS steal from these applications. In this paper, we propose payment framework TrustPAY TrustZone...
As a novel computing paradigm, e.g., cloud computing, become popular, researchers proposed various resource sharing techniques and provision techniques. However, very limited literatures pay attentions to the reliability of dynamically provided resources. In this paper, we propose failure rules aware node policy for heterogeneous services consolidated in infrastructure. We evaluate our with simulation approach, i.e., implement simulator service consolidation platform, which take...
Hadoop Distributed File System (HDFS) is the storage component of framework, which designed for maintaining and processing huge datasets efficiently among cluster nodes. To cooperate with MapReduce, computation infrastructure Hadoop, data required to be uploaded from local file systems HDFS. Unfortunately when massive scale, uploading procedure becomes extremely time-consuming, causes serious delay urgent tasks. This primary contribution this paper proposition Zput, a speedy mechanism can...