- IoT and Edge/Fog Computing
- Context-Aware Activity Recognition Systems
- Blockchain Technology Applications and Security
- Advanced Steganography and Watermarking Techniques
- Advanced Sensor and Control Systems
- Digital Transformation in Industry
- Advanced Memory and Neural Computing
- Smart Grid Security and Resilience
- Mesoporous Materials and Catalysis
- Technology and Data Analysis
- Energy Efficient Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Age of Information Optimization
- Traditional Chinese Medicine Studies
- Catalytic Processes in Materials Science
- Zeolite Catalysis and Synthesis
- User Authentication and Security Systems
- Alzheimer's disease research and treatments
- Privacy-Preserving Technologies in Data
- Medicinal Plants and Bioactive Compounds
Shanghai Jiao Tong University
2017-2024
Nanjing University
2013
In order to fulfill the requirements of Intelligent Transportation Systems (ITS) on ultra-delay service response, task scheduling for trajectory analysis is being shifted from data center into network edge ITS. Such a decentralized paradigm motivates computing power device and makes traditional tasks open users around However, since these ITS have differentiated identities roles with security demands privacy protection, assigning different requires identifying assessing vulnerability...
Objective To explore the effect of tanshinone ⅡA(TanⅡA) on calcium current induced by β-amyloid protein 25-35(Aβ25-35) in neurons nucleus basalis Meynert(nbM).Methods Cell acute dissociated technique and whole-cell recording model patch-clamp single-cell were used.The voltage-dependent nbM was recorded SD rats first.Then TanⅡA assayed.The change Aβ25-35 as well analyzed.Results Extracellular fluid containing different concentrations irrigated,respectively.The peak did not obviously.There no...
With integration between Internet-of-Things (IoT) and industrial systems, Industrial Internet of Things (IIoT) raises more efficiency security access for monitoring control. The IEEE 21451 standard, gradually accepted by manufacturers users, aims to solve the problem unified sensor communication standard networks, especially wireless networks. Although 21451-1-5 can realize simple network management IIoT, efficient during continues be an unresolved problem. In this paper, we propose secure...
Empowered with sensing networks and edge computing, the Healthcare system represented by health monitoring (HMS) gradually becomes an important part of future medical technology. HMS has been applied to practice scenarios, occurring that resource-restricted Internet Things (IoT) nodes heterogeneous networks' structure make data protection more difficult. Since anomalies commonly cause extensive loss even human safety, timely anomaly prediction schemes are regarded as valuable ensure HMS....
In a decentralized environment of blockchain, people usually select random node to perform bookkeeping with the Proof Stake (PoS) consensus mechanism. To randomly miners and validators ensure fair distribution rewards, algorithm must incorporate fair, unbiased number source. Therefore, in many PoS mechanisms, numbers are critical technology. faces following problems generation: Firstly, system, if order selected verification nodes predicted by attacker, system will be vulnerable attacks....
In recent years, a lot of attentions have been paid to Internet Things (IoT) while IoT is more widely used in life. To ensure the security and stability integrate heterogeneous networks IoT, IEEE establishes P21451 protocol family. And P21451-1-5 designed help manage network through Simple Network Management Protocol (SNMP) efficiently, but SNMP based has some problem. This paper analyses main structure mechanisms SNMP, summarize existing threats, which can researchers improve P21451-1-5.