- Advanced Malware Detection Techniques
- Software Testing and Debugging Techniques
- Microplastics and Plastic Pollution
- Pharmaceutical and Antibiotic Environmental Impacts
- Software Engineering Research
- biodegradable polymer synthesis and properties
- Toxic Organic Pollutants Impact
- Recycling and Waste Management Techniques
- Adipokines, Inflammation, and Metabolic Diseases
- Personal Information Management and User Behavior
- Security and Verification in Computing
- Oceanographic and Atmospheric Processes
- Environmental Chemistry and Analysis
- Data Quality and Management
- Web Application Security Vulnerabilities
- User Authentication and Security Systems
- Electrocatalysts for Energy Conversion
- Adipose Tissue and Metabolism
- Antibiotic Resistance in Bacteria
- Fuel Cells and Related Materials
- Privacy, Security, and Data Protection
- Constraint Satisfaction and Optimization
- Infant Health and Development
- Forensic Anthropology and Bioarchaeology Studies
- Advanced Graph Neural Networks
Fudan University
2018-2025
Xidian University
2025
Tianjin University
2023-2024
Shandong University
2024
Affiliated Hospital of Xuzhou Medical College
2023
Xuzhou Medical College
2023
Beijing University of Chemical Technology
2023
Soochow University
2021-2023
University of Louisiana at Lafayette
2023
Renmin University of China
2023
Machine learning (ML) classifiers have been widely deployed to detect Android malware, but at the same time application of ML also faces an emerging problem. The performance such degrades---or called ages---significantly over given malware evolution. Prior works proposed use retraining or active reverse and improve aged models. However, underlying classifier itself is still blind, unaware Unsurprisingly, evolution-insensitive comes a price, i.e., labeling tens thousands samples cost...
The shortage of fossil fuels and freshwater resources has become a serious global issue. Using solar energy to extract clean water with photothermal conversion technology is green sustainable desalination method. Integrated electricity generation during the process maximizes utilization efficiency. Herein, solar-driven steam (SSEG) system based on an all-in-one evaporator prepared via scalable technology. Carbon black selected as absorber for harvesting well functional substance simultaneous...
Third-party libraries are widely used in Android applications to ease development and enhance functionalities. However, the incorporated also bring new security & privacy issues host application, blur accounting between application code library code. Under this situation, a precise reliable detector is highly desirable. In fact, may be customized by developers during integration dead eliminated obfuscators build process. existing research on detection has not gracefully handled these...
Abstract The development of highly active and acid‐stable electrocatalysts for oxygen evolution reaction (OER) is great significance water electrolysis technology. Herein, a efficient molybdenum‐doped mesoporous ruthenium dioxide sphere (Mo‐RuO 2 ) catalyst fabricated by facile impregnation post‐calcination method using carbon spheres to template the mesostructure. optimal Mo 0.15 ‐RuO with doping amount 15 mol.% exhibits significantly low overpotential 147 mV at 10 mA cm −2 , small Tafel...
Open-source kernels have been adopted by massive downstream vendors on billions of devices. However, these often omit or delay the adoption patches released in mainstream version. Even worse, many are not publicizing patching progress even disclosing misleading information. status is critical for groups (e.g., governments and enterprise users) that keen to security threats. Such a practice motivates need reliable patch presence testing kernels. Currently, best means examine existence target...
Android system provides application developers with the ability to define custom permissions, which serve regulate sharing of resources and functionalities other applications. However, developers' improper development practices can render permission mechanism ineffective, facilitating easy exploitation by attackers. This paper presents a comprehensive examination problematic surrounding permissions employed developers, referred as Bad Practices Custom Permissions (BPCP issues). To accomplish...
Isthmin-1 (ISM1), a secretory protein predominantly derived from brown adipose tissue, enhances glucose tolerance and attenuates hepatic steatosis. However, its potential involvement in white tissue remodelling remains elusive, which profoundly impacts adipocyte insulin sensitivity consequently alters systemic metabolic homeostasis. ISM1 expression profiles human mouse were systematically characterized using Tabula Sapiens. With the intervention of expression, preadipocyte cell lines...
As Android platform evolves in a fast pace, API-related compatibility issues become significant challenge for developers. To handle an incompatible API invocation, developers mainly have two choices: merely performing sufficient checks to avoid invoking APIs on platforms that do not support them, or gracefully providing replacement implementations those platforms. more consistent app behaviors, the latter one is recommended and challenging adopt. However, it still unknown how these are...
Learning-based malware detectors are widely used in practice to safeguard real-world computers. One major challenge is known as model aging, where the effectiveness of these models drops drastically variants keep evolving. To tackle most existing works choose label new samples retrain aged models. However, such data-perspective methods often require excessive costs labeling and retraining. In this article, we observe that during evolution, preserve similar malicious semantics while switching...
Interactions between human and objects are influenced not only by the object's pose shape, but also physical attributes such as object mass surface friction. They introduce important motion nuances that essential for diversity realism. Despite advancements in recent kinematics-based methods, this aspect has been overlooked. Generating nuanced presents two challenges. First, it is non-trivial to learn from multi-modal information derived both non-physical attributes. Second, there exists no...