- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Anomaly Detection Techniques and Applications
- Advanced Neural Network Applications
- Image Enhancement Techniques
- Blockchain Technology Applications and Security
- Advanced Data Storage Technologies
- Access Control and Trust
- Internet Traffic Analysis and Secure E-voting
- Video Surveillance and Tracking Methods
- Advanced Steganography and Watermarking Techniques
- Advanced Vision and Imaging
- Generative Adversarial Networks and Image Synthesis
- Spam and Phishing Detection
- Distributed and Parallel Computing Systems
- Robotics and Sensor-Based Localization
- Advanced Authentication Protocols Security
- Cloud Computing and Resource Management
- User Authentication and Security Systems
- Digital and Cyber Forensics
- Image and Signal Denoising Methods
- Adversarial Robustness in Machine Learning
Wuhan University
2009-2024
Ministry of Education of the People's Republic of China
2012
Motivation The conformational B-cell epitopes are the specific sites on antigens that have immune functions. identification of is great importance to immunologists for facilitating design peptide-based vaccines. As an attempt narrow search experimental validation, various computational models been developed epitope prediction by using antigen structures. However, application these undermined limited number available In contrast most structure-based methods, we here accurately predict from...
Intrusion detection systems are crucial in fighting against various network attacks. By monitoring the behavior real time, possible attack attempts can be detected and acted upon. However, with development of openness flexibility networks, artificial immunity-based anomaly methods lack continuous adaptability hence have poor performance. Thus, a novel framework for adaptive regulation is built this paper. First, heuristic dimensionality reduction algorithm based on unsupervised clustering...
LiDAR and camera, as two different sensors, supply geometric (point clouds) semantic (RGB images) information of 3D scenes. However, it is still challenging for existing methods to fuse data from the cross making them complementary quality object detection (3OD). We propose ImLiDAR, a new 3OD paradigm narrow cross-sensor discrepancies by progressively fusing multi-scale features camera Images point clouds. ImLiDAR enables provide head with yet robustly fused features. To achieve this, core...
The presence of haze negatively affects the visibility captured images, posing challenges for general object detection models. We observe that current techniques exhibit three limitations: 1) they typically view image restoration and as separate tasks; 2) disregard potential details in degraded images benefit detection; 3) lack sufficient recognition ability under interference. To this end, we propose a novel Diffusion Model (Diff-HOD) Object Detection Hazy weather conditions. Diff-HOD is...
Object detection remains challenging in hazy weather conditions due to the poor visibility of captured images. There are currently two types detectors capable adapting varying conditions: (i) low-level adaptation methods that combine one detector with an additional dehazing network and (ii) high-level explore various kinds domain knowledge. However, neither these approaches can achieve desirable performance their inherent limitations. We raise intriguing question—if combining both...
In this paper we present a file distribution model aiming at data leakage prevention. Taking into consideration the guilt probability which is of user having leaked files, can select allocation plan with least overlap between obtained sets users, as consequence find out sources high probability. So that measures be taken for information security further. The simulation experiments reveal distinguish malicious users and detect leak source effectively.
Jitter is one of the premier impairments which inflict a heavy damage on quality service in wireless VoIP. To solve this issue, paper proposes new quality-based jitter buffer algorithm. An adaptive windowing algorithm introduced to dynamically adjust window size indicates numbers packets used estimate future network delay and loss rete. When receiving voice packet, receiver firstly uses variable-size update size. Then, histogram established according remaining window. Finally, E-Model...
The Rowhammer bug is a novel micro-architectural security threat, enabling powerful privilege-escalation attacks on various mainstream platforms. It works by actively flipping bits in Dynamic Random Access Memory (DRAM) cells with unprivileged instructions. In order to set up against binaries the Linux page cache, Waylaying algorithm has previously been proposed. method stealthily relocates onto exploitable physical addresses without exhausting system memory. However, proof-of-concept can be...
Fault localization is a critical step of software debugging. We present statistical fault approach via semi-dynamic slicing in this paper. In our technique, we first conduct the execution flow graph based on both coverage information and static control-flow-graph to model executions approximately. Second, use backward analyze dependence relationships between statements results, obtain sliced calculate statistics. At last, suspiciousness according Tarantula, classic localization. Controlled...
Cloud attack provenance is a well-established industrial practice for assuring transparency and accountability service provider to tenants. However, the multi-tenancy self-service nature coupled with sheer size of cloud implies many unique challenges forensics. Although Virtual Machine Introspection (VMI) powerful tool due privilege isolation, stealthiness state-of-the-art attacks lack precise information make existing solutions difficult fulfill real-time forensics when tracking enormous...
Multivariate time series anomaly detection on key performance indicators helps mitigate the impact of large-scale IT system anomalies. Due to large volume and abstract nature multivariate series, previous works have tended make overly strict or optimistic hypotheses labeling costs resulted in unsatisfactory results. Thus, it remains a challenge an appropriate trade-off between model performance. This research proposes AMAD, active learning-based approach that address this problem. Its core...
Trusted computing has been introduced into virtualization as an approach of providing trust in a platform. However, the primitive design privileged domain menaces virtual TPMs with oversize trusted base, leading to security vulnerabilities. This paper proposes new administrative (Domain A), architecture that prevents from tampers. We port VTPM components Domain A. begin reviewing Xen TPM and depicting attack Xen. Then, A-based scheme is described principle implementation porting manager...
This paper proposes an efficient architecture to produce a hierarchical access control scheme for the multicast application environment. The divides group members into several subgroups with different rights. In order enhance efficiency, theory of Weil pairing is introduced present three party key agreement protocol. advantages this are : (1) easy implementation, (2) support high dynamics controls, including join, leave, merge and partition. Meanwhile, communication broadcasting between...
Real-world rain is a mixture of streaks and rainy haze. It poses great challenge for current deraining techniques due to two reasons. First, existing methods consider removal haze as separate processes. Second, they are limited in insufficient modeling ability learn the mapping from clean images. To address these issues, we propose novel Depth-guided Dynamic Message Passing Diffusion Model removal, called DG-RainDiff. DG-RainDiff joint learning paradigm that integrates depth estimation image...
We propose a novel model‐free unsupervised learning paradigm to tackle the unfavorable prevailing problem of real‐world image deraining, dubbed MUL‐Derain. Beyond existing deraining efforts, MUL‐Derain leverages Multiscale Attentive Filtering (MSAF) handle multiscale rain streaks. Therefore, formulation any imaging is not necessary, and it requires neither iterative optimization nor progressive refinement operations. Meanwhile, can efficiently compute spatial coherence global interactions by...
In cloud storage, symmetric encryption is a common method to protect the confidentiality of volume data. One critical issue in management keys such as key generation, update and distribution. Many schemes have adopted hierarchical structures based on derivation generate organize keys. However, efficient these derived associated distribution multiple not been well studied. This paper mainly studies in-situ traffic cost First, we redesign node structure our binary key-derivation tree provide...
Session Initiation Protocol is widely used for establishing VoIP calls in wireless packet networks. According to shortages of SIP and relevant security mechanisms, a secure identity-based mechanism was proposed this paper. The scheme realizes point-to-point mutual authentication by employing signature, achieves end-to-end identity key agreement between cross-domain user agents message integrity checking Diffle-Hellman mechanism. Compared trans-domain communication, our method has the...