- Cognitive Radio Networks and Spectrum Sensing
- Cooperative Communication and Network Coding
- Adversarial Robustness in Machine Learning
- Advanced MIMO Systems Optimization
- Network Security and Intrusion Detection
- Wireless Communication Networks Research
- Quantum Information and Cryptography
- Advanced Malware Detection Techniques
- Quantum Computing Algorithms and Architecture
- Advanced Wireless Network Optimization
- Digital Media Forensic Detection
- Embedded Systems and FPGA Design
- Full-Duplex Wireless Communications
- Wireless Networks and Protocols
- Atmospheric aerosols and clouds
- Peer-to-Peer Network Technologies
- Meteorological Phenomena and Simulations
- Data Stream Mining Techniques
- Precipitation Measurement and Analysis
- Remote Sensing in Agriculture
- Caching and Content Delivery
- Advanced Computational Techniques and Applications
- Spam and Phishing Detection
- Quantum Mechanics and Applications
- Software System Performance and Reliability
American University
2020-2024
Civil Aviation University of China
2021
Accenture (United States)
2018-2020
Beijing University of Posts and Telecommunications
2014-2019
University of Chinese Academy of Sciences
2019
Southwest Jiaotong University
2019
Guangdong University of Technology
2018
Intelligent Automation (United States)
2012-2015
University at Buffalo, State University of New York
2009-2015
Shandong University
2011
Throughput maximization is one of the main challenges in cognitive radio <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ad hoc</i> networks, where availability local spectrum resources may change from time to and hop by hop. For this reason, a cross-layer opportunistic access dynamic routing algorithm for networks proposed, which called spectrum-allocation (ROSA) algorithm. Through control actions, ROSA aims maximize network throughput performing...
This article examines the changing demographics of China, with particular attention paid to effect one‐child policy in relation long‐term care older people. It also current state health for Long‐term stays characterize hospital care. Most geriatric syndromes are less common hospitalized people (e.g., delirium, falls), but some polypharmacy) more common. A high volume patients and brief targeted visits outpatient Nursing homes exist relatively fewer than most developed countries. Geriatric...
Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where local spectrum resources may change from time to and hop-by-hop. For this reason, a cross-layer opportunistic access dynamic routing algorithm for networks proposed, called ROSA (ROuting Spectrum Allocation algorithm). Through control actions, aims at maximizing network throughput by performing joint routing, allocation, scheduling, transmit power control. Specifically, dynamically allocates...
Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where availability local spectrum resources may change from time to and hop-by-hop. Cooperative transmission exploits spatial diversity without multiple antennas at each node increase capacity with reliability guarantees. This idea particularly attractive wireless environments due diverse channel quality limited energy bandwidth resources. With cooperation, source relay cooperatively transmit data...
DeepFake represents a category of face-swapping attacks that leverage machine learning models such as autoen-coders or generative adversarial networks. Although the concept is not new, its recent technical advances make fake content (e.g., images, videos) imperceptible to Humans. Various detection techniques for have been explored. These methods, however, are passive measures against DeepFakes they mitigation strategies after high-quality generated. This work aims take an offensive measure...
Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning a Service (MLaaS). Recent studies show that services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing attacks. However, most existing works undervalued impact of attacks, where successful attack has to acquire confidential training data or auxiliary regarding victim DNN....
The problem of optimal resource allocation to share high-quality multimedia content in cognitive ad hoc networks with cooperative relays is addressed this paper. Cooperative transmission a promising technique increase the capacity wireless links by exploiting spatial diversity without multiple antennas at each node. However, mainstream research field focuses on optimizing physical layer performance measures, little consideration for application-specific and network-wide measures. In paper,...
We consider a secondary multi-hop cognitive radio network with decentralized control that operates cognitively to coexist primary users. propose new spread-spectrum management paradigm, in which, unlike mainstream dynamic spectrum access research, digital waveforms are designed occupy the entire available spectrum, and adaptively track interference profile at receiver maximize link capacity while avoiding In this context, we study problem of maximizing throughput through joint routing...
Cybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity process susceptible subjective and objective effects. To solve this problem, paper introduced method based fuzzy theory Attack-Defense Tree model probability technology, applied it airport automatic fuel supply system. Firstly, was established the potential threat system deployed security equipment. Secondly, interval attack path calculated using...
To systematically understand the effects of vulnerabilities introduced by AI/ML-enabled Army Multi-domain Operations, we provide an overview characterization ML attacks with emphasis on black-box vs. white-box attacks. We then study a system and attack model for MDO applications services, introduce roles stakeholders in this system. show, various scenarios under different knowledges deployed system, how peer adversaries can employ deceptive techniques to defeat algorithms, should be designed...
Audio adversarial examples (AEs) have posed significant security challenges to real-world speaker recognition systems.Most black-box attacks still require certain information from the model be effective (e.g., keeping probing and requiring knowledge of similarity scores).This work aims push practicality by minimizing attacker's about a target model.Although it is not feasible for an attacker succeed with completely zero knowledge, we assume that only knows short (or few seconds) speech...
A cognitive radio network with decentralized control (i.e., a ad hoc network) is considered in this demonstration. The demo implements and localized algorithm for through put maximization joint routing interference-avoiding waveform selection. adapts to time-varying traffic demands, interference profile, topology locally maximize the achievable data rate while avoiding harmful co-located primary or secondary users. prototype based on cross-layer protocol stack implemented Python, which...
Three-dimensional (3D) cloud retrievals are critical for understanding their impact on climate and other applications such as aviation safety, weather prediction, remote sensing. However, obtaining high-resolution accurate vertical representation of clouds remains unsolved due to the limitations imposed by satellite instrumentation, viewing conditions, complexity dynamics. Cloud masks essential comprehending various properties, but deriving 3D from 2D imagery data is a challenging task. To...
SUMMARY This paper studies the fairness among primary users (PUs) and secondary (SUs) for resource allocation in cognitive radio systems. We propose a novel co‐opetition strategy based on Kalai–Smorodinsky bargaining solution to balance system efficiency users. The formulates spectrum sharing problem as nonlinear integral sum utility maximization subject set of constraints describing PUs SUs. Then, we solve by proposing heuristical method that consists four steps: multi‐PU competition, PU's...
Smart home devices have brought us many benefits such as advanced security, convenience, and entertainment. However, these also made unintended consequences like giving ultimate power for devices' owners over their intimate partners in the same household which might lead to tech-facilitated domestic abuse (tech-abuse) recent research has shown. In this paper, we systematize findings on tech-abuse smart homes. We show that Intimate Partner Violence (IPV) homes is more effective less risky...
We propose a Cognitive Radio nEtworking ArchiTecture (CREATE) with joint cross-layer design of routing and dynamic spectrum allocation that balances the throughput-delay trade-offs under realistic physical channel effects. Dynamic is implemented by integrating spectrum-aware backpressure-like algorithm shortest-path to improve both average delay achievable throughput hard deadline constraints. CREATE supports adaptability establishing asynchronous negotiation coordination channels instead...
The problem of throughput maximization in a cognitive radio network with decentralized control (i.e., ad hoc network) is considered this paper. First, and localized algorithms for through joint routing interference-avoiding waveform selection are proposed, based on nonlinear optimization framework. proposed adapt to time-varying traffic demands, interference profile, topology locally maximize the achievable data rate while avoiding harmful co-located primary or secondary users. Second,...
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed research progress of DCA from following aspects: signal extraction technology, processing decision method for load anomaly judgment, and application DCA. Next, corresponding solving thoughts main problems existing in were proposed paper. Finally, future trends presented
While machine learning based spam detectors have proven useful, spammers are to bypass the by modifying their email content. Adversarial attacks on models been observed in domains such as image classification. Applying adversarial attack algorithms craft emails evade detectors, however, has limitations. Such generate perturbations feature space. Different from data, translating space text formats, emails, changes effectiveness of perturbations. It can reduce success rate case detection. In...
Machine learning-based spam detection models learn from a set of labeled training data and detect emails after the phase. We study class vulnerabilities such models, where attack can manipulate trained model to misclassify maliciously crafted at However, very often feature extraction methods make it difficult translate change in space that textual email space. This paper proposes new method making guided changes text by taking advantage findings generated adversarial examples purposely...
Precipitation type is a key parameter used for better retrieval of precipitation characteristics as well to understand the cloud–convection–precipitation coupling processes. Ice crystals and water droplets inherently exhibit different in regimes (e.g., convection, stratiform), which reflect on satellite remote sensing measurements that help us distinguish them. The Global Measurement (GPM) Core Observatory’s microwave imager (GMI) dual-frequency radar (DPR) together provide ample information...
A hierarchical clustering P2P network model based on user interest is presented in this paper to improve search efficiency. The routers the are abstracted as activated peer node, and routing table constructed depict character of cluster. divided into different subnets according their character, corresponding topological structure build. strategy proposed above mention method. simulation results show that compared with traditional algorithm cluster method can form more rapidly, gain...