- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Mobile Crowdsensing and Crowdsourcing
- Cryptography and Data Security
- Human Mobility and Location-Based Analysis
- Privacy, Security, and Data Protection
- Millimeter-Wave Propagation and Modeling
- Indoor and Outdoor Localization Technologies
- Advanced MIMO Systems Optimization
- Recommender Systems and Techniques
- Advanced Wireless Communication Technologies
- Context-Aware Activity Recognition Systems
- Advanced Malware Detection Techniques
- Image and Video Quality Assessment
- Topic Modeling
- Complex Network Analysis Techniques
- Caching and Content Delivery
- Natural Language Processing Techniques
- Advanced Antenna and Metasurface Technologies
- Antenna Design and Analysis
- Advanced Wireless Network Optimization
- Microwave Engineering and Waveguides
- Parallel Computing and Optimization Techniques
- IoT and Edge/Fog Computing
- Web Data Mining and Analysis
Southeast University
2017-2024
University of Oulu
2023
Politecnico di Milano
2021-2023
University of Science and Technology of China
2023
Nanjing University
2008-2022
Huawei Technologies (China)
2022
China National Petroleum Corporation (China)
2021
Southeast University
2018-2019
Northwestern Polytechnical University
2018
Nanjing University of Science and Technology
2017
The rapid development of large language models has revolutionized code intelligence in software development. However, the predominance closed-source restricted extensive research and To address this, we introduce DeepSeek-Coder series, a range open-source with sizes from 1.3B to 33B, trained scratch on 2 trillion tokens. These are pre-trained high-quality project-level corpus employ fill-in-the-blank task 16K window enhance generation infilling. Our evaluations demonstrate that not only...
Drug-drug interactions (DDIs) always cause unexpected and even adverse drug reactions. It is important to identify DDIs before drugs are used in the market. However, preclinical identification of requires much money time. Computational approaches have exhibited their abilities predict potential on a large scale by utilizing pre-market properties (e.g. chemical structure). Nevertheless, none them can two comprehensive types DDIs, including enhancive degressive which increases decreases...
The rapid development of open-source large language models (LLMs) has been truly remarkable. However, the scaling law described in previous literature presents varying conclusions, which casts a dark cloud over LLMs. We delve into study laws and present our distinctive findings that facilitate scale two commonly used configurations, 7B 67B. Guided by laws, we introduce DeepSeek LLM, project dedicated to advancing with long-term perspective. To support pre-training phase, have developed...
There is an urgent need for radar-measured data to tackle key technologies of radar maritime target detection. The ‘‘Sea-detecting X-band Radar and Data Acquisition Program’’, proposed in 2019, aims obtain through experiments share them publicly. In 2020, the program continued advance conducted several three aspects, namely, Cross-Section (RCS) calibration targets, detection sea clutter under different conditions, as well tracking maneuvering targets sea. measurement stainless steel sphere...
In future 6G millimeter-wave/sub-THz vehicle-to-everything communication systems, vehicles are expected to be equipped with massive antenna arrays compensate for the severe path loss. However, vehicle-to-vehicle (V2V) direct links prone blockage by surrounding vehicles. Emerging metasurface technologies enable control of electromagnetic wave reflection towards desired direction boost performance. Reconfigurable intelligent surfaces (RIS), and pre-configured counterpart reflecting (IRS),...
The altitude of a moving user is important context information for mobile technologies and applications. However, with the increasing pervasiveness smartphones abundant applications, developers users have gradually discovered that height more useful than in many situations. often relative value, which vertical distance to ground rather sea level, we believe it such as localization/navigation, sport/health tourism/travel. In this paper, first carried out nation-wide online survey confirm...
Vehicle-to-Everything (V2X) communications are revolutionizing the connectivity of transportation systems supporting safe and efficient road mobility. To meet growing bandwidth eagerness V2X services, millimeter-wave (e.g., 5G new radio over spectrum 26.50 - 48.20 GHz) sub-THz 120 frequencies being investigated for large available spectrum. Communication at these requires beam-type as a solution severe path loss attenuation. However, beams can be blocked, with negative consequences...
Formyl azido substituted nitro hexaazaisowurtzitane derivatives, 2,4,6,8,12-pentanitro-10-formylazido-hexaazaisowurtzitane and 2,6,8,12-tetranitro-4,10-diformylazido-hexaazaisowurtzitane, have been synthesized well characterized by IR NMR (1H, 13C) spectroscopy, mass spectroscopy (MS), differential scanning calorimetry (DSC), thermogravimetric analysis (TGA) single-crystal X-ray diffraction. Their key properties such as melting points decomposition temperatures, densities, dissociation...
The development of the Internet Things has accelerated research in indoor location fingerprinting technique, which provides value-added localization services for existing WLAN infrastructures without need any specialized hardware. deployment a based system requires an extremely large amount measurements on received signal strength information to generate fingerprint database. Nonetheless, this requirement can rarely be satisfied most environments. In paper, we target one but common situation...
As a widely used over-the-top (OTT) video technique, adaptive bitrate streaming has attracted considerable research attention and efforts. Traditional adaptation schemes rely on quality of service (QoS) to assess delivery quality. However, in this paper, we argue that QoS may not accurately reflect the user-perceived quality, especially time-varying wireless networks. Instead, adopt concept experience (QoE) propose novel caching-based scheme improve overall QoE, which can more...
Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia industry. Utilizing received signal strength information an effective solution to detect rogue points. However, formed by multi-dimensional vectors that are collected multiple sniffers, these inevitably lacking in some dimensions due limited transmission range link instability. This will result high false alarm rate detection. To solve this...
With the development of online education system, personalized recommendation has played an essential role. In this paper, we focus on developing path systems that aim to generating and recommending entire learning given user in each session. Noticing existing approaches fail consider correlations concepts path, propose a novel framework named Set-to-Sequence Ranking-based Concept-aware Learning Path Recommendation (SRC), which formulates task under set-to-sequence paradigm. Specifically,...
Online education, which educates students that cannot be present at school, has become an important supplement to traditional education. Without the direct supervision and instruction of teachers, online education is always concerned with potential distractions misunderstandings. Learning Style Classification (LSC) proposed analyze learning behavior patterns users, based on personalized paths are generated help them learn maintain their interests.
The knowledge graph is an important representation form of artificial intelligence in the big data era. In graph, entities and their relations are represented a graph. This paper constructs field power system dispatching, which helps dispatchers scenarios such as management emergency determination. First, basic concepts for its construction frameworks introduced. Then, detailed method dispatch proposed. Finally, constructed dispatching detailed, benefits real discussed.
Smart Repeaters (SR) can potentially enhance the coverage in Millimeter-wave (mmWave) wireless communications. However, angular of existing two-panel SR is too limited to make a truly cost-effective mmWave range extender. This paper proposes usage tri-sectoral Advanced (ASR) extend with respect conventional SR. We propose multi-user precoder optimization for ASR downlink multi-carrier communication system maximize number served User Equipments (UEs) while guaranteeing constraints on per-UE...