- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Digital Transformation in Industry
- Advanced Neural Network Applications
- Matrix Theory and Algorithms
- Robotics and Automated Systems
- Brain Tumor Detection and Classification
- Artificial Intelligence in Healthcare
- Traffic Prediction and Management Techniques
- Advanced Computing and Algorithms
- Domain Adaptation and Few-Shot Learning
- Electromagnetic Scattering and Analysis
- Artificial Intelligence in Healthcare and Education
- Big Data Technologies and Applications
- Advanced Technologies in Various Fields
- Stochastic Gradient Optimization Techniques
- Cognitive Computing and Networks
- EEG and Brain-Computer Interfaces
- Advanced Wireless Communication Technologies
- Advanced Data and IoT Technologies
- Visual Attention and Saliency Detection
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Age of Information Optimization
- Economic and Technological Innovation
University of Science and Technology of China
2022-2025
Qingdao University
2020-2023
Qingdao University of Science and Technology
2021
Cardiff University
2021
In order to explore the application value of deep learning denoising autoencoder (DAE) in Internet-of-Things (IoT) fusion security, this study, a hierarchical intrusion security detection model stacked DAE supporting vector machine (SDAE-SVM) is constructed based on three-layer neural network self-encoder. The sample data after dimension reduction are obtained by layer pretraining and fine-tuning. traditional algorithms [stacked noise (SNAE), (SAE), contractive (SCAE), sparse (SSAE), belief...
In order to solve the problem of privacy protection unmanned aerial vehicle (UAV) big data, it is necessary design a scheme that guarantees safe sharing UAV data. this work, blockchain technology adopted particular, proposed uses number theory research unit cryptosystem for encryption Privacy analysis provided validate security requirements. The performance evaluation results show data based on has low computing cost in terms key production, encryption, and decryption. It also outperforms...
The brain-computer interface (BCI) connects the brain and external world through an information transmission channel by interpreting physiological of during thinking activities. effective classification electroencephalogram (EEG) signals is key to improving performance system. To improve accuracy EEG in BCI system, transfer learning algorithm improved Common Spatial Pattern (CSP) are combined construct a data model. Finally, effectiveness proposed verified. results show that actual imagined...
To explore the electric vehicle networks in smart cities through big data analysis technology, this study utilizes K-means and fuzzy theory technology to construct an objective function-based mean clustering algorithm (FCM). Then, FCM is improved, network simulated. The results show that of transmission performance, when probability successful propagation 100% λ value between 0.01-0.05, it closest actual result, delay smallest. In route guidance effects, facing congested road sections,...
Smart cities fully utilize the new generation of Internet Things (IoT) technology in process urban informatization to optimize management and service. However, IoT system, while information exchange communication, wireless sensor network devices may not be able resist all forms attacks, which lead security issues such as user data disclosure. Aiming at risks smart city, typical technologies is analyzed from perspective perception layer provides corresponding solutions for existing threats....
Objective: To realize the full coverage, spectrum, and application, of 6G networks, channel measurement, characteristics, research 6G-oriented full-spectrum full-scene wireless network are explored. Methods: At present, constructing an information covering three dimensions sea, land air is one directions technology development. Meanwhile, coverage communication requires multiple channels including frequency bands scenarios, mainly terahertz, light band, satellite, unmanned aerial vehicle,...
As deep learning, virtual reality, and other technologies become mature, real-time data processing applications running on intelligent terminals are emerging endlessly; meanwhile, edge computing has developed rapidly a popular research direction in the field of distributed computing. Edge network is environment composed multi-edge nodes centers. First, framework key analyzed to improve performance applications. In system scenario where collaborative deployment tasks centers considered,...
Recently, decentralization has been extensively explored by researchers. Blockchain, as a representation of decentralized technology, attracted attention with its unique characteristics, such irrevocability and security. Consequently, herein, we introduce cutting-edge blockchain technologies from four directions: system, consensus algorithms, smart contract, scalability. Subsequently, analyze the current lack mechanism, fault tolerance, block capacity blockchain, integration into 5G/6G...
The work aims to improve the stability of wireless energy transfer (WET) in Internet Things (IoT), prolong service life devices, and promote green communication. Based on a digital twins (DTs) IoT environment, we depict how optimize efficiency large-scale multiple-input multiple-output (MIMO) systems under WET technology. distributed antenna array is applied sensor network. MIMO can produce extremely narrow beams so that system reduces interference other users. Our system's optimization uses...
The coronavirus disease 2019 (COVID-19) has put enormous pressure on the global supply chain. This work aims to solve chain interruption caused by public health emergencies in real life through resilient based digital twins (DTs). research example used here is disruption of N95 medical masks under COVID-19 epidemic. First, chain's emergency decision cost and profit model established manufacturer-supplier shared mode. <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...
With the increasing size of data, massive amounts data are being generated continuously. It is hoped to find a cognitive computing technology that can effectively learn and process large-scale data. The decision tree algorithm optimized from perspective machine learning. A model based on context-aware flow constructed. Classification regression (CART) used in layer model. In addition, clustering effectiveness index frequent patterns optimizes K-means method. performance analyzed through...
With increasing amounts of information, the image information received by people also increases exponentially. To perform fine-grained categorization and recognition images visual calculations, this study combines Visual Geometry Group Network 16 model convolutional neural networks vision attention mechanism to build a multi-level feature model. Finally, TensorFlow platform is utilized simulate classification based on mechanism. The results show that in terms accuracy required training time,...
To realize the great potential of intelligent transportation infrastructure, investment in infrastructure system should be rationally planned. Firstly, application status cutting-edge Data Envelopment Analysis (DEA) model efficiency evaluation is analyzed, and based on this, a DEA under Digital Twins technology established. Secondly, with 12 prefecture-level cities Jiangsu Province from 2005 to 2020 as research object, traditional Stochastic Frontier Approach (SFA) are used estimate cities....
The research aims to reduce the network resource pressure on cloud centers (CC) and edge nodes, improve service quality optimize performance. In addition, it studies designs a kind of edge–cloud collaboration framework based Internet Things (IoT). First, raspberry pi (RP) card working machines are utilized as is designed for computing. consists mainly three layers, including RP (ERP), monitoring & scheduling (MSRP), CC. Among collaborative communication can be realized between RPs CCs....
To study the security performance of Internet multimedia things on privacy protection user identity, behavior trajectory, and preference under new information technology industry wave, in this study, aiming at problems sharing perception data exposure users’ information, Anonymous Batch Authentication Scheme (ABAH) for is designed. Hash-based Message Code used to cancel list-checking process analyze its performance. Compared with methods elliptic curve digital signature algorithm, Bayes...
Abstract It aims to explore the efficient and reliable wireless transmission cooperative communication mechanism of Internet Vehicles (IoV) based on edge intelligence technology. first proposes an intelligent network architecture for IoV services by combining slicing deep learning (DL) technology, then began study key technologies needed achieve architecture. designs control unmanned vehicle full resource allocation algorithm from micro level. Second, in order improve safety driving,...
it aims to adopt deep transfer learning combined with Digital Twins (DTs) in Magnetic Resonance Imaging (MRI) medical image enhancement.MRI enhancement method based on metamaterial composite technology is proposed by analyzing the application status of DTs direction and principle MRI imaging. On basis learning, super-resolution neural network structure established. To address problem that different imaging methods have advantages disadvantages, a multi-mode fusion algorithm adaptive...
To accurately and effectively analyze electroencephalogram (EEG) with high complexity, large amount of data, strong uncertainty, brain–computer interface (BCI) cognitive computing its signal analysis algorithms are studied based on the digital twins (DTs) platform. avoid influence noise EEG results, it is necessary to use filtering defalsification methods process EEG. Four methods, including Butterworth filter, finite impulse response (FIR) elliptic wavelet decomposition, summarized. Based...