- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Embedded Systems Design Techniques
- Network Packet Processing and Optimization
- Data Management and Algorithms
- Advanced Computational Techniques and Applications
- Advanced Wireless Communication Techniques
- Cooperative Communication and Network Coding
- Rough Sets and Fuzzy Logic
- Quantum Computing Algorithms and Architecture
- Metaheuristic Optimization Algorithms Research
- Spam and Phishing Detection
- Interconnection Networks and Systems
- Higher Education and Teaching Methods
- Underwater Acoustics Research
- Target Tracking and Data Fusion in Sensor Networks
- Blind Source Separation Techniques
- Customer churn and segmentation
- Privacy-Preserving Technologies in Data
- Advanced Wireless Network Optimization
- Industrial Technology and Control Systems
- Privacy, Security, and Data Protection
- E-commerce and Technology Innovations
Institute of Acoustics
2025
Chinese Academy of Sciences
2012-2025
Taiyuan Normal University
2024
National University of Defense Technology
2018-2023
Wuxi Institute of Technology
2017-2023
Northwestern Polytechnical University
2023
Beijing Jiaotong University
2021-2022
Sinopec (China)
2019-2022
University of Chinese Academy of Sciences
2017-2020
Shanghai Institute of Computing Technology
2018
Fog computing has recently emerged as a promising technique in content delivery wireless networks to alleviate the heavy bursty traffic burdens on backhaul connections. In order improve overall system performance, terms of network throughput, service delay and fairness, it is very crucial challenging jointly optimize node assignments at control tier resource allocation access under dynamic user requirements conditions. To solve this problem, paper, fog-enabled multitier architecture proposed...
The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. Domain Generation Algorithm (DGA) is often used by botnets hide their server evade take-down attempts, which allows bot generate a large number of domain names until it finds C&C server. lengths generated DGAs are different. Our research that length name has an impact performance DGA detection model. In other words, model sensitive name. this case, attackers can simply designing specific...
To address the issue of tracking highly maneuverable small underwater intruders in dynamic and heavily interfered environment harbors, a local sparse motion acoustic flow (LSMAF) computation method constrained by robust high-order flux tensor (RHO-FT) feature has been proposed, along with LSMAF feature-aided active method. First, potential targets are localized from dense clutter background sonar echographs using RHO-FT maps. Subsequently, on basis calculation method, consistency criterion...
Given the popularity of smartphones and mobile devices, botnets are becoming an emerging threat to users network operators. We propose a new form cloud-based push-styled that exploits today's push notification services as means command dissemination. To motivate its practicality, we present control (C&C) channel using Google's Cloud Device Messaging (C2DM) service, develop C2DM botnet specifically for Android platform. strategies enhance scalability large coverage resilience against service...
With the increasing popularity of Android platform, malware, especially APP-Repackaging malware wherein malicious code is injected into legitimate applications, spreading rapidly. This paper proposes a new system named MIGDroid, which leverages method invocation graph based static analysis to detect malware. The reflects "interaction" connections between different methods. Such can be naturally exploited because and applications are expected weak. Specifically, MIGDroid first constructs on...
Due to the proliferation of mobile applications, traffic identification plays a crucial role in understanding network traffic. However, pervasive unconcerned apps and emerging pose great challenges method based on supervised machine learning, since such merely identifies discriminates several interest. In this paper we propose three-layer classifier using learning identify open-world settings. The proposed has capability identifying generated by zero-day apps; thus it can be applied real...
We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and Ekert protocol, both without with presence of an eavesdropper.
In response to the issue of short-term fluctuations in photovoltaic (PV) output due cloud movement, this paper proposes a method for forecasting PV based on Depthwise Separable Convolution Visual Geometry Group (DSCVGG) and Deep Gate Recurrent Neural Network (DGN). Initially, motion prediction model is constructed using DSCVGG, which achieves edge recognition clouds by replacing previous convolution layer pooling VGG with depthwise separable convolution. Subsequently, results DSCVGG network,...
Active tracking of underwater small targets is a great challenge with kinematic information alone. This because the active sonar often encounters multipath propagation and induced clutter can even mask target echoes. Recently, high-order time lacunarity (HOT-Lac) has shown its ability in effectively highlighting "blob" from high harbor environments. Hence, this paper proposes HOT-Lac aided track scoring mechanism to solve ambiguity data association within framework Multiple Hypotheses...
Caching is a promising technique to alleviate the capacity bottleneck of content-centric wireless networks (CCWNs). Most existing work caching focuses on content placement policy, while some other interesting problems including dynamic user-AP association and predictive scheduling were rarely investigated. In this paper, we make first attempt investigate benefit such new degrees freedom in networks. Based service model, formulate an average network throughput maximization problem with...
Packet classification plays a crucial role in various network functions such as access control and routing. In recent years, the rapid development of SDN NFV poses new challenges for packet to support fast rule-set updates introducing strong dynamics structure networks. To this end, paper proposes novel scheme, TupleTree, perform high-speed while providing update ability. TupleTree is hybrid scheme combining decision tree tuple space. it organizes rules tree-like structure, but distributes...
Under the big data, companies can apply data mining and application to accurately grasp market changes customer needs, then adjust products services enhance professional long-term development of enterprises. This paper combined with precision marketing source system based on research around connotation ideological, enterprise applications introducing standardisation quality model, find a basic method promote standardisation, thus provide reference for constructing data.
Abstract With Internet access shifting from desktop-driven to mobile-driven, application-level mobile traffic identification has become a research hotspot. Although considerable progress been made in this field, two obstacles are hindering its further development. Firstly, there is lack of sharable labeled datasets. it easy capture traffic, labeling at the application level non-trivial. Besides, researchers usually hold conservative attitude toward publishing their datasets for privacy...
To solve the data silos and security dilemma faced by machine learning (ML), concept of federated (FL) was first proposed, has also attracted great attention from information community in recent years, where most concerned issue is models learning. The current centralized scheme prone to single point failure as well central server evil problem, so blockchain used replace server, but network not immune poisoning attacks participants on global model inference participants' local data. this...
Stochastic game theory has been applied in many fields of networks with interactive behaviors, phishing attack may consider the conduct parties interact, which are attacker and user. In paper, we modelling for based on Game Nets (SGN), a novel method good at multi-role problem described, use this model to analyze security issues attack. Combination SGN practical problem, present an algorithm solving equilibrium strategy computer SGN. Finally our researcher work several figures, example,...
Under the big data, companies can apply data mining and application to accurately grasp market changes customer needs, then adjust products services enhance professional long-term development of enterprises. This paper combined with precision marketing source system based on research around connotation ideological, enterprise applications introducing standardisation quality model, find a basic method promote standardisation, thus provide reference for constructing data.
Decision tree is one of the most popular supervised machine learning algorithms. Due to rapid increase in amount data, many application scenarios require higher classification speed. Therefore, a variety decision acceleration algorithms based on FPGA are proposed. These methods focus improving speed by designing effective pipeline architecture. However, impact floating-point numbers storage and computing resources hardware implementation ignored. In this paper, we present discretization...
This paper proposes an improved weighted fuzzy reasoning algorithm based on particle swarm optimization (PSO) for handling classification problems. Fuzzy production rules of rule-based system are used knowledge representation, where the local and global weights appearing in represented by real values between zero one. In order to model overlapping existing among sets corresponding different classes, this a new set function draw conclusion, with respect non-additive nonnegative determined...
The development of multiple communication standards and services has created the need for a flexible efficient computational platform baseband signal processing. Using set heterogeneous reconfigurable execution units (RCEUS) homogeneous control mechanism, proposed architecture achieves large capability while still providing high degree flexibility. Software tools library commonly used algorithms are also in this paper to provide convenient framework hardware generation algorithm mapping. In...
Proximity-based apps have been changing the way people interact with each other in physical world. To help extend their social networks, proximity-based nearby-stranger (NS) that encourage to make friends nearby strangers gained popularity recently. As another typical type of apps, some ridesharing (RS) allowing drivers search passengers and get requests also become popular due contribution economy emission reduction. In this paper, we concentrate on location privacy mobile apps. By...
Mobile devices and applications are playing an important role in people's daily activities. Although mobile application greatly enriches facilitates the lives of its users, users unconsciously giving away their privacy. In this paper, a traffic analysis tool is proposed to find out what private data leaked from network traffic. The process has two steps, including capturing analyzing privacy leakage. By applying on 51 popular China, we show that lot information can be obtained by passively...
Zhao, S., 2020. Financial risk assessment and pre-warning of port enterprises based on neural network model. In: Al-Tarawneh, O. Megahed, A. (eds.), Recent Developments Port, Marine, Ocean Engineering. Journal Coastal Research, Special Issue No. 110, pp. 243–246. Coconut Creek (Florida), ISSN 0749-0208.This paper designs a financial model Principal Component Analysis (PCA) RBF in order to help effectively identify prevent from the risks. Here first refines indicators at all levels by factor...