- HIV/AIDS Research and Interventions
- Insect-Plant Interactions and Control
- Crime Patterns and Interventions
- Crime, Illicit Activities, and Governance
- HIV, TB, and STIs Epidemiology
- HIV, Drug Use, Sexual Risk
- HIV/AIDS drug development and treatment
- Blockchain Technology Applications and Security
- Agricultural pest management studies
- Artificial Intelligence in Games
- Insect Pest Control Strategies
- HIV Research and Treatment
- Cybercrime and Law Enforcement Studies
- Advanced Computational Techniques and Applications
- Network Security and Intrusion Detection
- Power Systems and Technologies
- IoT and Edge/Fog Computing
- Transport and Economic Policies
- Research on scale insects
- Railway Systems and Energy Efficiency
- Climate Change, Adaptation, Migration
- Data Stream Mining Techniques
- Dengue and Mosquito Control Research
- Technology and Data Analysis
- Hemiptera Insect Studies
State Grid Corporation of China (China)
2023-2024
China Electric Power Research Institute
2023-2024
Beijing Institute of Technology
2023
Chinese Academy of Sciences
2021-2023
Computer Network Information Center
2021-2023
Dalian Maritime University
2023
North China Electric Power University
2023
University of Connecticut
2022
NetEase (China)
2019-2022
Tsinghua University
2021
Abstract Cybercrime is wreaking havoc on the global economy, national security, social stability, and individual interests. The current efforts to mitigate cybercrime threats are primarily focused technical measures. This study considers as a phenomenon constructs theoretical framework that integrates social, economic, political, technological, cybersecurity factors influence cybercrime. FireHOL IP blocklist, novel data set, used map worldwide subnational cybercrimes. Generalised linear...
African swine fever (ASF) has spread to many countries in Africa, Europe and Asia the past decades. However, potential geographic extent of ASF infection is unknown. Here we combined a modeling framework with assembled contemporary records cases multiple covariates predict risk distribution at global scale. Local spatial variations derived from domestic pigs influenced strongly by livestock factors, while having wild boars mainly associated natural habitat covariates. The maps show that be...
Human immunodeficiency virus (HIV)–positive cases have been reported among people who injected drugs in Liangshan Prefecture southwest of China since 1995 and has become one the most seriously affected epidemic areas China. In 2004, several patients with HIV/acquired syndrome (AIDS) initiated antiretroviral treatment (ART) at Central Hospital Prefecture. From 2005 to 2013, number receiving ART dramatically increased. We conducted a retrospective cohort study analyze long-term survival time...
Online gaming is a multi-billion dollar industry that entertains large, global population. However, one unfortunate phenomenon known as real money trading harms the competition and fun. Real an interesting economic activity used to exchange assets in virtual world with currencies, leading imbalance of game economy inequality wealth opportunity. Game operation teams have been devoting much efforts on detection, however, it still remains challenging task. To overcome limitation from...
Echinococcosis, caused by genus Echinococcus , is the most pathogenic zoonotic parasitic disease in world. In Tibet of People’s Republic China, echinococcosis refers principally to two types severe zoonosis, cystic (CE) and alveolar (AE), which place a serious burden on public health economy local community. However, research spatial epidemiology remains inadequate Tibet, China. Based recorded human data, maps distribution CE AE prevalence were produced at city level county respectively,...
Human security is threatened by terrorism in the 21st century. A rapidly growing field of study aims to understand terrorist attack patterns for counter-terrorism policies. Existing research aimed at predicting from a single perspective, typically employing only background contextual information or past attacks groups, has reached its limits. Here, we propose an integrated deep-learning framework that incorporates context attacked locations, social networks, and actions individual groups...
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics cybercrime victimization ignore impacts macro-level environmental factors. This study aims at exploring spatiotemporal pattern crime in China investigating relationships between The results showed that crimes were initially distributed southeastern gradually...
In our previous work, we have applied ordinary linear regression equation to network anomaly detection. However, the performance of is susceptible outliers. Unfortunately, it almost impossible obtain a "clean" traffic data set for model due burstiness and pervasive attacks. this paper, make use robust techniques mitigate impact outliers in training set. The experiment results show that based method more reliable than face
With the emerging of smartphones, mobile games have attracted billions players and occupied most share for game companies. On other hand, cheating, aiming to gain improper advantages by using programs that simulate players' inputs, severely damages game's fairness harms user experience. Therefore, detecting cheating is great importance Many PC game-oriented detection methods been proposed in past decades, however, they can not be directly adopted due concern privacy, power, memory...
The supply chain is a system that comprises multiple entities such as suppliers, manufacturers, carriers, customers, etc. Data sharing safely between these vital for the success of chain. This paper proposes secure data scheme based on blockchain and IPFS, including decentralized architecture, management capability-based access control mechanism message acquisition publish-subscribe model. Further more, BIZi storage method proposed to enhance reliability above solution streamline backup by...
Abstract The traditional evaluation method of transformer has the problems strong subjectivity threshold value and fuzzy correlation state quantity, which is difficult to accurately evaluate operation quality transformer. In order solve these problems, this paper proposes a comprehensive performance based on cloud model. index system power considering constructed, including target layer, layer layer. triangular number used optimize set expert opinions, indexes are combined weighted by...
With global warming and escalating environmental pressures, low-carbon development has become a consensus. Against this backdrop, study proposes an innovative method for calculating the carbon emissions from electric traction of high-speed trains. Utilizing reverse power flow tracing technology, precisely determines supply structure railway stations, where emission factors electricity vary at different times locations due to changes in grid dispatching mix. This approach facilitates...