- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Information and Cyber Security
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Service-Oriented Architecture and Web Services
- Anomaly Detection Techniques and Applications
- Power Systems and Technologies
- Blockchain Technology Applications and Security
- Technology and Security Systems
- Network Traffic and Congestion Control
- Smart Grid Security and Resilience
- Software System Performance and Reliability
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Advanced Data Storage Technologies
- Advanced Queuing Theory Analysis
- Smart Grid and Power Systems
- Energy, Environment, Economic Growth
- Web Data Mining and Analysis
- Power Systems and Renewable Energy
- Software Testing and Debugging Techniques
- Advanced Decision-Making Techniques
- Distributed and Parallel Computing Systems
Northwest Institute of Nuclear Technology
2024
Zhejiang A & F University
2024
Guizhou Electric Power Design and Research Institute
2024
Tongji University
2012-2024
National University of Defense Technology
2024
Xiamen University of Technology
2023
Southeast University
2023
China University of Petroleum, East China
2023
Chongqing University of Posts and Telecommunications
2023
Wuhan University of Science and Technology
2023
As the core of blockchain technology, consensus algorithm directly affects security, stability, and decentralisation numerous other important characteristics. Choosing an appropriate for different scenarios is currently a challenge in implementation applications. This paper classifies improvement schemes proof stake (PoS) into three categories: PoS-based algorithms, PoS- PoW-based BFT-based algorithms. First, study introduces PoS variants then summarises ideas, effects, advantages,...
Non-adherence to 5-aminosalicylic acid (5-ASA) medication can limit the established benefits of this therapy in ulcerative colitis (UC).To determine rates and predictors non-adherence 5-ASA UC patients.Medication adherence was assessed using self-report data urinary drug excretion measurements. Participants completed a study-specific questionnaire two validated questionnaires: Beliefs about Medicine Questionnaire (BMQ)-Specific Satisfaction with Information Medicines Scale.A total 169...
Network Intrusion Detection Systems (NIDS) have become a strong tool to alarm attacks in computer and communication systems. Machine learning, especially deep has made huge success fields of industry academic. intrusion activity can be time series event. In this paper, we adopt time-related learning approach detect network intrusions. A stacked sparse autoencoder (SSAE) is first built extract the features with greedy layer-wise strategy. And then, propose time- related detection system based...
Distributed Denial of Service (DDoS) is a serious computer network attack which can cause extreme performance degradation on the victim server. This paper presents formal and methodical way modeling DDoS by method Augmented Attack Tree (AAT), an AAT-based detection algorithm. explicitly captures particular subtle incidents triggered corresponding state transitions from view traffic transmission primary Two major contributions are given in this paper: (1) model (ADDoSAT) developed to assess...
Abstract Based on the data of listed small and medium‐sized enterprises (SMEs) from 2011 to 2020, this paper studies effects fintech financing constraints SMEs in China. The results denote that can significantly ease SMEs; with a 1% increase fintech, decrease by 0.0767%. intermediary mechanism analysis illustrates alleviating financial industry concentration information asymmetry. Besides, regions higher degree marketization industries relatively free competition are both more conducive SMEs.
Modern vehicles are equipped with more than 100 Electrical Control Units (ECUs) over 2500 signals to transmit internally. The application of advanced electronics and communication techniques helps a vehicle transform from an information island into powerful distribution center. However, large number ECUs have introduced wider range security threats for vehicles. attackers can compromise remotely through vulnerable ECU. How evaluate the cyber in-vehicle has become important issue. Current...
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access databases. SQLIA adversary intelligently exploits the statement parsing operation by servers via specially constructed statements that subtly lead non-explicit executions or modifications of corresponding database tables. In this paper, we present formal methodical way modeling SQLIAs augmented attack trees. This explicitly captures particular...
How to achieve energy efficiency run a cloud data center is major challenge in the era of rising electricity cost and environmental protection. Various techniques have been devised help reduce consumption for centers that consist large number identical servers, including dynamic allocation active consolidating diverse applications on them, adjusting CPU speed an server. Leveraging these techniques, we use Online Coloring Bin Packing problem model consolidation devise effective...
Network attacks occur in high proportion on the internet, thus aside from security as a means of defense there is need for being able to detect they so that measures can be put place tackle them.In this paper, we focus attack trees tool model thereby facilitating detection.More precisely, present unified parametrizable tree; applied intrusion detection and instantiated produce particular types literature.
Cloud service selection with multi-type cloud computing resources is a novel research and catching increasing attention. To help users efficiently select integrate their desired services, the agent-based paradigm has emerged. In this work, we propose an intermediary agent model called ISAM which lets each manage some clustered services of same type. And based on model, dynamic strategy named DCS given. The core uses adaptive learning mechanism consisting incentive forgetting functions,...
The regular assessment of the distribution network's hosting capacity (HC) is crucial for secure and stable operation power system as installed distributed photovoltaic (DPV) continues to increase. This paper introduces a multi-level estimation method evaluating regional HC DPVs. addresses limitations existing studies, which have small scale use complex methodologies. It conducts comprehensive integrated calculations three hierarchical levels networks, ranging from equipment level county...
In Vehicular Ad hoc NETworks (VANETs), IEEE 802.11p MAC (WAVE MAC) and its variations suffer from low spectrum efficiency, especially in densely populated Vehicular-to-Infrastructure (V2I) communication scenarios. Focusing on multi-channel coordination allocation, this paper proposes a Road Side Unit (RSU)-coordinated with centralized multi-criteria service channel allocation scheduling scheme. By separating safety function control further dividing messages into different types, the...
This paper presents a comprehensive system modeling and analysis approach for both predicting controlling queuing delay at an expected value under multi-class traffic in single buffer. could effectively enhance QoS delivery sensitive applications. Six major contributions are given the paper: (1) discrete-time analytical model is developed capturing with binomial distribution; (2) control strategy dynamic queue thresholds used simulation experiments to specified within buffer; (3) feasibility...
Workflows have been used to represent a variety of applications that involve coordinating set business services or scientific services, which are generally geographically distributed. With the development cloud computing, workflow engine can be deployed as service, responsible for executing customers' instances. In components placed into different regions. Thus, one challenging problem arises is how select appropriate regions place in order efficiently execute service instance. Because this...
Network slicing is a new network architecture that provides multiple logical networks on the same shared infrastructure, each serving specific business type or industry user. The feature will provide end-to-end isolation between slices and ability to customize slice based service requirements (bandwidth, coverage, security, latency, reliability, etc.). This paper uses random forest deep neural (DNN) algorithms build intelligent models capable of proactively detecting eliminating incoming...
Intelligent connected vehicles (ICVs) are equipped with extensive electronic control units which offer convenience but also pose significant cybersecurity risks. Penetration testing, recommended in ISO/SAE 21434 “Road vehicles—Cybersecurity engineering”, is an effective approach to identify vulnerabilities ICVs. However, there limited research on vehicle penetration testing from a black-box perspective due the complex architecture of Additionally, no framework has been proposed guide...