- Network Security and Intrusion Detection
- Software Reliability and Analysis Research
- Smart Grid Security and Resilience
- Vehicular Ad Hoc Networks (VANETs)
- Software Testing and Debugging Techniques
- Web Application Security Vulnerabilities
- Energy Efficient Wireless Sensor Networks
- Nuclear Physics and Applications
- Software Engineering Research
- Advanced Malware Detection Techniques
- Gambling Behavior and Treatments
- Educational Technology and Pedagogy
- Artificial Intelligence in Games
- Complex Network Analysis Techniques
- Spam and Phishing Detection
- Smart Grid and Power Systems
- Power Systems and Technologies
- Power Systems and Renewable Energy
- Medical Imaging Techniques and Applications
- Digital Games and Media
- Image and Signal Denoising Methods
- Land Use and Ecosystem Services
Xi'an High Tech University
2024
Huazhong University of Science and Technology
2012-2022
Hebei Institute of Physical Education
2005
Due to the lack of appropriate theory accurately characterize vulnerabilities, current static detection technologies have two key challenges, i.e., limited applicability, and problem state space explosion. In this paper, we put forward a model based on proposition function. Furthermore, new program intermediate representation called Vulnerability Executable Path Set (VEPS) is proposed optimize our which compresses distinctly. addition, in order confirm reliability model, conduct three terms...
Fast neutron radiography technology has unique application advantages in the field of non-destructive testing. However, due to interaction between gamma rays and charge-coupled device camera, a large amount white spots noise is attached fast images, which affects subsequent analysis. In this paper, we propose simple effective method remove images. First, image down-sampled by dilated down-sampling reduce influence noise. Then, existence accurately identified detection. Finally, denoised...
In the open environment of power market, with rapid development distributed generation, traditional centralized transaction faces great challenges in meeting needs transparency, timeliness and data security generation transactions. this context, paper proposes an architecture design for market-oriented based on blockchain technology. Firstly, characteristic matching between technology is analyzed. Secondly, process proposed.
Chinese Ludo, also known as Aeroplan Chess, has been a very popular board game for several decades. However, there is no mature algorithm existing human–machine gambling. The major challenge the high randomness of dice rolls, where must ensure that machine smarter than human in order to guarantee owner machines makes profit. This paper presents fast Ludo (named “Threat Matrix”) we have recently developed. Unlike from most chess programs, which rely on performance computing machines,...