- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Genetic Associations and Epidemiology
- Quantum optics and atomic interactions
- Interconnection Networks and Systems
- Satellite Communication Systems
- Software System Performance and Reliability
- Advanced Image and Video Retrieval Techniques
- Robotics and Automated Systems
- Cloud Data Security Solutions
- Telecommunications and Broadcasting Technologies
- Green IT and Sustainability
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Wireless Sensor Networks and IoT
- Caching and Content Delivery
- Video Analysis and Summarization
- Blockchain Technology Applications and Security
- Social Robot Interaction and HRI
- Indoor and Outdoor Localization Technologies
- Innovative Human-Technology Interaction
- Ideological and Political Education
- Forensic and Genetic Research
Ministry of Public Security of the People's Republic of China
2011-2021
Wuhan University
2016
National Administration of Surveying, Mapping and Geoinformation of China
2016
Institute of Forensic Science
2015
China Electric Power Research Institute
2013
North China Electric Power University
2013
University of Science and Technology of China
2009
Hubei Normal University
2008
Quantum key distribution (QKD) networks have recently attracted growing attention. The topology of the local QKD network is basis next-generation global secure communication network. In this letter, we report a realization wavelength-routing star type which can span metropolis using commercial backbone optical fiber without trusted relays. longest and shortest lengths between two geographically separated nodes are 42.6 32 km, respectively, maximum average quantum bit-error rate below 8%. A...
Robots, as the creation of humans, became an irreplaceable component in human society. With advancement technologies, robots have become more and intelligent been widely used many fields, such disease diagnosis, customer services, healthcare for older people, so on. As made our lives much convenient than ever before, they also brought potential risks challenges technology, security, ethic. To better understand development robots, we proposed a concept robot's living space analyzed role In...
Structural health monitoring with wireless sensor networks has been increasingly popular in recent years because of the convenience. In this paper, a real-time system for cracks on surface reactor containment buildings is presented. Customized platforms are designed and implemented sensors especially crack monitoring, which include crackmeters temperature detectors. Software protocols like route discovery, time synchronization data transfer developed to satisfy requirements stay simple at...
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components next-generation wireless networks. This paper focuses on influences different strategies Device-to-Device (D2D) We model D2D User Equipments (DUEs) Gauss determinantal point process considering repulsion between DUEs, well replacement a many-to-many matching game. By analyzing existing placement strategies, new strategy proposed, which...
Reducing the delay-sensitive Short Flows Completion Time (SFCT) is a hot topic in data center networks, and prioritizing short flows an effective way to do that. However, precisely identifying flow still challenge, which makes many proposed schemes unfeasible commodity switch. The often have small Congestion Window (CWND) due their sizes, thus CWND can be used as coarse metric identify flows. Based on this idea, Low Delay Data Center Transport Control Protocol (LD-DCTCP) proposed. When...
The firewall is one of the most important network security facility and widely used as a base infrastructure in large enterprise network. When policy changes, administrator must find all potential conflicts between existing policies to ensure security. That's waste time energy. Proceeding from demands, this paper analyzes key points difficulties design process for tools, applies mature algorithm conflict detection, finally proposes flexible scalable design. prototype system proves that tool...
With the rapid development of network and multimedia technologies, a large number image databases have been produced, data has experiencing an exponential growth. Meanwhile, requirement for searching images, i.e. retrieval in is hot issue. Many traditional methods search images accurately according to feature vector image, but this method computationally expensive. The most famous improved solution Locality Sensitive Hashing (LSH, Hashing) which sacrifices some accuracy improve efficiency....
With the integration of various smart devices (smartphones, laptops, desktops, etc.) into people's lives, some traditional user tracking methods such as cookies, browser fingerprints, etc. have become ineffective. There is an urgent need for a new paradigm that can track users across browsers and devices. In particular, we propose architecture cross-device tracking. We exploit physical behavioral characteristics to discover more about users' habits, build corresponding user-device pairs...