- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Privacy, Security, and Data Protection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Mobile Crowdsensing and Crowdsourcing
- Digital and Cyber Forensics
- Blockchain Technology Applications and Security
- Human Mobility and Location-Based Analysis
- Wireless Communication Security Techniques
- Cognitive Radio Networks and Spectrum Sensing
- Mobile Agent-Based Network Management
- Cooperative Communication and Network Coding
- Imbalanced Data Classification Techniques
- Military Defense Systems Analysis
- Sexuality, Behavior, and Technology
- Advanced Authentication Protocols Security
- Photodynamic Therapy Research Studies
- Real-Time Systems Scheduling
- Digital Media Forensic Detection
- Advanced Nanomaterials in Catalysis
- Image Retrieval and Classification Techniques
- Advanced Vision and Imaging
- Advanced Image Processing Techniques
- Spam and Phishing Detection
Xidian University
2024-2025
Wenzhou City People's Hospital
2025
Wenzhou Medical University
2025
Tongren Hospital
2021-2022
Shanghai Jiao Tong University
2015-2022
Connected vehicles can provide safer and more satisfying services for drivers by using information sensing sharing. However, current network architecture cannot support massive real-time data transmissions due to the poor-quality wireless links. To processing improve drivers' security, edge computing is regarded as a promising method offer efficient placing storage resources at edge. In this paper, we will introduce concept of edge-assistant connected propose some applications reduce traffic...
Usage-based insurance (UBI) is regarded as a promising way to provide accurate automotive rates by analyzing the driving behaviors (e.g., speed, mileage, and harsh braking/accelerating) of drivers. The best practice that has been adopted many programs protect users' location privacy use speed rather than GPS data. However, in this paper, we challenge approach presenting novel speed-based trajectory inference framework. basic strategy proposed framework motivated following observations. In...
As an important driving factor of emerging Internet-of-Things (IoT) applications, machine learning algorithms are currently facing the challenge how to "clean" data noise, that is introduced during training process (e.g., asynchronous execution and lossy compression quantization). In attempt guarantee quality, various cleaning approaches have been proposed filter out abnormal entries based on global distribution. However, most existing a centralized paradigm thus cannot be applied future...
Early diagnosis of colorectal cancer (CRC), a malignant tumor with high incidence and mortality rates worldwide, can significantly reduce both its mortality. Among diagnostic methods, fluorescence imaging provides non-invasive approach, eliminating the need for tissue biopsy minimizing patient discomfort. In this study, we identified water-soluble quinolinium molecular fluorescent probe (CYI), which exhibits dose-dependent quantum yield in PBS solution, reaching 5.96% at concentration 20 µM....
The latest Federal Communications Commission (FCC) ruling has enforced database-driven cognitive radio networks (CRNs), in which all secondary users (SUs) can query a database to obtain spectrum availability information (SAI). Database-driven CRNs are regarded as promising approach for dynamic and highly efficient management paradigm large-scale Internet of Things (IoT). However, typical location-based service (LBS), before providing services the user, there is no verification queried...
Traffic analysis attacks, including website fingerprinting and protocol fingerprinting, are widely adopted by Internet censorship to block a specific type of traffic. To mitigate these some advanced approaches such as traffic morphing tunneling techniques have been proposed. However, the existing morphing/protocol suffer from showing strong pattern or can be uncovered with low false positive. Further, they mainly rely on learning for traffic, which makes it highly possible identified due...
Usage-based Insurance (UBI) is regarded as a promising way to offer more accurate insurance premium by profiling driving behaviors. Compared with traditional which considers drivers' history of accidents, traffic violations and etc, UBI focuses on data can give reasonable based the current Insurers use sensors in smartphone or vehicle collect (e.g. mileage, speed, hark braking) compute risk score these recalculate premium. Many programs, are advertised being privacy-preserving, do not...
Computer-aided polyp detection system powered by deep neural networks has achieved high performance but also suffers from data insufficiency. To address this problem, recent researches focus on synthesizing new colonoscopic images Generative Adversarial Network (GAN). However, the synthesized follow same distribution as that of training dataset, which limits detectors re-trained it. Recent studies show adversarial examples can expand and thus effectively improve robustness networks. Inspired...
The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in networks from both technical economic perspectives.From perspective, use Markov chain propose dynamic attack-defense tree-based model, which is temporal-aware, characterize an attack effort made by attacker corresponding countermeasure responded...
Due to the worldwide deployment of Long Term Evolution (LTE), fourth-generation (4G) mobile cellular networking technology, Voice over LTE (VoLTE) [2] has been also well developed in past few years. It exploits packet-switched network provide call services instead traditional circuit- switched telephony. Similar IP (VoIP), VoLTE adopts Session Initiation Protocol (SIP) achieve some control functions. Therefore, it means attack techniques against SIP will be effective devices. In this paper,...
Controller Area Network (CAN), the de facto standard in-vehicle network protocol, prompts modern automobile an integrated system that achieves real-time interactions with roads, vehicles and people. Yet such connectivity makes it feasible to illegally access, or even attack CAN, causing not only privacy disclosure, property damage, but also life threat. In this paper, we analyze intrinsic weakness in CAN protocol is mostly exploited by attackers comprehensively survey existing attacks based...
As geo-location data has been increasingly adopted as a high-profile feature in targeted advertising, exposing user real locations to untrusted cloud services or advertisers raised severe privacy concerns. To protect location with formal guarantee, wide-stretched line of recent studies focuses on injecting controlled geo-indistinguishability (geo-IND) noise per each exposure. However, over the course 2 years, single can report and contribute near 1k points average, which allows longitudinal...
Because of the unique flight trajectory and high penetration effectiveness, near-space hypersonic vehicles (NSHV) become a great challenge for active air defense systems. This paper study tracking algorithm NSHV based on Aerodynamic Model. Firstly, simulated equation motion. Secondly, designed method by using aerodynamic acceleration model, effectiveness limitation model are both verified simulation. Finally, this provided some suggestions improvement Acceleration
Virtual reality (VR) apps can harvest a wider range of user data than web/mobile running on personal computers or smartphones. Existing law and privacy regulations emphasize that VR developers should inform users what are collected/used/shared (CUS) through policies. However, policies in the ecosystem still their early stages, many fail to write appropriate comply with meet expectations. In this paper, we propose VPVet automatically vet policy compliance issues for apps. first analyzes...
Smart home has become a mainstream lifestyle due to the maturity of IoT platform and popularity smart devices. While offering great convenience entertainment, suffers from malicious attacks that inject improper commands actions devices, which may breach user's safety privacy. Traditional solutions mainly focus on generating security policies relying app analysis constraint apps' behaviors. However, these lack flexibility adapt highly dynamic system. We need consider not only behaviors but...
Location-based recommendation services (LBRS) are widely used by people to find new places of interest. However, the prevalence LBRS poses a severe threat users' privacy, because queries contain sensitive information such as preferences and location. Many Location Privacy Protection Mechanisms (LPPMs) have been proposed mitigate obfuscating actual location in query with noise-based privacy-preserving technique. disguised can potentially harm user experience LBRS. In this work, we evaluate...