- Network Traffic and Congestion Control
- Real-Time Systems Scheduling
- Network Security and Intrusion Detection
- Interconnection Networks and Systems
- Distributed systems and fault tolerance
- Internet Traffic Analysis and Secure E-voting
- Distributed and Parallel Computing Systems
- Privacy-Preserving Technologies in Data
- Topic Modeling
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Wireless Networks and Protocols
- Blind Source Separation Techniques
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Natural Language Processing Techniques
- Advanced Wireless Network Optimization
- Embedded Systems Design Techniques
- Software-Defined Networks and 5G
- Indoor and Outdoor Localization Technologies
- Computational Drug Discovery Methods
- Cryptography and Data Security
- Caching and Content Delivery
- Parallel Computing and Optimization Techniques
- Petri Nets in System Modeling
Shenzhen Institutes of Advanced Technology
2018-2025
Shenzhen University
2024-2025
Dalian Medical University
2025
Second Affiliated Hospital of Dalian Medical University
2025
Shenzhen Technology University
2024-2025
Fate Therapeutics (United States)
2025
Xinjiang Medical University
2024
First Affiliated Hospital of Xinjiang Medical University
2024
Minzu University of China
2024
Dalian University of Technology
2019-2024
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) enable services devices deployed at network edge, aiming improve the user's experience and resilience in case failures. With advantage distributed architecture close end-users, fog/edge can provide faster response greater quality service for IoT applications. Thus, computing-based becomes future infrastructure on development. To develop infrastructure, architecture, enabling techniques, issues related should...
The imprecise computation technique, which prevents timing faults and achieves graceful degradation by giving the user an approximate result of acceptable quality whenever system cannot produce exact in time, is considered. Different approaches for scheduling computations hard real-time environments are discussed. Workload models that quantify tradeoff between time reviewed. Scheduling algorithms exploit this described. These include to minimize total error, periodic jobs, parallelizable...
Dihydropteroate synthase (DHPS) is the target of sulfonamide class antibiotics and has been a validated antibacterial drug for nearly 70 years. The sulfonamides p-aminobenzoic acid (pABA) binding site DHPS interfere with folate biosynthesis ultimately prevent bacterial replication. However, widespread resistance to these drugs severely limited their effectiveness. This study explores second more highly conserved pterin as an alternative approach developing novel that avoid resistance. In...
Wei Zhao, Maxime Peyrard, Fei Liu, Yang Gao, Christian M. Meyer, Steffen Eger. Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint (EMNLP-IJCNLP). 2019.
It is critical for a power system to estimate its operation state based on meter measurements in the field and configuration of grid networks. Recent studies show that adversary can bypass existing bad data detection schemes, posing dangerous threats systems. Nevertheless, two issues remain open: 1) how an choose meters compromise cause most significant deviation estimation, 2) operator defend against such attacks? To address these issues, we first study problem finding optimal attack...
A set of four heuristic algorithms is presented to schedule tasks that have headlines and resource requirements in a distributed system. When task arrives at node, the local scheduler node attempts guarantee will complete execution on before its deadline. If attempt fails, scheduling components individual nodes cooperate determine which other system has sufficient surplus task. Simulation studies are performed compare performance these with respect each as well two baselines. The first...
In this study, we explore capsule networks with dynamic routing for text classification. We propose three strategies to stabilize the process alleviate disturbance of some noise capsules which may contain “background” information or have not been successfully trained. A series experiments are conducted on six classification benchmarks. Capsule achieve state art 4 out 6 datasets, shows effectiveness additionally show that exhibit significant improvement when transfer single-label multi-label...
Big data is considered to be the key unlocking next great waves of growth in productivity. The amount collected our world has been exploding due a number new applications and technologies that permeate daily lives, including mobile social networking applications, Internet Thing-based smart-world systems (smart grid, smart transportation, cities, so on). With exponential data, how efficiently utilize becomes critical issue. This calls for development big market enables efficient trading. Via...
Fog Computing (FC) is a flexible architecture to support distributed domain-specific applications with cloud-like quality of service. However, current FC still lacks the mobility mechanism when facing many mobile users diversified application requirements. Such can be critical such as in industrial internet where human, products, and devices are moveable. To fill gaps, this paper we propose novel container migration algorithms tasks various Our realized from three aspects: 1) We consider...
PETase displays great potential in PET depolymerization. Directed evolution has been limited to engineer due the lack of high-throughput screening assay. In this study, a novel fluorescence-based assay employing newly designed substrate, bis (2-hydroxyethyl) 2-hydroxyterephthalate (termed BHET-OH), was developed for hydrolases. The best variant DepoPETase produced 1407-fold more products towards amorphous film at 50 °C and showed 23.3 higher Tm value than WT. enabled complete...
Multi-view learning aims to combine multiple features achieve more comprehensive descriptions of data. Most previous works assume that views are strictly aligned. However, real-world multi-view data may contain low-quality conflictive instances, which show information in different views. Previous methods for this problem mainly focus on eliminating the instances by removing them or replacing Nevertheless, applications usually require making decisions rather than only them. To solve this, we...
This paper describes a heuristic approach for solving the problem of dynamically scheduling tasks in real-time system where have deadlines and general resource requirements. The crux our lies function used to select task be scheduled next. is composed three weighted factors. These factors explicitly consider information about constraints their utilization resources. Simulation studies show that weights various fine-tuned order obtain degree success range 75-88 percent obtained via exhaustive...
Law enforcement agencies need the ability to conduct electronic surveillance combat crime, terrorism, or other malicious activities exploiting Internet. However, proliferation of anonymous communication systems on Internet has posed significant challenges providing such traceback capability. In this paper, we develop a new class flow marking technique for invisible based direct sequence spread spectrum (DSSS), utilizing pseudo-noise (PN) code. By interfering with sender's traffic and...
We consider the problem of scheduling a set n preemptable tasks in system having r resources. Each task has an arbitrary, but known, worst case processing time and deadline, may request simultaneous use number A resource can be used either shared mode or exclusive mode. In this paper, we develop evaluate algorithms for determining whether not preemptive is schedulable such real-time system, if so, schedule it. This known to computationally intensive. many application environments, are...
Smart Grid is a new type of energy-based cyber-physical system (CPS) that will provide reliable, secure, and efficient energy transmission distribution. The way to secure the distributed routing process efficiently utilizes resources minimizes overhead essential in smart grid. In this paper, we study vulnerability investigate novel false data injection attacks against process. We consider several general attacks, which adversary may manipulate quantity supply, response, link state...
Location-based services (LBS) have become an immensely valuable source of real-time information and guidance. Nonetheless, the potential abuse users' sensitive personal data by LBS server is evolving into a serious concern. Privacy concerns in exist on two fronts: location privacy query privacy. In this paper we investigate issues related to particular, aim prevent from correlating service attribute, e.g., bar/tavern, user's real-world identity. Location obfuscation using spatial...
State estimation plays a critical role in self-detection and control of the smart grid. Data integrity attacks (also known as false data injection attacks) have shown significant potential undermining state power systems, corresponding countermeasures drawn increased scholarly interest. Nonetheless, leveraging optimal phasor measurement unit (PMU) placement to defend against these attacks, while simultaneously ensuring system observability, has yet be addressed without incurring overhead. In...
Obstacles hindering the development of capsule networks for challenging NLP applications include poor scalability to large output spaces and less reliable routing processes. In this paper, we introduce: (i) an agreement score evaluate performance processes at instance-level; (ii) adaptive optimizer enhance reliability routing; (iii) compression partial improve networks. We validate our approach on two tasks, namely: multi-label text classification question answering. Experimental results...
Recent artificial intelligence research has witnessed great interest in automatically generating text descriptions of images, which are known as the image captioning task. Remarkable success been achieved on domains where a large number paired data multimedia available. Nevertheless, annotating sufficient is labor-intensive and time-consuming, establishing significant barriers for adapting systems to new domains. In this study, we introduc novel Multitask Learning Algorithm cross-Domain...
In transportation-based cyberphysical systems (TCPS), also known as intelligent transportation (ITS), to increase traffic efficiency, a number of dynamic route guidance schemes have been designed assist drivers in determining optimal routes for their travels. To determine routes, it is critical effectively predict the condition roads along guided based on real-time information collected by vehicular networks mitigate congestion and improve efficiency. this paper, we propose Dynamic En-route...
We study unsupervised multi-document summarization evaluation metrics, which require neither human-written reference summaries nor human annotations (e.g. preferences, ratings, etc.). propose SUPERT, rates the quality of a summary by measuring its semantic similarity with pseudo summary, i.e. selected salient sentences from source documents, using contextualized embeddings and soft token alignment techniques. Compared to state-of-the-art SUPERT correlates better ratings 18- 39%. Furthermore,...
In this paper, to address the issue of demand response in smart grid with island MicroGrids (MGs), we introduce an effective and secure auction market that allows electric vehicles (EVs) having surplus energy act as sellers, EVs insufficient MGs buyers. There are two primary challenges designing grid. First, scheme shall be online, allowing buyers sellers enter at any time, satisfy several critical economic properties (individual rationality, incentive compatibility, so on.). Second,...