- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Medical Image Segmentation Techniques
- Mobile Ad Hoc Networks
- Vehicular Ad Hoc Networks (VANETs)
- Transportation and Mobility Innovations
- Cloud Computing and Resource Management
- AI in cancer detection
- Blockchain Technology Applications and Security
- Advanced Wireless Network Optimization
- Access Control and Trust
- Image Retrieval and Classification Techniques
- Advanced Image and Video Retrieval Techniques
- Consumer Market Behavior and Pricing
- Advanced Electron Microscopy Techniques and Applications
- Assembly Line Balancing Optimization
- IPv6, Mobility, Handover, Networks, Security
- Reinforcement Learning in Robotics
- Complexity and Algorithms in Graphs
- Cooperative Communication and Network Coding
- Transportation Planning and Optimization
- IoT and Edge/Fog Computing
- Advanced Image Fusion Techniques
- Scheduling and Optimization Algorithms
- Agricultural Economics and Policy
Hangzhou Dianzi University
2024-2025
Howard Hughes Medical Institute
2025
University of California, San Francisco
2025
Xi'an Railway Survey and Design Institute
2023
Harbin Institute of Technology
2023
Hefei University of Technology
2020-2022
Pan Asia Technical Automotive Center (China)
2020
Nanjing Audit University
2015
Anhui University
2005-2008
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority timely gather, analyze, trace data promotes vehicular investigations. However, adversaries crave identity provider/user, damage evidence, violate evidence jurisdiction, leak evidence. Therefore, protecting privacy accountability while guaranteeing access control traceability in VDF no easy task. To address above-mentioned issues, we propose Eunomia: an...
With technological advancements in recent years, single particle cryogenic electron microscopy (cryo-EM) has become a major methodology for structural biology. Structure determination by cryo-EM is premised on randomly orientated particles embedded thin layer of vitreous ice to resolve high-resolution information all directions. Otherwise, preferentially distributed orientations will lead anisotropic resolution the structure. Here we established deconvolution approach, named AR-Decon,...
Traffic-sensitive navigation systems in vehicular networks help drivers avoid traffic jams by providing several realtime routes. However, still encounter privacy concerns because their sensitive locations, i.e., start point and endpoint, are submitted to an honest-but-curious service provider (NSP). Previous privacy-preserving studies exhibit serious deficiencies under similar queries: if a driver makes queries, periodically requests for the same endpoint NSP, these will eventually reveal...
Current connected and autonomous vehicles will contribute to various green vehicular services. However, sharing personal data with untrustworthy Navigation Service Providers (NSPs) raises serious location concerns. To address this issue, many Location Privacy-Preserving Mechanisms (LPPMs) have been proposed. In addition, several quantification methods designed help understand privacy illustrate how is leaked. their assessment insufficient due the incomplete assumptions about adversary's...
The efficient operation of Intelligent Warehousing System does not rely on individual resource scheduling in stages but multi-type resources collaborative scheduling. In this paper, a model for stackers, automated guided vehicles and picking workstations outbound process is abstracted into hybrid flow-shop problem within an warehouse scene. Considering the impacts uncertain factors related to scheduling, objective function minimizing makespan based triangular fuzzy processing time. A genetic...
Ride-hailing is a favored vehicular service model where drivers can deliver convenient rides to waiting riders via responding road-side unit or ride-hailing provider. However, previous works did not consider the order-linking function rider Cathy waving for ride will be matched driver Bob in with Alice whose destination close start point of Cathy. Furthermore, malicious matching executor could collude an appointed interfere process, which causes unfairness and has been addressed before. To...
Resource allocation is expected to be a most important factor especially for heterogeneous applications in wireless ad hoc networks. In this paper, novel resource algorithm (HRA) presented networks, supporting both elastic and inelastic traffic. First, by combining the first order Lagrangian method with pseudo utility, original nonconvex problem converted into new convex one. Then, we successfully solve dual-based decomposition approach. addition, integrate utility fairness framework, which...
Traditional supervised learning methods have historically encountered certain constraints in medical image segmentation due to the challenging collection process, high labeling cost, low signal-to-noise ratio, and complex features characterizing biomedical images. This paper proposes a semi-supervised model, DFCPS, which innovatively incorporates Fixmatch concept. significantly enhances model's performance generalizability through data augmentation processing, employing varied strategies for...
Whole Slide Image (WSI) classification is often formulated as a Multiple Instance Learning (MIL) problem. Recently, Vision-Language Models (VLMs) have demonstrated remarkable performance in WSI classification. However, existing methods leverage coarse-grained pathogenetic descriptions for visual representation supervision, which are insufficient to capture the complex appearance of images, hindering generalizability models on diverse downstream tasks. Additionally, processing high-resolution...
Privacy policies have disrupted the multi-billion dollar online advertising market by making real-time and precise user data untraceable, which poses significant challenges to optimization of Return-On-Investment (ROI) constrained products in industry. protection strategies, including event aggregation reporting delays, hinder access detailed instantaneous feedback data, thus incapacitating traditional identity-revealing attribution techniques. In this paper, we introduces a novel Spending...
The risk assessment of landslides is an important component landslide assessment, which great significance for the prediction and prevention landslides. How to scientifically reasonably select evaluation factors a weak link in existing research. For selection factors, data analysis method mistakenly deleted factor screening. Therefore, hierarchical grey relational was first used calculate comprehensive correlation degree based on expert experience, then random forest model best assess risk....
移动Ad hoc 网自组织、移动性等特性为组网带来便利的同时也增加了路由管理的难度.针对现有可靠路由算法解决问题具有局限性以及获取链路评价信息低效等问题,在DSR(dynamic source routing)协议基础上提出了基于本地信任系统的可靠路由协议(reliable routing protocol based on local trust system,简称TR-DSR).TR-DSR 协议选择路由时,综合考虑路由上各节点和各链路的可靠信任度,并在路由建立过程中利用这些信息,在确保找到可靠路由的基础上降低寻路开销.同时,为了防止自私节点对信任系统评价正确性的影响,提出了基于GTFT(generous tit fortat)策略的激励节点推荐响应行为的DFR(decide forwarding recommendation)算法.仿真实验结果表明,在节点频繁移动和存在大量自私节点的网络中,该协议的性能优势明显,验证了TR-DSR 协议的可靠性.;The features of mobile ad network such as self-organization,...