- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Anomaly Detection Techniques and Applications
- Topic Modeling
- Caching and Content Delivery
- Energy Efficient Wireless Sensor Networks
- Smart Grid Security and Resilience
- Natural Language Processing Techniques
- Privacy-Preserving Technologies in Data
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Wireless Networks and Protocols
- Privacy, Security, and Data Protection
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Text Analysis Techniques
- Network Packet Processing and Optimization
- Mobile Crowdsensing and Crowdsourcing
- Energy Harvesting in Wireless Networks
- Cryptography and Data Security
- Network Time Synchronization Technologies
- Software Testing and Debugging Techniques
- Blockchain Technology Applications and Security
Institute of Information Engineering
2016-2025
University of Chinese Academy of Sciences
2008-2025
Chinese Academy of Sciences
2015-2024
Nanyang Technological University
2023
Institute of Electronics
2017-2022
Tongji University
2022
Xidian University
2014
Institute of Software
2003-2012
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. surge demand on high-quality services at anywhere, how to address user accommodate explosive growth of traffics is key issue next generation networks. The Fog a promising solution towards this goal. extends cloud by providing virtualized resources engaged location-based edge networks so as better serve traffics. Therefore,...
Extracting entities and relations from unstructured text has attracted increasing attention in recent years but remains challenging, due to the intrinsic difficulty identifying overlapping with shared entities. Prior works show that joint learning can result a noticeable performance gain. However, they usually involve sequential interrelated steps suffer problem of exposure bias. At training time, predict ground truth conditions while at inference it make extraction scratch. This discrepancy...
With the dramatically increasing deployment of IoT devices, storing and protecting large volume data has become a significant issue. Traditional cloud-based structures impose extremely high computation storage demands on cloud servers. Meanwhile, strong dependencies centralized servers bring trust issues. To mitigate these problems, we propose distributed scheme employing blockchain cetrificateless cryptography. Our eliminates traditional by leveraging miners who perform "transaction"...
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing infrastructure only provides intermittent connectivity for mobile users. Once leaving current network clients must actively discover new access points (APs), which wastes precious energy of devices. Although several solutions been proposed address this issue, they either require significant modifications infrastructures or rely on context information that is not...
This paper proposes LATTE, the first static binary taint analysis that is powered by a large language model (LLM). LATTE superior to state of art (e.g., Emtaint, Arbiter, Karonte) in three aspects. First, fully automated while prior analyzers need rely on human expertise manually customize propagation rules and vulnerability inspection rules. Second, significantly effective detection, demonstrated our comprehensive evaluations. For example, has found 37 new bugs real-world firmware, which...
Travelers in vehicles often have a strong willingness to share their travel experience and exchange information each other through social networks, such as Facebook Twitter. This, however, can be costly due the limited connections on road Internet. In this paper, we develop Verse facilitate communications among vehicle travelers highways. enables passengers onboard content information, blogs with pictures, using impromptu wireless intervehicle communications. Unlike traditional online which...
Industrial control system (ICS) devices with IP addresses are accessible on the Internet and play a crucial role for critical infrastructures like power grid. However, there is lack of deep understanding these devices' characteristics in cyberspace. In this paper, we take first step direction by investigating industrial Internet. Because nature systems, detection online ICS should be done real-time non-intrusive manner. Thus, analyze 17 protocols widely used train probability model through...
Yucheng Wang, Bowen Yu, Hongsong Zhu, Tingwen Liu, Nan Limin Sun. Proceedings of the 59th Annual Meeting Association for Computational Linguistics and 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). 2021.
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message passing protocols can achieve satisfactory clock accuracy, they incur prohibitively high overhead when network scales more than tens nodes. An alternative approach take advantage global time reference induced by existing infrastructures including GPS, timekeeping radio stations, or power grid. However, consumption...
In wireless sensor networks (WSNs), due to the limited energy of nodes, discovering neighbors needs be achieved in an energy-efficient way. This means that, at a given consumption, we need reduce worst-case neighbor discovery latency as far possible. this letter, propose novel deterministic method, called Lightning. Lightning employs two kinds active slots different lengths (we call A slot and C slot, respectively). The time is much shorter than that order consumption. addition, maximize...
Existing static defenses for online service systems can be fragile and costly due to the continuity of ubiquitous cyber attacks. LAD has become a promising technology tackle this problem. However, security defense mechanism itself is often neglected as mainly focuses on fortifying protected target. This would allow new deductive attack encroach LADs by inferring undermining strategy, then whole completely invalidated once all. Such problem leads urgent need develop technologies with...
In the field of Cyber Physical Systems and Pervasive Computing, physical resources web can be easily handled seamlessly integrated into our life. However, due to heterogeneity devices tight coupling individual information systems, developers cannot create their specific applications by combining with resources. this paper, we proposed Rest Thing which is a restful service infrastructure based on REST principles in order hide provide seamless way integrate embedded existing applications....
In recent years, the capacity of cellular networks has hardly kept pace with dramatic explosion traffic from emerging mobile applications. To address this issue, a number studies have been proposed to offload using delay-tolerant (DTNs) opportunistically formed by devices. These off-loading schemes rely on assumption small-size content, which can be entirely transmitted over single DTN contact. However, such an assumption, was probably valid in past, no longer hold increasing popularity...
LLM-based (Large Language Model) fuzz driver generation is a promising research area. Unlike traditional program analysis-based method, this text-based approach more general and capable of harnessing variety API usage information, resulting in code that friendly for human readers. However, there still lack understanding regarding the fundamental issues on direction, such as its effectiveness potential challenges. To bridge gap, we conducted first in-depth study targeting important using LLMs...
Radio spectrum underutilization and energy inefficiency become urgent bottleneck problems to the sustainable development of wireless technologies. The research philosophies communications have been shifted from balancing reliability-efficiency tradeoff in link level seeking spectrum-energy efficiency network level. Global efficient designs attract significant attention improving utilization efficiency, wherein cognitive radio networks scavenging related techniques are particular interests....
Industrial control system (ICS) devices play a crucial role in critical infrastructures, such as power grid. In recent years, numerous ICS are accessible on the Internet, resulting potential security issues. However, there is lack of deep understanding these devices' characteristics cyberspace. this paper, we take first step direction by investigating visible Internet. Because nature ICSs, detection online should be done nonintrusive and timely manner. We analyze 17 industrial protocols...
Protocol reverse engineering can be applied to various security applications, including fuzzing, malware analysis, and intrusion detection. It aims acquire an unknown protocol's format, semantic, behavior specifications, where format extraction is the primary task. One subset of mainstream research utilizes network traffic for analysis. These approaches leverage algorithms, such as multiple sequence alignment, frequent itemset mining, information entropy extract from messages. However, they...
Vehicular Ad Hoc Network (VANET) is a special application of Mobile Networks in road traffic, which can autonomously organize networks without infrastructure. VANET that consists many community nodes characterized by lack guaranteed connectivity. The right operation such network requires to cooperate on the level packet forwarding. When node wants transmit message another node, be opportunistically routed through relay under hypothesis each willing participate forward. However, belonging...