- Cryptography and Data Security
- Wireless Communication Security Techniques
- Blockchain Technology Applications and Security
- Chaos-based Image/Signal Encryption
- Privacy-Preserving Technologies in Data
- Advanced Steganography and Watermarking Techniques
- Cloud Data Security Solutions
- Landslides and related hazards
- Digital Media Forensic Detection
- Advanced Wireless Communication Technologies
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Advanced Malware Detection Techniques
- Advanced Authentication Protocols Security
- Quantum Computing Algorithms and Architecture
- IoT and Edge/Fog Computing
- Cryospheric studies and observations
- Security and Verification in Computing
- Mobile Ad Hoc Networks
- Energy Harvesting in Wireless Networks
- Adversarial Robustness in Machine Learning
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Energy Efficient Wireless Sensor Networks
- Quantum Information and Cryptography
- Wireless Signal Modulation Classification
Southeast University
2014-2025
Chang'an University
2019-2024
Purple Mountain Laboratories
2020-2024
Shanghai Electric (China)
2024
Quzhou College of Technology
2023
Beijing University of Posts and Telecommunications
2023
Southeast University
2023
Institute of Biophysics
2022
Hebei University of Technology
2022
Shanghai University
2021
For data collection in large-scale wireless sensor networks (WSNs), dynamic clustering provides a scalable and energy-efficient solution, which uses cluster head (CH) rotation range assignment algorithms to balance the energy consumption. Nevertheless, most existing works consider routing as two isolated issues, is harmful connectivity efficiency of network. In this paper, we provide detailed analysis on relations between routing, then propose joint (JCR) protocol for reliable efficient WSN....
Planetary gearbox is applied more and extensively in the modern industry. Its condition directly determines availability operation safety of machinery system that utilizes it for power transmission. To enhance its reliability, an early fault detection method proposed this study, which based on acoustic emission (AE) technique improved variational mode decomposition (VMD). AE data are expected to contain valuable information about than vibration data. Mutual used determine layer can avoid...
Physical layer key generation (PLKG) is a promising technique to establish symmetric keys between resource-constrained legitimate users. However, PLKG suffers from low rate in harsh environments where channel randomness limited. To address the problem, reconfigurable intelligent surfaces (RISs) are introduced reshape channels by controlling massive reflecting elements, which can provide more diversity. In this paper, we design probing protocol fully extract cascaded channel, i.e., through...
We propose a key generation protocol with the aid of reconfigurable intelligent surface (RIS) to boost secret rate (SKR) in quasi-static environments. Considering passive eavesdropper, we derive closed-form expression lower and upper bounds SKR. Our findings indicate SKR is determined by number RIS elements, correlation coefficient, pilot length quality reflecting channel. fully exploits randomness from direct channel Monte Carlo simulations validate analytical demonstrate our outperforms...
Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique, which exploits the hardware characteristics of RF front-end as identifiers. The receiver impairments interfere with feature extraction transmitter impairments, but their effect and mitigation have not been comprehensively studied. In this paper, we propose a receiver-agnostic RFFI system by employing adversarial training to learn receiver-independent features. Moreover, when there are multiple...
In network-connected UAV (NC-UAV) communication systems, user authentication is replaced by platform identity and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation (DAA) an attractive cryptographic scheme that provides elegant balance between anonymity. However, of the low-level computing capability limited transmission bandwidth in UAV, existing DAA schemes not suitable for NC-UAV systems. this paper, we propose enhanced with mutual...
Public clouds have drawn increasing attention from academia and industry due to their high computational storage performance. Attribute-based encryption (ABE) is the most promising technology simultaneously achieve confidentiality fine-grained access control of cloud-stored data. However, traditional ABE that relies on centralized authority faces several key management issues, such as escrow, distribution, tracking, update, heavy communication computing overhead for users, which will cause...
Landslide inventory mapping (LIM) is a key prerequisite for landslide susceptibility evaluation and disaster mitigation. It aims to record the location, size, extent of landslides in each map scale. Machine learning algorithms, such as support vector machine (SVM) random forest (RF), have been increasingly applied detection using remote sensing images recent decades. However, their limitations impeded wide application. Furthermore, despite widespread use deep algorithms sensing, LIM, are...
Landslides pose a significant hazard to lives and property worldwide. Understanding the triggering factors of landslides provides essential information for mitigation. While much research has focused on effects precipitation, underground mining, water level changes, earthquakes landslides, there remains gap in understanding impact long-term subtle tectonic interseismic motion, particularly over large-scale areas. Interferometric Synthetic Aperture Radar (InSAR) is widely used landslide...
The occurrence of collapses and landslides due to underground mining has its unique failure mechanism, especially in the Karst mountainous regions China. Spaceborne airborne remote sensing observations provide rapid effective tools for assessing surface changes monitoring deformation such landslides. In this study, we take Jianshanying landslide, a typical mining-induced fast-deformed as an example, reveal mechanism landslide by investigating historical displacement. First, complete...
The present study aimed to investigate the association between excision repair cross-complementation group 1 (ERCC1) expression and clinical resistance platinum‑based chemotherapy or characteristics, including survival time, in patients with epithelial ovarian cancer (EOC). ERCC1 was determined by immunohistochemical staining 92 tumor specimens from EOC. effect of on progression‑free time (PFS) overall (OS), its investigated Kaplan‑Meier analysis, Cox regression analysis χ2 test. Of EOC,...