- Advanced Wireless Communication Technologies
- UAV Applications and Optimization
- Direction-of-Arrival Estimation Techniques
- Advanced Malware Detection Techniques
- Web Data Mining and Analysis
- Cooperative Communication and Network Coding
- Advanced Image and Video Retrieval Techniques
- Advanced MIMO Systems Optimization
- Antenna Design and Optimization
- Wireless Communication Security Techniques
- Energy Efficient Wireless Sensor Networks
- Wireless Signal Modulation Classification
- Mobile Ad Hoc Networks
- Energy Harvesting in Wireless Networks
- Caching and Content Delivery
- Speech and Audio Processing
- Indoor and Outdoor Localization Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Adversarial Robustness in Machine Learning
- Software Testing and Debugging Techniques
- Chinese history and philosophy
- Distributed Control Multi-Agent Systems
- Advanced Data Storage Technologies
- IoT and Edge/Fog Computing
Northwestern Polytechnical University
2015-2025
China Southern Power Grid (China)
2024
Tsinghua University
2003-2023
Guizhou University of Finance and Economics
2021
Zhengzhou University
2009-2021
University of California, Santa Cruz
2018
China Telecom (China)
2004
Code reuse improves software development efficiency, however, vulnerabilities can be introduced inadvertently. Many existing works compute the code similarity based on CFGs to determine whether a binary function contains known vulnerability. Unfortunately, their performance in cross-platform search is challenged.
Wireless body area networks (WBANs), as an important part of the Internet things and sensor networks, are becoming more in health monitoring entertainment services. The nodes these applications need to transmit information data personal station receive control from adjust working modes. However, unlike easily rechargeable station, suffer energy shortages, which affect nodes' lifetimes. To solve this problem, we design a novel medium access (MAC) layer protocol enhance efficiency extend...
Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being continuously developed validation contracts, testing EVM remains challenging because special test input format absence oracles. In this paper, we propose EVMFuzzer, first tool that uses differential fuzzing technique detect EVM. The core idea generate seed feed them target benchmark EVMs, so as find many inconsistencies...
Automatic modulation recognition (AMR) plays an important role in modern wireless communication. In this letter, a novel framework for AMR is proposed. The ResNeXt network serves as the backbone, and four proposed adaptive attention mechanism modules are incorporated. time-frequency representations of received signals utilized inputs deep learning (DL) network, transfer strategy adopted based on pre-trained weakly supervised (WSL) model. comparisons with several state-of-the-art techniques...
Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being developed validation contracts, security EVM have not been well-studied. In this paper, we propose EVMFuzz, aiming detect EVMs with differential fuzz testing. The core idea EVMFuzz continuously generate seed different EVMs' execution, so as find many inconsistencies among execution results possible, eventually discover...
Fog-cloud computing is one of cores techniques in wireless networks, where fog and cloud nodes provide high-speed large-scale services to mobile users through a collaborative method. For the conventional fog-cloud schemes, abilities computation task offloading methods are main factors affecting latency energy consumption. However, when reach saturation, consumption caused by data transmission approximate those computation. In order reduce computation, this paper proposes an opportunistic...
Automatic modulation recognition (AMR) of radio signals is becoming increasingly important due to its key role in wireless communication system management, monitoring, and control. In this paper, we propose an end-to-end AMR framework based on deep learning (DL), named CCNN-Atten. First, the complex-valued convolutional neural network (CCNN) extracts features signal, feature calibration (FC) module selectively enhances suppresses irrelevant features. Then, a temporal context capture (TCC)...
It is challenging to covert communication under channel distribution information (CDI) uncertainty caused by limited feedback and rapid-changing channels. This letter investigates in uplink non-orthogonal multiple access (NOMA) systems CDI uncertainty, where a user (CU) reliable (RU) transmit messages legitimate receiver (Bob) threatened warden (Willie). RU not only transmits its public but also helps CU send private against Willie’s detection. To protect CU’s transmission with imperfect...
The rapid development of Internet Things (IoT) has triggered more security requirements than ever, especially in detecting vulnerabilities various IoT devices. widely used clone-based vulnerability search methods are effective on source code; however, their performance is limited binary search. In this article, we present IoTSeeker, a function semantic learning based approach for cross-platform binary. First, construct the graph to capture both data flow and control information encode...
Industrial Internet of Things (IIoT), regarded as an important technology for Industry 4.0, has the capability to connect massive IoT devices anywhere and at anytime in manufacturing industry. Enabling such a huge network requires message delivering among sensors, actuators, controllers, remote control be seamless reliable. However, IIoT wireless environment typically faces challenges blockage caused by obstacles. To tackle above issue, unmanned aerial vehicle (UAV) reconfigurable...
Learning-based clone detection is widely exploited for binary vulnerability search. Although they solve the problem of high time overhead traditional dynamic and static search approaches to some extent, their accuracy limited, need manually identify true positive cases among top-M results during industrial practice. This paper presents VulSeeker-Pro, an enhanced seeker that integrates function semantic emulation at back end learning, release engineers from manual identification work. It...
With the rapid proliferation of mobile wireless sensors networks (WSNs), which are widely deployed in Internet things, vehicles, and flying ad hoc networks, more researchers making effort to improve energy efficiency throughput WSNs. In recent years, many protocols have been proposed solve shortage problem. Some based on cooperative or allocation schemes, some contending others foundation hybrid schemes. However, it is still difficult simultaneously. this article, we present a novel carrier...
The sparse reconstruction techniques can improve the accuracy and resolution of direction arrival (DOA) estimation using sensor arrays. However, due to reflective objects nonidealities antennas circuitry, received signals may be coherent coupled each other in nonuniform noise environments, causing severe performance degradation signal reconstruction. In this paper, a novel sparsity-inducing DOA method is proposed adapt such challenging scenario. To mitigate noise, its power components are...
Wireless sensors network (WSN) is widely used in the Internet of Things at present. However, limited energy source a critical problem improvement and practical applications WSN, so it necessary to improve efficiency. As another important evaluation criterion transmission performance, throughput should be improved too. To mitigate both problems same time, by taking advantages Time Division Multiple Access (TDMA) Carrier Sense (CSMA) medium access control (MAC) layer we propose hybrid...
Automatic Web page segmentation is the basis to adaptive browsing on mobile devices. It breaks a large into smaller blocks, in which contents with coherent semantics are keeping together. Then, various adaptations like single column and thumbnail view can be developed. However, remains challenging task, its poor result directly yields frustrating user experience. As human usually understand well, this paper, we start from Gestalt theory, psychological theory that explain human's visual...
Opportunistic beamforming (OBF) is a promising multiple-input–multiple-output (MIMO) downlink precoding technique, where multiuser diversity gain achieved to deal with the performance loss caused by low-complexity channel estimation. Due high-performance and estimation, OBF appropriate for Internet of Things (IoT) networks. However, conventional cannot achieve satisfactory in post-disaster communication, low signal-to-noise ratio (SNR) makes it hard establish communication between base...
The performance of mobile wireless sensor networks (MWSN) witnessed a significant improvement in recent years, such as throughput, transmission delay, and collision detection. However, MWSN still suffers from high energy consumption, since most the sensors or users are based on passive devices. In order to remedy this problem, paper we present Cross-layer Energy Efficiency (CEE) model for MWSN. CEE is cross-layer which contains three layers. It utilizes nodes location information network...
Localization of the vertebrae is importance in many medical applications. For example, can serve as landmarks image registration. They also provide a reference coordinate system to facilitate localization other organs chest. In this paper, we propose new method using convolutional neural networks (CNN). The main advantage proposed removal hand-crafted features. We construct two training sets train CNNs that share same architecture. One used distinguish from tissues chest, and aimed at...
Race detection is increasingly popular, both in the academic research and industrial practice. However, there no specialized comprehensive dataset of data race, making it difficult to achieve purpose effectively evaluating race detectors or developing efficient algorithms.
Clone detection is widely exploited for software vulnerability search. The approaches based on source code analysis cannot be applied to binary clone because the same can produce significantly different binaries. In this paper, we present BinSeeker, a cross-platform seeker that integrates semantic learning and emulation. With help of labeled flow graph, BinSeeker quickly identify M candidate functions are most similar from target binary. value relatively large so procedure essentially...
Due to the flexibility, utility, and spectrum sharing capability, unmanned aerial vehicle (UAV)-enabled device-to-device (D2D) communications play an important role in space-airground integrated network (SAGIN). To further improve communication quality system performance, reconfigurable intelligent surface (RIS) can also be employed. In this paper, we consider a RIS-aided UAV-D2D system. A joint optimization problem of channel selection as well transmit power design D2D users, discrete phase...
With the development of internet things (IoT) technology and its wide application in urban traffic, next-generation vehicle-to-everything (V2X) communication network should support high-capacity, ultra-reliable, low-latency massive information exchange to provide unprecedentedly diverse user experiences. The sixth-generation (6G) mobile will pave way for realizing this vision. Reconfigurable intelligent surfaces (RISs), a critical 6G technology, is expected make big difference V2X...
Page segmentation plays a key role in browsing on small screens. It breaks large page into smaller segments according to their semantic relationships. Then, various approaches such as single column adaptation and thumbnail view with zooming links can be implemented based these segments. However, for current flexible Web pages, remains challenging task. This paper proposes an effective automatic method which combining pattern analysis visual separators. The basic idea is that page's structure...