- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Adversarial Robustness in Machine Learning
- Software Reliability and Analysis Research
- Software Engineering Research
- Software Testing and Debugging Techniques
- Wireless Signal Modulation Classification
- Target Tracking and Data Fusion in Sensor Networks
- Wireless Communication Security Techniques
- IoT Networks and Protocols
- Cooperative Communication and Network Coding
- Security in Wireless Sensor Networks
- Caching and Content Delivery
- Age of Information Optimization
- Digital Media Forensic Detection
- Advanced Wireless Communication Technologies
- Radar Systems and Signal Processing
- Multi-Criteria Decision Making
- Direction-of-Arrival Estimation Techniques
- Advanced Electrical Measurement Techniques
- Wireless Body Area Networks
- Green IT and Sustainability
- Spam and Phishing Detection
National University of Defense Technology
2018-2024
Henan University of Technology
2021-2024
China University of Petroleum, Beijing
2021-2024
Human Media
2023
Shandong Academy of Sciences
2023
Qilu University of Technology
2023
Huazhong University of Science and Technology
2023
École de management de Normandie
2021
Université Le Havre Normandie
2021
Sichuan University
2016
With more computational intensive applications deployed involving mobile edge computing (MEC), the collaboration among devices, and cloud servers becomes an effective mechanism to fully utilize all available distributed resources. However, two main challenges have yet be addressed enable this three-way for securing necessary resources further guaranteeing quality of service (QoS) task handling. The first challenge is related partitioning application into several dependent subtasks schedule...
Multiaccess edge computing (MEC) provides services for resource-sensitive and delay-sensitive Internet of Things (IoT) applications by extending the capabilities cloud to networks. However, high mobility IoT devices (e.g., vehicles) limited resources servers (ESs) affect service continuity access latency. Service migration reasonable resource (re-)allocation consequently become needed ensure Quality (QoS). results in additional In addition, different mobile users have requirements allocation...
It is a tough problem to jointly detect and track weak target, it becomes even more challenging when the target maneuvering. The above formulated by using Bayesian theory multiple model (MM) based filter proposed. presented uses MM method accommodate motions that maneuvering may travel under adding random variable representing motion state. To strengthen efficiency performance of filter, existence separated from state probability calculated in efficient way. examine approach, typical...
Joint detection and tracking weak target is a challenging problem whose complexity intensified when there are multiple targets present at the same time. Some Probability Hypothesis Density (PHD) based track-before-detect (TBD) particle filters (PHD-TBD) proposed to solve this issue; however, performance unsatisfactory especially number of large because some assumptions in PHD violated. We propose modify general PHD-TBD filter two aspects make processing available for TBD scenarios. First,...
Humanity's burgeoning crewed and uncrewed presence in space is creating increasing opportunity for ideas approaches gestated terrestrial use to be adapted deployed applications. To illustrate this from the perspective of Pervasive Community, article overviews a selection recent ongoing space-oriented projects MIT Media Lab's Responsive Environments Group, chronicles roots that most them had our prior Computing research program. These involve wearables, smart fabrics, sensor networks,...
In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in dynamic or static feature space. Aiming at this problem, an integrative extraction algorithm based on simhash was proposed, which combines information e.g., API (Application Programming Interface) calls (such as file, registry network behaviors) of samples to form features. The experiment extracts features some information, then compares classification, time...
Adversarial examples have aroused great attention during the past years owing to their threat deep neural networks (DNNs). Recently, they been successfully extended video models. Compared with image cases, sparse adversarial perturbations in videos can not only reduce computation complexity, but also guarantee crypticity of examples. In this paper, we propose an efficient attack generate large sparsity both temporal (inter-frames) and spatial (intra-frames) domains. Specifically, select key...
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods AE generation use two optimization models: (1) taking successful attack as objective function and limiting perturbations constraint; (2) minimum target constraint. These all involve fundamental problems AEs: boundary constructing AEs whether that is reachable. The reachability means models exist equal to boundary. Previous have no complete answer problems....
  The precise point positioning (PPP) timing service has been proposed in recent years and demonstrated to achieve sub-nanosecond accuracy. As an integral part of BDS-3, the PPP services via b2b signals (hereafter referred as PPP-B2b) are provided by BDS-3 GEO satellites with better than decimeter-level accuracy for users around China. In this research, a high-precision receiver based on PPP-B2b established, which obtains local clock offset respect Beidou Time (BDT) through time...
Due to the explosive growth of software quantity and mixed ability developers, a large number defects emerge during later stages maintenance. The search method based on genetic programming is one most popular in algorithms, but it also has some issues. single-objective approach validate select offspring patches without considering other constraints can affect efficiency patch generation. To address this issue, paper proposes an automatic repair Multi-objective Genetic Programming...
Gas pipeline leakage can cause adverse social impacts such as waste of resources and environmental pollution. Existing detection methods ignore the practical problem that aging or damaged sensors affect accuracy. In this paper, we propose a method for gas using multichannel acoustic signals. We consider signals acquired by outliers. First, Local outlier factor is used to calculate degree each channel signal, channels with outliers are removed. Dynamic time warping barycenter averaging then...
The security issue on the physical layer is of significant challenge yet paramount importance for 5G communications. In some previous works, transmit power allocation has already been studied orthogonal frequency division multiplexing (OFDM) secure communication with Gaussian channel inputs both a single user and multiple users. Facing peak transmission constraints, we adopt discrete (e.g., QPSK) in practical system, instead inputs. Discrete impose more as compared conventional multiuser...
Automatic program repair is a cutting-edge research direction in software engineering recent years. The existing techniques based on genetic programming suffer from requiring verification of large number candidate patches, which consume lot computational resources. We instead propose Random search via Code Similarity automate Repair (RCSRepair). First, we use test filtering and case prioritization fault localization to reduce restructure cases. Second, combination random code similarity used...
The security issue on the physical layer is of significant challenge yet paramount importance for 5G communications. In some previous works, transmit power allocation has already been studied orthogonal frequency division multiplexing (OFDM) secure communication with Gaussian channel inputs both a single user and multiple users. Faced peak transmission constraints, we adopt discrete (e.g., equiprobable Quadrature Phase Shift Keying (QPSK) symmetry) in practical system, instead inputs....
A multitude of equipment in an identical platform causes many problems, such as the degradation system performance and increase electromagnetic interference. As a solution, integrated communication interference (ICCI) with orthogonal frequency division multiplexing (OFDM) waveform is proposed. The different limitations designing are investigated. Several numerical results given to obtain suitable modulation types.