- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Complexity and Algorithms in Graphs
- Cryptography and Residue Arithmetic
- Intelligence, Security, War Strategy
- Speech Recognition and Synthesis
- Network Security and Intrusion Detection
- Advanced Computational Techniques and Applications
- Adversarial Robustness in Machine Learning
- Occupational Health and Safety Research
- graph theory and CDMA systems
- Quantum Computing Algorithms and Architecture
- Semantic Web and Ontologies
- Natural Language Processing Techniques
- Security and Verification in Computing
- Advanced Steganography and Watermarking Techniques
- Topic Modeling
- Advanced Graph Neural Networks
- Optimization and Search Problems
- Recommender Systems and Techniques
- Speech and Audio Processing
Shandong University
2016-2025
University of Alberta
2025
Qilu Hospital of Shandong University
2025
Tsinghua University
2015-2024
China Mobile (China)
2023-2024
Anhui Business College
2024
State Key Laboratory of Cryptology
2012-2023
Beijing Sport University
2023
Shandong Institute of Metrology
2023
Shandong University of Science and Technology
2021-2022
Determining whether inputs are out-of-distribution (OOD) is an essential building block for safely deploying machine learning models in the open world. However, previous methods relying on softmax confidence score suffer from overconfident posterior distributions OOD data. We propose a unified framework detection that uses energy score. show scores better distinguish in- and samples than traditional approach using scores. Unlike scores, theoretically aligned with probability density of less...
Abstract Grounded in the interactionist paradigm, this study shows that emotional exhaustion and perceived safety climate constitute important moderators of relationship between proactive personality work performance. More specifically, analyzes its behavioural outcomes—organizational citizenship behaviour (OCB) job performance—and investigates interactive effects climate. The involves 485 Chinese airline employees including pilots, flight attendants, engineers, service employees. Proactive...
Objective: This paper presents an asynchronous electrooculography (EOG)-based human-machine interface (HMI) for smart home environmental control with the purpose of providing daily assistance severe spinal cord injury (SCI) patients. Methods: The proposed HMI allows users to interact a environment through eye blinking. Specifically, several buttons, each corresponding command, randomly flash on graphical user interface. Each buttons functions as visual cue blink. To issue can blink...
State-of-the-art Byzantine fault-tolerant (BFT) protocols assuming partial synchrony such as SBFT and HotStuff use regular certificates obtained from 2f + 1 (partial) signatures. We show that one can weak only f signatures to assist in designing more robust efficient BFT protocols. design implement two systems: Dashing (a family of HotStuff-style protocols) Star parallel framework).
In this paper, we present an improvement of the Nguyen-Vidick heuristic sieve algorithm for shortest vector problem in general lattices, which time complexity is 20.3836n polynomial computations, and space 20.2557n. new algorithm, introduce a technique with two-level instead previous one-level sieve, complete estimation by calculating irregular spherical cap covering.
In this paper, we study the robustness of graph convolutional networks (GCNs). Previous work have shown that GCNs are vulnerable to adversarial perturbation on adjacency or feature matrices existing nodes; however, such attacks usually unrealistic in real applications. For instance, social network applications, attacker will need hack into either client server change links features. propose a new type "fake node attacks" attack by adding malicious fake nodes. This is much more realistic than...
Abstract L2 teachers employ various multimodal resources, including designedly incomplete utterances (DIUs), to elicit student response in classroom interaction. Building on the work of Wang et al. (2024) , this study further investigates how Chinese-as-a-second-language (CSL) use resources responses when DIUs fail prompt a response. A two-step pattern has been observed data. First, routinely scanning gaze and body holds enhance participation while they wait for After that, interrogatives,...