- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Renal Diseases and Glomerulopathies
- Lipid metabolism and disorders
- Internet Traffic Analysis and Secure E-voting
- Network Packet Processing and Optimization
- Service-Oriented Architecture and Web Services
- Chronic Kidney Disease and Diabetes
- Advanced Memory and Neural Computing
- Semantic Web and Ontologies
- Software System Performance and Reliability
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Algorithms and Data Compression
- Asphalt Pavement Performance Evaluation
- Water Quality Monitoring Technologies
- Crystallization and Solubility Studies
- Renal and related cancers
- X-ray Diffraction in Crystallography
- Photonic and Optical Devices
- IoT and Edge/Fog Computing
- Smart Materials for Construction
- Advanced Malware Detection Techniques
- Icing and De-icing Technologies
- Security and Verification in Computing
Jilin Medical University
2025
Jilin University
2025
Dalian University of Technology
2008-2025
First Bethune Hospital of Jilin University
2025
Tsinghua University
2018-2025
Yunnan Maternal and Child Health
2025
Simon Fraser University
2024
Guangzhou Medical University
2021-2024
Guangzhou Women and Children Medical Center
2022-2024
Chengdu University of Technology
2024
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.Due increasing number of vulnerable Internet Things (IoT) devices, attackers can easily compromise large set nodes and launch highvolume DDoS from botnets.State-of-the-art defenses, however, not caught up with fast development attacks.Middlebox-based defenses achieve high performance specialized hardware; these incur cost, deploying new typically requires device upgrade.On other hand, software-based...
In this paper, we design NETHCF, a line-rate in-network system for filtering spoofed traffic. NETHCF leverages the opportunity provided by programmable switches to novel defense against IP traffic, and it is highly efficient adaptive. One key challenge stems from restrictions of computational model memory resources switches. We address decomposing HCF into two complementary components-one component data plane another control plane. also aggregate IP-to-Hop-Count (IP2HC) mapping table usage,...
A short lifetime, low phosphorescence quantum efficiency (PQE), and unstable room-temperature (RTP) in oxidants solvents are the core problems development of carbon dot (CD)-based RTP materials for anticounterfeiting applications. Herein, a series CDs/Al2O3 nanocomposites with excitation-dependent properties were fabricated by sol–gel process followed high-temperature treatment. The crystalline structure rigid Al–O network Al2O3 matrix could readily benefit stabilization triplet excited...
Gradient porous carbon has become a potential electrode material for energy storage devices, including the aqueous zinc-ion hybrid capacitor (ZIHC). Compared with sufficient studies on fabrication of ZIHCs high electrochemical performance, there is still lack in-depth understanding underlying mechanisms gradient structure storage, especially synergistic effect ultramicropores (<1 nm) and micropores (1-2 nm). Here, we report design principle used ZIHC based data-mining machine learning (ML)...
Critical-sized bone defect regeneration remains a significant clinical challenge due to the complex cascade of biological processes involved. To address this, we developed sophisticated hierarchical biomembrane (PCS@MPN10) designed modulate osteogenic microenvironment. Using coaxial electrospinning, fabricated core–shell structure with polylactic acid (PLA) as membrane base, incorporating simvastatin in core and chitosan shell. The surface was further modified tannic acid-iron...
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet. Due increasing number of vulnerable Internet Things (IoT) devices, attackers can easily compromise large set nodes and launch high-volume DDoS from botnets. State-of-the-art defenses, however, not caught up with fast development attacks. Middlebox-based defenses achieve high performance specialized hardware; these incur cost, deploying new typically requires device upgrade. On other hand,...
Software-Defined Networking (SDN) has attracted great attention from both academia and industry. However, the deployment of SDN faced some critical security issues, such as Denial-of-Service (DoS) attacks on infrastructure. One DoS attack is data-to-control plane saturation attack, where an attacker floods a large number packets to trigger massive table-misses packet-in messages in data plane. This can exhaust resources different components infrastructure, including TCAM buffer memory plane,...
Software-Defined Networking (SDN) continues to be deployed spanning from enterprise data centers cloud computing with the proliferation of various SDN-enabled hardware switches and dynamic control plane applications. However, state-of-the-art have rather limited downlink message processing capability, especially for Flow-Mod Statistic Query, which may not suffice huge need In this paper, we systematically study interactions between applications switches, present two new attacks, namely...
In this paper, we identify the opportunity of using programmable switches to improve state art in spoofed IP traffic filtering, and propose <small>NetHCF</small> , a line-rate in-network system filter traffic. One key challenge design is handle restrictions stemmed from limited computational model memory resources switches. We address by decomposing HCF scheme into two complementary parts, aggregating IP-to-Hop-Count (IP2HC) mapping table for efficient usage, designing adaptive mechanisms...
It is unclear why primary nephrotic syndrome (PNS) patients often have dyslipidemia. Recent studies shown that angiopoietin-like protein 3 (ANGPTL3) an important regulator of lipid metabolism. In this study, we explored how ANGPTL3 impacts dyslipidemia during PNS development.We measured the serum levels in (n=196). Furthermore, degree proteinuria and metabolism were examined angptl3-overexpressing transgenic (angptl3-tg) mice at different ages. Moreover, used clustered regularly interspaced...
Cloud gateways are fundamental components of a cloud platform, where various network functions (e.g., L4/L7 load balancing, address translation, stateful firewall, and SYN proxy) deployed to process millions connections billions packets. Providing high-performance failure-resilient packet processing with scalable traffic management mechanism is crucial ensuring the quality service provider, hence great importance. Many nowadays implemented in software commodity servers for low cost high...
We have developed a self-powered near-infrared photodetector (PD) with high detectivity using tensile strained Ge layer capped thick Si layer. The acts as stressor and maintains the strain of minimal dislocations by creating rough surface. By Raman spectroscopy, we confirmed that has 1.83% in-plane strain. PD exhibits responsivity 0.45 A/W at -1 V bias voltage for 940 nm wavelength. PD's dark current density is low ∼1.50 × 10 −6 A/cm 2 V. result in 6.55 11 cmHz 1/2 /W. This great potential...
short-paper Free Access Share on Filtering Spoofed IP Traffic Using Switching ASICs Authors: Jiasong Bai Institute for Network Sciences and Cyberspace, Tsinghua University, Department of Computer Science Technology, Beijing National Research Center Information Technology (BNRist) (BNRist)View Profile , Jun Bi Menghao Zhang Guanyu Li Authors Info & Claims SIGCOMM '18: Proceedings the ACM 2018 Conference Posters DemosAugust Pages 51–53https://doi.org/10.1145/3234200.3234205Published:07 August...
Modern traffic analysis applications are usually designed to identify malicious behaviors by inferring sensitive information with machine learning (ML) techniques from network traffic, and they of great importance security the growing use encryption other evasion that make classic content-based infeasible. However, soaring throughput networks reaching hundreds Gbps, it becomes more challenging for keep up today's high-speed large-volume traffic. In particular, existing feature extractor...
Multi-string pattern matching is a crucial building block for many network security applications and thus of great importance. Since every byte packet has to be inspected by large set patterns, it often becomes bottleneck these dominates the performance an entire system. Many existing studies have been devoted alleviating this either algorithm optimization or hardware acceleration. However, neither one provides desired scalability costs that keep pace with drastic increase in bandwidth...
We demonstrate the fabrication of ultrahigh quality ( Q ) factor silica microdisk resonators on a silicon chip by inductively coupled plasma (ICP) etching. achieve dry-etched optical microresonator with an intrinsic as high <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="m1"> <mml:mrow> <mml:mn>1.94</mml:mn> <mml:mo>×</mml:mo> <mml:msup> <mml:mn>10</mml:mn> </mml:mrow> <mml:mn>8</mml:mn> </mml:msup> </mml:math> from 1-mm-diameter thickness 4 μm. Our work...
To study the value of shear wave elasticity and dispersion imaging to evaluate viscoelasticity renal parenchyma in children with glomerular diseases.Forty-three diseases were prospectively evaluated by (SWE) (SWD); 43 healthy volunteers served as control group. The velocities (SWV) slopes measured at upper, middle, lower poles both kidneys. analysis mean SWV slope patient groups was used further SWE SWD disease.The disease higher than that group (1.61 ± 0.09 m/s vs. 1.43 0.07 m/s, p <...