Feng Chen

ORCID: 0000-0002-9054-6570
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Adaptive Filtering Techniques
  • Target Tracking and Data Fusion in Sensor Networks
  • Blind Source Separation Techniques
  • Advanced Image and Video Retrieval Techniques
  • Distributed Sensor Networks and Detection Algorithms
  • Complex Network Analysis Techniques
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Energy Efficient Wireless Sensor Networks
  • Sparse and Compressive Sensing Techniques
  • Caching and Content Delivery
  • Software Testing and Debugging Techniques
  • Distributed Control Multi-Agent Systems
  • Speech and Audio Processing
  • 3D Printing in Biomedical Research
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Advanced Software Engineering Methodologies
  • Network Security and Intrusion Detection
  • Optical measurement and interference techniques
  • Software System Performance and Reliability
  • Chaos control and synchronization
  • Video Surveillance and Tracking Methods
  • Neural Networks Stability and Synchronization
  • Data Mining Algorithms and Applications

Southwest University
2016-2025

Ministry of Agriculture and Rural Affairs
2025

South China University of Technology
2012-2024

State Key Laboratory of Silkworm Genomic Biology
2023

Hunan University of Technology
2023

Xiangtan University
2023

Xizang Minzu University
2023

Hefei University
2022-2023

Nanjing University
2023

Neusoft (China)
2022

Flash Memory based Solid State Drive (SSD) has been called a "pivotal technology" that could revolutionize data storage systems. Since SSD shares common interface with the traditional hard disk drive (HDD), both physically and logically, an effective integration of into hierarchy is very important. However, details hardware implementations tend to be hidden behind such narrow interfaces. In fact, since sophisticated algorithms are usually, necessity, adopted in controller firmware, more...

10.1145/1555349.1555371 article EN 2009-06-15

Flash memory based solid state drives (SSDs) have shown a great potential to change storage infrastructure fundamentally through their high performance and low power. Most recent studies mainly focused on addressing the technical limitations caused by special requirements for writes in flash memory. However, unique merit of an SSD is its rich internal parallelism, which allows us offset most part loss related significantly increasing data processing throughput. In this work we present...

10.1109/hpca.2011.5749735 article EN 2011-02-01

Although Flash Memory based Solid State Drive (SSD) exhibits high performance and low power consumption, a critical concern is its limited lifespan along with the associated reliability issues. In this paper, we propose to build Content-Aware Translation Layer (CAFTL) enhance endurance of SSDs at device level. With no need any semantic information from host, CAFTL can effectively reduce write traffic flash memory by removing unnecessary duplicate writes also substantially extend available...

10.5555/1960475.1960481 article EN File and Storage Technologies 2011-02-15

We propose an object tracking algorithm that learns a set of appearance models for adaptive discriminative representation. In this paper, is posed as binary classification problem in which the correlation and class labels from foreground background modeled by partial least squares (PLS) analysis, generating low-dimensional feature subspace. As temporally correlated likely to repeat over time, we learn adapt multiple with PLS analysis robust tracking. The proposed exploits both ground truth...

10.1109/tip.2012.2205700 article EN IEEE Transactions on Image Processing 2012-06-22

With the explosion of software size, checking conformance implementation to specification becomes an increasingly important but also hard problem. Current practice based on ad-hoc testing does not provide correctness guarantees, while highly confident traditional formal methods like model and theorem proving are still too expensive become common practice. In this paper we present a paradigm for combining with implementation, called monitoring-oriented programming (MoP), providing...

10.1016/s1571-0661(04)81045-4 article EN Electronic Notes in Theoretical Computer Science 2003-10-01

10.1016/j.cnsns.2009.10.001 article EN Communications in Nonlinear Science and Numerical Simulation 2009-10-09

DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets victim. But most current DRDoS detection mechanisms are associated specific protocols and cannot be used for unknown protocols. It is found that because being stimulated by same attacking flow, responsive flows from reflectors have inherent...

10.1109/lcomm.2012.121912.122257 article EN IEEE Communications Letters 2013-01-01

In cooperative localization for autonomous underwater vehicles (AUVs), the practical stochastic noise may be heavy-tailed, and nonstationary distributed because of acoustic speed variation, multipath effect channel, changeable environment. To address such noise, a novel heavy-tailed mixture (HTM) distribution is first proposed in this article, then expressed as hierarchical Gaussian form by employing categorical auxiliary vector. Based on that, HTM based robust Kalman filter proposed, where...

10.1109/tii.2020.3015001 article EN IEEE Transactions on Industrial Informatics 2020-08-14

Event forecasting in Twitter is an important and challenging problem. Most existing approaches focus on temporal events (such as elections sports) do not consider spatial features their underlying correlations. In this paper, we propose a generative model for spatiotemporal event Twitter. Our characterizes the development of future by jointly modeling structural contexts burstiness. An effective inference algorithm developed to train parameters. Utilizing trained model, alignment likelihood...

10.1137/1.9781611974010.108 article EN 2015-06-30

Network intrusion detection is one of the hottest and most difficult issues in field network security. K-nearest neighbor technique a kind lazy classification algorithm which has been successfully applied to detection. However, with increase characteristic dimensions data, performance significantly reduced. Considering that tree-seed algorithm(TSA)has good ability reducing feature redundancy, it can be used In paper, algorithm(TSA) introduced extract effective input KNN for classification. A...

10.1109/idaacs-sws.2018.8525522 article EN 2018-09-01

We propose an I/O classification architecture to close the widening semantic gap between computer systems and storage systems. By classifying I/O, a system can request that different classes of data be handled with policies. Specifically, when is first initialized, we assign performance policies predefined classes, such as filesystem journal. Then, online, include classifier each command (e.g., SCSI), thereby allowing enforce associated policy for it receives.

10.1145/2043556.2043563 article EN 2011-10-23

Evolving networks have always been studied a lot featuring the dynamic properties of real-life networks. Studying mechanism growth and death network is great significance to modeling. Identical many models focused on growing process, in this article, we study decreasing process thoroughly. A novel evolving model considering established based queueing system. Focused degreasing originally investigate two strategies vertex deleting that are brutal strategy heritable which characterizes...

10.1109/tsmc.2022.3149596 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2022-02-14

Cells with various structures and proteins naturally come together to cooperate in vivo. This study used cell spheroids cultured agarose micro-wells as a 3D model the movement of cells or toward other spheroids. The formation dynamics tumor interactions two batches were studied. results showed that concave bottom micro-well (diameter: 2 mm, depth: mm) prepared from 3% could be interaction cells. initial numbers 5 × 103 cells/well 6 104 all form after 3 days incubation. Adding second batch DU...

10.3390/ijms241511967 article EN International Journal of Molecular Sciences 2023-07-26

Analysis of execution traces plays a fundamental role in many program analysis approaches, such as runtime verification, testing, monitoring, and specification mining. Execution are frequently parametric, i.e., they contain events with parameter bindings. Each parametric trace usually consists meaningful slices merged together, each slice corresponding to one binding. This gives semantics-based solution analysis. A general-purpose slicing technique is introduced, which takes event the...

10.2168/lmcs-8(1:9)2012 article EN cc-by Logical Methods in Computer Science 2012-02-23
Coming Soon ...