- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Network Traffic and Congestion Control
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Complex Network Analysis Techniques
- Energy Harvesting in Wireless Networks
- Cooperative Communication and Network Coding
- Anomaly Detection Techniques and Applications
- IoT and Edge/Fog Computing
- Interconnection Networks and Systems
- Software-Defined Networks and 5G
- Blind Source Separation Techniques
- Advanced MIMO Systems Optimization
- Advancements in Battery Materials
- Advanced Graph Neural Networks
- Cloud Computing and Resource Management
- Cryptography and Data Security
- Caching and Content Delivery
- Sparse and Compressive Sensing Techniques
- Recommender Systems and Techniques
- Data Stream Mining Techniques
- Remote Sensing and Land Use
- IoT Networks and Protocols
Hebei Medical University
2022-2025
State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering
2023-2025
Nanjing Hydraulic Research Institute
2023-2025
Hubei University
2025
Tsinghua University
2022-2024
Foxconn (China)
2022-2024
Griffith University
2018-2024
North Minzu University
2023-2024
Lanzhou University of Technology
2024
Institute of Modern Physics
2024
The fusion of hyperspectral and LiDAR data has been an active research topic. Existing methods have ignored the high-dimensionality redundancy challenges in images, despite that band selection intensively studied for image (HSI) processing. This paper addresses this significant gap by introducing a cross-attention mechanism from transformer architecture HSI bands guided data. provides high-resolution vertical structural information, which can be useful distinguishing different types land...
Niobium surfaces are commonly electropolished in an effort to obtain optimal smoothness for high-field superconducting radio-frequency cavity applications. We report the use of controlled electrochemical analysis techniques characterize electropolishing Nb a sulfuric and hydrofluoric acid electrolyte. Through reference electrode, we able clearly distinguish anode cathode polarization potentials as well electrolyte voltage drop, which together sum applied power supply voltage. then identify...
The use of a Traffic Matrix (TM) to describe the characteristics global network has attracted significant interest in performance research. Due high dimensionality and sparsity traffic, Principal Component Analysis (PCA) been successfully applied TM analysis. PCA is one most common methods used analysis high-dimensional objects. This paper shows how apply anomaly detection. experiment results demonstrate that PCA-based method can detect anomalies for both single multiple nodes with accuracy...
Abstract This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure set infrastructure components distributed area due to damage sustained, while other outside do not directly fail. These can be regarded special intentional attack, such bomb or explosive assault, generalized modeling impact natural hazards on large‐scale systems. introduces three SLFs models: node centered SLFs,...
Mobile edge computing (MEC) integrated with wireless power transfer (WPT) has became a promising trend to shorten task delay and prolong battery life of devices (WDs). Introducing the relay technique WPT-MEC system can improve offloading capability energy efficiency, particularly in scenarios poor channel conditions between server WDs. In this paper, we focus on maximizing efficiency (EE) multi-user relay-aided system. The joint optimization configuration relay, charge time fraction,...
The coexistence of macro eNodeBs and the additional low power nodes (LPNs) may lead to much higher interference in LTE-Advanced Heterogeneous Networks (HetNets). In Macro Pico scenario, Range Extension (RE) is a promising scheme utilize LPN resources more effectively improve cell edge performance. However, it introduce if bias value not properly set. this paper, an adaptive configuration strategy for RE proposed. strategy, set adaptively according environment variability, which contains...
Abstract Conventional deformable wheel systems in robots and other mechatronic face significant challenges achieving miniaturization, intelligence, integration. To address these issues, we propose a novel integrated structural design method 4D printing strategy for wheels capable of shaping among multiple programmable direct-driven deformation configurations. The load-bearing capability the printed is enhanced by utilizing deformed components various locations actuated states. Additionally,...
Leakage is the most common issue encountered in earth–rock dam projects, with characteristics of strong concealment initial stage and rapid development significant threat later stage. For a accurate detection leakage dams, this paper introduces an infrared thermal imaging technology by fully considering correlation between temperature. The principle behind application for noncontact water dams was expounded. Based on theory flow–heat coupling combined numerical simulation test under effects...
Topology is important for any type of networks because it has great impact on the performance network. For wireless sensor (WSN), regular topologies, which can help to efficiently save energy and achieve long networking lifetime, have been well studied in [1, 4, 5, 7, 9]. However, little work focused routing patterned WSNs except shortest path with knowledge global location information. In this paper, we propose a protocol based random walk. It doesn’t require Moreover, walk achieves load...
The “low, slow, and small” target (LSST) poses a significant threat to the military ground unit. It is hard defend against due its invisibility numerous detecting devices. With onboard deep learning-based object detection methods, intelligent LSST (ILSST) can find detect unit autonomously in denied environment. This paper proposes an adversarial patch-based defending method blind ILSST by attacking network. First, influence score was established indicate of noise on objects. Then, based this...
A Structural Hole Spanner (SHS) is a set of nodes in network that act as bridge among different otherwise disconnected communities. Numerous solutions have been proposed to discover SHSs generally require high run time on large-scale networks. Another challenge discovering across types networks for which the traditional one-model-fit-all approach fails capture inter-graph difference, particularly case diverse Therefore, there an urgent need developing effective and Inspired by recent...
Abstract Lithium‐ion batteries (LIBs) have gained widespread attention due to their numerous advantages, including high energy density, prolonged cycle life, and environmental friendliness. Nevertheless, electrochemical performance deteriorates rapidly under extreme temperature conditions, accompanied by a series of safety issues. Electrolyte optimization has emerged as crucial feasible strategy expand the operational range LIBs. This review comprehensively summarizes challenges, advances,...
Steganography, as one of alternative techniques for secure communications, has drawn more and attentions. This paper presents a covert communication model based on least significant bits (LSB) steganography in Voice over IP (VoIP). The aims at providing nice security secret messages real-time performance that is vital VoIP. Therefore, we employ simple encryption before embedding them. strikes good balance between adequate short-term protection low latency Furthermore, design structure...