Tongxin Li

ORCID: 0000-0002-9806-8964
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mycobacterium research and diagnosis
  • Tuberculosis Research and Epidemiology
  • Smart Grid Energy Management
  • Electric Vehicles and Infrastructure
  • Advanced Malware Detection Techniques
  • Advanced Bandit Algorithms Research
  • Photoacoustic and Ultrasonic Imaging
  • Optical Imaging and Spectroscopy Techniques
  • Advanced Battery Technologies Research
  • Advanced Control Systems Optimization
  • Security and Verification in Computing
  • Energy, Environment, Economic Growth
  • Diagnosis and treatment of tuberculosis
  • Spam and Phishing Detection
  • Sparse and Compressive Sensing Techniques
  • Optimization and Search Problems
  • Auction Theory and Applications
  • Machine Learning and Algorithms
  • Meteorological Phenomena and Simulations
  • Network Security and Intrusion Detection
  • Reinforcement Learning in Robotics
  • Climate variability and models
  • Digital and Cyber Forensics
  • Privacy, Security, and Data Protection
  • Cooperative Communication and Network Coding

Tianjin University of Commerce
2023-2024

Chongqing Public Health Medical Center
2019-2024

Air Force Medical University
2024

Xijing Hospital
2024

National Clinical Research Center for Digestive Diseases
2024

Chinese University of Hong Kong, Shenzhen
2023-2024

Ministry of Agriculture and Rural Affairs
2024

Zhejiang University
2022-2024

Fujian University of Technology
2024

Yahoo (United Kingdom)
2024

We are releasing ACN-Data, a dynamic dataset of workplace EV charging which currently includes over 30,000 sessions with more added daily. In this paper we describe the dataset, as well some interesting user behavior it exhibits. To demonstrate usefulness present three examples, learning and predicting using Gaussian mixture models, optimally sizing on-site solar generation for adaptive electric vehicle charging, to smooth net demand Duck Curve.

10.1145/3307772.3328313 article EN 2019-06-13

This paper presents a novel and practical data-driven approach to sub-optimally allocate charging stations for electric vehicles (EVs) in an early-stage setting. Specifically, we investigate the following problem: For city with limited budget public EV infrastructure construction, where should be deployed order promote transition of EVs from traditional cars? We develop <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math...

10.1109/tii.2023.3245633 article EN IEEE Transactions on Industrial Informatics 2023-02-16

The prevalent usage of runtime packers has complicated Android malware analysis, as both legitimate and malicious apps are leveraging packing mechanisms to protect themselves against reverse engineer.Although recent efforts have been made analyze particular techniques, little done study the unique characteristics packers.In this paper, we report first systematic on mainstream packers, in an attempt understand their security implications.For purpose, developed DROIDUNPACK, a whole-system...

10.14722/ndss.2018.23296 article EN 2018-01-01

Abstract Background It is worrisome that several pollutants can enhance the abundance of antibiotic resistance genes (ARGs) in environment, including agricultural fungicides. As an important bioindicator for environmental risk assessment, earthworm still a neglected focus effects fungicide carbendazim (CBD) residues on gut microbiome and resistome are largely unknown. In this study, Eisenia fetida was selected to investigate CBD soil-earthworm systems using shotgun metagenomics qPCR methods....

10.1186/s40168-022-01261-8 article EN cc-by Microbiome 2022-04-18

Virtual function calls are one of the most popular control-flow hijack attack targets.Compilers use a virtual pointer table, called VTable, to dynamically dispatch calls.These VTables read-only, but pointers them not.VTable reside in objects that writable, allowing attackers overwrite them.As result, can divert and launch VTable hijacking attacks.Researchers have proposed several solutions protect calls.However, they either incur high performance overhead or fail defeat some attacks.In this...

10.14722/ndss.2016.23164 article EN 2016-01-01

Telecommunication fraud has continuously been causing severe financial loss to telecommunication customers in China for several years. Traditional approaches detect frauds usually rely on constructing a blacklist of telephone numbers. However, attackers can simply evade such detection by changing their numbers, which is very easy achieve through VoIP (Voice over IP). To solve this problem, we from the contents call instead caller's number. Particularly, collect descriptions news reports and...

10.1186/s42400-018-0008-5 article EN cc-by Cybersecurity 2018-08-31

Carbon dioxide (CO2) is one of the main causes global warming. Scientists have found that photocatalytic conversion CO2 using visible light can not only reduce emissions and thus mitigate rise concentration in atmosphere but also produce high-value compounds fuels, such as CH4, CO, HCOOH, CH3OH. TiO2-based modified materials advantages high performance good chemical stability, so they broad application potential field photocatalysis. So far, a lot research has been done on way reaction...

10.1021/acs.energyfuels.4c00203 article EN Energy & Fuels 2024-04-22

Water infrastructures are essential for drinking water supply, irrigation, fire protection, and other critical applications. However, pumping systems, which key to transporting the point of use, consume significant amounts energy emit millions tons greenhouse gases annually. With wide deployment digital meters sensors in these infrastructures, Machine Learning (ML) has potential optimize supply control reduce gas emissions. Nevertheless, inherent vulnerability ML methods terms worst-case...

10.48550/arxiv.2501.14232 preprint EN arXiv (Cornell University) 2025-01-23

We consider a new group testing model wherein each item is binary random variable defined by an priori probability of being defective. assume that small and items are independent, but not necessarily identically distributed. The goal algorithms to identify with high the subset defectives via non-linear (disjunctive) measurements. Our main contributions two classes algorithms: (1) adaptive tests based either on maximum entropy principle, or Shannon-Fano/Huffman code; (2) non-adaptive...

10.1109/isit.2014.6875253 preprint EN 2014-06-01

Abstract Objectives Recently, the definition of extensively drug-resistant TB (XDR-TB) has been revised. In this study, we conducted a descriptive and retrospective study to determine prevalence XDR-TB in Chinese multidrug-resistant (MDR-TB) cohort. Methods Broth microdilution method was performed vitro susceptibilities Mycobacterium tuberculosis (MTB) isolates (FQs), bedaquiline (BDQ) linezolid (LZD). The putative drug target genes conferring resistance were screened by DNA sequencing....

10.1186/s13756-021-00995-8 article EN cc-by Antimicrobial Resistance and Infection Control 2021-08-26

Push messaging is among the most important mobile-cloud services, offering critical supports to a wide spectrum of mobile apps. This service needs coordinate complicated interactions between developer servers and their apps in large scale, making it error prone. With its importance, little has been done, however, understand security risks service. In this paper, we report first analysis on those push-messaging which reveals pervasiveness subtle yet significant flaws them, affecting billions...

10.1145/2660267.2660302 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

As a critical feature for enhancing user experience, cross-app URL invocation has been reported to cause unauthorized execution of app components. Although protection already put in place, little done understand the security risks navigating an app's WebView through URL, legitimate need displaying UI during interactions. In our research, we found that current design such cross-WebView navigation actually opens door remote infection, allowing adversary spread malicious web content across...

10.1145/3133956.3134021 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

We introduce and study a general version of the fractional online knapsack problem with multiple knapsacks, heterogeneous constraints on which items can be assigned to knapsack, rate-limiting assignment knapsacks. This generalizes variations one-way trading that have previously been treated separately, additionally finds application real-time control electric vehicle (EV) charging. new algorithm achieves competitive ratio within an additive factor one best achievable ratios for matches or...

10.1145/3428336 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2020-11-30

To investigate the prevalence and molecular characterization of bedaquiline resistance among MDR-TB isolates collected from Chongqing, China.A total 205 were Chongqing Tuberculosis Control Institute between March 2019 June 2020. The MICs BDQ determined by microplate alamarblue assay. All strains genotyped melting curve spoligotyping, subjected to WGS.Among MDR isolates, rate was 4.4% (9/205). 55 (26.8%) male patients 50 (24.4%) new cases. Furthermore, 81 (39.5%) these exhibited lung...

10.1186/s12941-023-00568-0 article EN cc-by Annals of Clinical Microbiology and Antimicrobials 2023-02-28

On modern operating systems, applications under the same user are separated from each other, for purpose of protecting them against malware and compromised programs. Given complexity today's OSes, less clear is whether such isolation effective different kind cross-app resource access attacks (called XARA in our research). To better understand problem, on less-studied Apple platforms, we conducted a systematic security analysis MAC OS~X iOS. Our research leads to discovery series high-impact...

10.1145/2810103.2813609 article EN 2015-10-06

With the popularity of today's usability-oriented designs, dubbed Zero Configuration or ZeroConf, unclear are security implications these automatic service discovery, "plug-and-play" techniques. In this paper, we report first systematic study on issue, focusing features systems related to Apple, major proponent ZeroConf Our research brings light a disturbing lack consideration in systems' designs: frameworks Apple platforms, including Core Bluetooth Framework, Multipeer Connectivity and...

10.1109/sp.2016.45 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2016-05-01

The mushrooming of distributed energy resources turns end-users from passive price-takers to active market-participants. To manage massive proactive efficiently, virtual power plant (VPP) as an innovative concept emerges. It can provide some necessary information help consumers improve their profits and trade with the electricity market on behalf them. One important desired by is prediction renewable outputs inside this VPP. Presently, most VPPs run in a centralized manner, which means VPP...

10.1109/tpwrs.2020.3035174 article EN IEEE Transactions on Power Systems 2020-11-02

The widespread deployment of distributed renewable energy sources and electric vehicles can help mitigate climate crisis. This necessitates new business models in the power sector to hedge against uncertainties while imposing a strong coupling between connected transportation networks. To address these challenges, this paper first proposes an sharing mechanism considering AC network constraints encourage local exchange system. Under proposed mechanism, all prosumers play generalized Nash...

10.1109/tte.2024.3398988 article EN IEEE Transactions on Transportation Electrification 2024-05-09

There are multiple discharges in one breakdown during a lightning incident. A incident usually contains 3-5 return strokes. In this case, the will not be well simulated by first stroke. To date, single impulse current waveform has been used to simulate research on characteristics of soils, leading some differences with observations actual discharges. paper, time-delayed control technique and controlled gaps-group isolation were produce high-impulse currents discharge soil sample, while...

10.1109/tpwrd.2017.2736551 article EN IEEE Transactions on Power Delivery 2017-08-07
Coming Soon ...