- Mycobacterium research and diagnosis
- Tuberculosis Research and Epidemiology
- Smart Grid Energy Management
- Electric Vehicles and Infrastructure
- Advanced Malware Detection Techniques
- Advanced Bandit Algorithms Research
- Photoacoustic and Ultrasonic Imaging
- Optical Imaging and Spectroscopy Techniques
- Advanced Battery Technologies Research
- Advanced Control Systems Optimization
- Security and Verification in Computing
- Energy, Environment, Economic Growth
- Diagnosis and treatment of tuberculosis
- Spam and Phishing Detection
- Sparse and Compressive Sensing Techniques
- Optimization and Search Problems
- Auction Theory and Applications
- Machine Learning and Algorithms
- Meteorological Phenomena and Simulations
- Network Security and Intrusion Detection
- Reinforcement Learning in Robotics
- Climate variability and models
- Digital and Cyber Forensics
- Privacy, Security, and Data Protection
- Cooperative Communication and Network Coding
Tianjin University of Commerce
2023-2024
Chongqing Public Health Medical Center
2019-2024
Air Force Medical University
2024
Xijing Hospital
2024
National Clinical Research Center for Digestive Diseases
2024
Chinese University of Hong Kong, Shenzhen
2023-2024
Ministry of Agriculture and Rural Affairs
2024
Zhejiang University
2022-2024
Fujian University of Technology
2024
Yahoo (United Kingdom)
2024
We are releasing ACN-Data, a dynamic dataset of workplace EV charging which currently includes over 30,000 sessions with more added daily. In this paper we describe the dataset, as well some interesting user behavior it exhibits. To demonstrate usefulness present three examples, learning and predicting using Gaussian mixture models, optimally sizing on-site solar generation for adaptive electric vehicle charging, to smooth net demand Duck Curve.
This paper presents a novel and practical data-driven approach to sub-optimally allocate charging stations for electric vehicles (EVs) in an early-stage setting. Specifically, we investigate the following problem: For city with limited budget public EV infrastructure construction, where should be deployed order promote transition of EVs from traditional cars? We develop <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math...
The prevalent usage of runtime packers has complicated Android malware analysis, as both legitimate and malicious apps are leveraging packing mechanisms to protect themselves against reverse engineer.Although recent efforts have been made analyze particular techniques, little done study the unique characteristics packers.In this paper, we report first systematic on mainstream packers, in an attempt understand their security implications.For purpose, developed DROIDUNPACK, a whole-system...
Abstract Background It is worrisome that several pollutants can enhance the abundance of antibiotic resistance genes (ARGs) in environment, including agricultural fungicides. As an important bioindicator for environmental risk assessment, earthworm still a neglected focus effects fungicide carbendazim (CBD) residues on gut microbiome and resistome are largely unknown. In this study, Eisenia fetida was selected to investigate CBD soil-earthworm systems using shotgun metagenomics qPCR methods....
Virtual function calls are one of the most popular control-flow hijack attack targets.Compilers use a virtual pointer table, called VTable, to dynamically dispatch calls.These VTables read-only, but pointers them not.VTable reside in objects that writable, allowing attackers overwrite them.As result, can divert and launch VTable hijacking attacks.Researchers have proposed several solutions protect calls.However, they either incur high performance overhead or fail defeat some attacks.In this...
Telecommunication fraud has continuously been causing severe financial loss to telecommunication customers in China for several years. Traditional approaches detect frauds usually rely on constructing a blacklist of telephone numbers. However, attackers can simply evade such detection by changing their numbers, which is very easy achieve through VoIP (Voice over IP). To solve this problem, we from the contents call instead caller's number. Particularly, collect descriptions news reports and...
Carbon dioxide (CO2) is one of the main causes global warming. Scientists have found that photocatalytic conversion CO2 using visible light can not only reduce emissions and thus mitigate rise concentration in atmosphere but also produce high-value compounds fuels, such as CH4, CO, HCOOH, CH3OH. TiO2-based modified materials advantages high performance good chemical stability, so they broad application potential field photocatalysis. So far, a lot research has been done on way reaction...
Water infrastructures are essential for drinking water supply, irrigation, fire protection, and other critical applications. However, pumping systems, which key to transporting the point of use, consume significant amounts energy emit millions tons greenhouse gases annually. With wide deployment digital meters sensors in these infrastructures, Machine Learning (ML) has potential optimize supply control reduce gas emissions. Nevertheless, inherent vulnerability ML methods terms worst-case...
We consider a new group testing model wherein each item is binary random variable defined by an priori probability of being defective. assume that small and items are independent, but not necessarily identically distributed. The goal algorithms to identify with high the subset defectives via non-linear (disjunctive) measurements. Our main contributions two classes algorithms: (1) adaptive tests based either on maximum entropy principle, or Shannon-Fano/Huffman code; (2) non-adaptive...
Abstract Objectives Recently, the definition of extensively drug-resistant TB (XDR-TB) has been revised. In this study, we conducted a descriptive and retrospective study to determine prevalence XDR-TB in Chinese multidrug-resistant (MDR-TB) cohort. Methods Broth microdilution method was performed vitro susceptibilities Mycobacterium tuberculosis (MTB) isolates (FQs), bedaquiline (BDQ) linezolid (LZD). The putative drug target genes conferring resistance were screened by DNA sequencing....
Push messaging is among the most important mobile-cloud services, offering critical supports to a wide spectrum of mobile apps. This service needs coordinate complicated interactions between developer servers and their apps in large scale, making it error prone. With its importance, little has been done, however, understand security risks service. In this paper, we report first analysis on those push-messaging which reveals pervasiveness subtle yet significant flaws them, affecting billions...
As a critical feature for enhancing user experience, cross-app URL invocation has been reported to cause unauthorized execution of app components. Although protection already put in place, little done understand the security risks navigating an app's WebView through URL, legitimate need displaying UI during interactions. In our research, we found that current design such cross-WebView navigation actually opens door remote infection, allowing adversary spread malicious web content across...
We introduce and study a general version of the fractional online knapsack problem with multiple knapsacks, heterogeneous constraints on which items can be assigned to knapsack, rate-limiting assignment knapsacks. This generalizes variations one-way trading that have previously been treated separately, additionally finds application real-time control electric vehicle (EV) charging. new algorithm achieves competitive ratio within an additive factor one best achievable ratios for matches or...
To investigate the prevalence and molecular characterization of bedaquiline resistance among MDR-TB isolates collected from Chongqing, China.A total 205 were Chongqing Tuberculosis Control Institute between March 2019 June 2020. The MICs BDQ determined by microplate alamarblue assay. All strains genotyped melting curve spoligotyping, subjected to WGS.Among MDR isolates, rate was 4.4% (9/205). 55 (26.8%) male patients 50 (24.4%) new cases. Furthermore, 81 (39.5%) these exhibited lung...
On modern operating systems, applications under the same user are separated from each other, for purpose of protecting them against malware and compromised programs. Given complexity today's OSes, less clear is whether such isolation effective different kind cross-app resource access attacks (called XARA in our research). To better understand problem, on less-studied Apple platforms, we conducted a systematic security analysis MAC OS~X iOS. Our research leads to discovery series high-impact...
With the popularity of today's usability-oriented designs, dubbed Zero Configuration or ZeroConf, unclear are security implications these automatic service discovery, "plug-and-play" techniques. In this paper, we report first systematic study on issue, focusing features systems related to Apple, major proponent ZeroConf Our research brings light a disturbing lack consideration in systems' designs: frameworks Apple platforms, including Core Bluetooth Framework, Multipeer Connectivity and...
The mushrooming of distributed energy resources turns end-users from passive price-takers to active market-participants. To manage massive proactive efficiently, virtual power plant (VPP) as an innovative concept emerges. It can provide some necessary information help consumers improve their profits and trade with the electricity market on behalf them. One important desired by is prediction renewable outputs inside this VPP. Presently, most VPPs run in a centralized manner, which means VPP...
The widespread deployment of distributed renewable energy sources and electric vehicles can help mitigate climate crisis. This necessitates new business models in the power sector to hedge against uncertainties while imposing a strong coupling between connected transportation networks. To address these challenges, this paper first proposes an sharing mechanism considering AC network constraints encourage local exchange system. Under proposed mechanism, all prosumers play generalized Nash...
There are multiple discharges in one breakdown during a lightning incident. A incident usually contains 3-5 return strokes. In this case, the will not be well simulated by first stroke. To date, single impulse current waveform has been used to simulate research on characteristics of soils, leading some differences with observations actual discharges. paper, time-delayed control technique and controlled gaps-group isolation were produce high-impulse currents discharge soil sample, while...