- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Software Engineering Research
- Cloud Data Security Solutions
- Software Reliability and Analysis Research
- UAV Applications and Optimization
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Computational Techniques and Applications
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Mathematical and Theoretical Epidemiology and Ecology Models
- Complex Network Analysis Techniques
- Infrared Target Detection Methodologies
- Advanced Sensor and Control Systems
- Robotics and Sensor-Based Localization
- Anomaly Detection Techniques and Applications
- Technology and Security Systems
- BIM and Construction Integration
- Privacy-Preserving Technologies in Data
- Advanced Memory and Neural Computing
- Interconnection Networks and Systems
- Neuroscience and Neural Engineering
Beijing Institute of Technology
2010-2025
Wenzhou University
2022
Nanjing Agricultural University
2017
Zhongshan Hospital
2011
It is a trend to construct multicomponent room temperature phosphorescence/RTP doped materials in the future improve phosphorescence performance by using advantage that host system can be used as container containing other components. Herein, systems are constructed with two isoquinoline derivatives (OxISQ and PrISQ) guests, diphenyl sulfoxide/SDB host, alkali (KOH) fourth component. Bicomponent material OxISQ/SDB has strong cyan RTP, whereas PrISQ/SDB almost no RTP activity. The effect of...
The advent of unmanned aerial vehicle (UAV) swarm technology brings possibilities to help humans complete tasks in no man's land, such as deserts and rainforests. However, UAV network faces many cyber threats, where attackers can impersonate legitimate entities or tamper with task data. For identity security, most the existing methods use centralized authentication schemes, which have a single point failure problem. data only secure ground system, ignoring security air network. Therefore,...
Software defect prediction technology mainly relies on machine learning algorithm to learn the measurement data of existing software. There is some redundant in element software defect, which will reduce accuracy algorithm. This paper proposes a model based KPCA-SVM.First, dimension reduction pretreatment sets carried out.Then, using support vector machines for classification.The can be improved by keeping global features selection algorithm.Therefore, kernel principal component analysis...
The soybean sprout is a nutritious and delicious vegetable that rich in ascorbic acid (AsA). Hydrogen gas (H
The dramatic increase in the number of sensors with wireless communication capability has resulted emergence a new class computer worms which specifically target such networks. most striking feature worm these networks is that they do not require Internet connectivity for their propagation but can spread directly from sensor node to another using short-range radio technology. In this paper, we model and analyze epidemic theory. From numerical simulation results, observe process very...
The popularity of wireless communication networks makes them an attractive target to the creators worms and other malicious code. Indeed, recently a number designed specifically spread via these have emerged. Based on epidemic theory, this paper proposes general model which predicts how worm propagates through ad hoc network. Then differential equations is presented necessary condition for in derived, may be useful designing secure Simulation results show that process propagation sensitive...
A novel approach for IP traceback is proposed, which combines probabilistic packet marking and network coding techniques. Dissimilar to prior PPM schemes, our stores random linear combinations of router labels instead overwriting further decrease the convergence time attack path reconstruction. Based on coupon collector problem with unequal probability, we also present accurate models proposed as well that schemes. Simulation results analysis indicate can effectively improve performance.
To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the system before security testing. At present many metrics have been proposed design VPM. In this paper, we classes by establishing system's weighted network. The obtained from nodes' attributes We and implement crawler tool collect all public vulnerabilities Mozilla Firefox. Based on these data, prediction model is trained tested. results show that VPM based...
In recent years, there has been a constant barrage of worms over the Internet. To develop appropriate tools for thwarting quick spread worms, researchers are trying to understand behavior worm propagation with aid epidemiological models. this paper, two improvements classical SIS (susceptible-infectious-susceptible) and SIR (susceptible-infectious-recovered) models quarantine strategy presented; thresholds equilibriums appearance endemic these dynamic found, furthermore, their stability is...
In recent years, network worm that had a dramatic increase in the frequency and virulence of such outbreaks have become one major threats to security Internet. To develop appropriate tools for thwarting quick spread worms, researchers are trying understand behavior propagation with aid epidemiological models. this paper, new model bilinear incidence rate is proposed discussed based on classical Kermack-Mckendrick (KM) model. It supports hosts decrease leaving from network. Moreover, global...
Image recognition of small UAVs is the basis anti-UAV technology based on photoelectric detection. In this paper, an automatic image method for Faster RCNN proposed. The deep residual network adopted to extract features UAVs. Then, extracted are input into region proposal network, which can generate a box that contains final result obtained through classification and regression. After training testing model dataset thousands images common UAV market, shows recall 98%, average precision close...