- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Metallurgy and Material Forming
- Cloud Data Security Solutions
- Microstructure and Mechanical Properties of Steels
- IoT and Edge/Fog Computing
- Advanced Database Systems and Queries
- Advanced Authentication Protocols Security
- Metal Forming Simulation Techniques
- Distributed systems and fault tolerance
- Privacy, Security, and Data Protection
- Complex Network Analysis Techniques
- Smart Grid Energy Management
- Laser and Thermal Forming Techniques
- Patient Dignity and Privacy
- Artificial Intelligence in Healthcare and Education
- Molecular Communication and Nanonetworks
- Opinion Dynamics and Social Influence
- Advanced Multi-Objective Optimization Algorithms
- Aerospace, Electronics, Mathematical Modeling
- Speech Recognition and Synthesis
- Soft Robotics and Applications
- 3D IC and TSV technologies
Beijing University of Technology
2007-2023
National University of Defense Technology
2021-2023
Xiamen University of Technology
2020-2022
Microsoft Research Asia (China)
2020
Huazhong University of Science and Technology
2013-2020
Wuhan Institute of Technology
2020
Nanjing University of Information Science and Technology
2016
PLA Information Engineering University
2007
Microsoft (United States)
2006
University of Southern Mississippi
1996
With the support of mobile cloud computing, wireless body area networks can be significantly enhanced for massive deployment pervasive healthcare applications. However, several technical issues and challenges are associated with integration WBANs MCC. In this article, we study a cloud-enabled WBAN architecture its applications in systems. We highlight methodologies transmitting vital sign data to by using energy-efficient routing, resource allocation, semantic interactions, security mechanisms.
Nowadays, big data has become ubiquitous. Big contains great value and chance. However, also brings many security risks privacy-preserving problems. Security privacy issues are magnified by velocity, volume, variety of data. Then, traditional mechanisms not suitable for security. Privacy preserving is one the major challenges in This paper surveys its key techniques. And, legal measures industry specifications regarding addressed. Finally, some new future summarized.
This paper presents a new web mining scheme for parallel data acquisition.Based on the Document Object Model (DOM), page is represented as DOM tree.Then tree alignment model proposed to identify translationally equivalent texts and hyperlinks between two trees.By tracing identified hyperlinks, documents are recursively mined.Compared with previous schemes, benchmarks show that this improves coverage, reduces bandwidth, enhances quality of mined sentences.
The attention-based Transformer model has achieved promising results for speech recognition (SR) in the offline mode.However, streaming mode, usually incurs significant latency to maintain its accuracy when applying a fixed-length look-ahead window each encoder layer.In this paper, we propose novel low-latency approach models, which consists of scout network and network.The detects whole word boundary without seeing any future frames, while predicts next subword by utilizing information from...
In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, it now widely applied in various fields. At same time, with growth of medical technology, information becoming increasingly important terms patient identity background, payment records, history. Medical can be most private about person, but due to issues such as operation errors within network or hacking attack...
Federated learning allows a large number of participants to collaboratively train global model without sharing participant's local data. Participants models with their data and send gradients the cloud server for aggregation. Unfortunately, as third party, cannot be fully trusted. Existing research has shown that compromised can extract sensitive information from gradients. In addition, it even forge aggregation result corrupt being detected. Therefore, in secure federated system, both...
The traditional natural gas Internet-of-Things (IoT) system has many problems, such as centralized management of resources, noncirculation data between stations, insecurity transaction information or account books, and lack contract consensus. In order to ensure security reliable transaction, this article introduces artificial intelligence (AI) blockchain technology constructs an AI-enabled blockchain-powered IoT in a smart city. article, the output prediction model based on temporal pattern...
NBA (National Basketball Association) trading cards are a hot collector’s item, with sales increasing rapidly every year. However, the popularity of online trading, some sellers have started to intentionally and unintentionally sell imitation cards, even PwC (Pricewaterhouse Coopers) is not immune. PSA (Professional Sports Authenticator), which authentication agency, liable for this. Faced above situation, we moved proposed blockchain-based anti-counterfeit traceable digital card management...
With the development of energy interconnection and increasing consumption natural gas, distributed supply trusted-transaction- based gas Industrial Internet Things (IIoT) has become one hottest research spots in industry. This article puts forward IIoT architecture on blockchain AI, order to address defects centralized architecture. The proposed is introduced detail from three aspects infrastructure, side-chain block data dimension, backbone value dimension. Then design issues integration...
As society advances, so does the total number of vehicles on road, creating a massive consumer market for automobiles. According to statistics, major portion today’s traffic difficulties are caused by accidents subpar cars and auto parts. result, each country has, over time, enacted equivalent rules regulations prevent such tragedies. However, in face profit, some people desperate enough employ illegal parts illegally modified cars, fraud is rampant. we blockchain symmetrical Blockchain’s...
As many countries have promulgated laws to protect users' data privacy, how legally use has become a hot topic. With the emergence of federated learning (FL) (also known as collaborative learning), multiple participants can create common, robust, and secure machine model while addressing key issues in sharing, such security, accessibility, etc. Unfortunately, existing research shows that FL is not it claims, gradient leakage correctness aggregation results are still problems. Recently, some...
Hot stamping ultra-high strength steel not only plays an important role in automotive field, but also has potential application transmission line fittings industry. According to the current development status of Chinese electrical power and demand for new technique, combined with hot technology, a solution reduction weight been proposed. This paper focuses on lightweight connection fitting multilayer stack structure boron steel, key issue design manufacturing process deep U-shaped stacked...
The effects of hot stamping parameters including die temperature and holding pressure was evaluated throughout the orthogonal experiment method. Regardless effect pressure, when lower than 400 °C, lowest hardness emerged at air gap. range transition zone expanded as increased. When set with 20MPa higher others, which resulted by considering both cooling rate strain.
Conduction heating overcomes the shortage of furnace, due to rapid and high energy efficiency. The experiment ultra-high strength boron steel (LG1500HS) a rectangular blank was implemented on conduction system. variations average temperature rising rate, uniform region efficiency were investigated under non-heating-retaining condition. results show that are 44.5°C/s, 225 mm 71.6%, respectively.
As a basic platform for large-capacity, long-distance and high-reliability information transmission, the optical fiber backbone network may be destroyed by natural disasters or deliberately attacked. This make originally connected topology divided, even entire paralyzed, resulting in serious economic social losses. How to establish survivability model of measure its has become key research problem improve robustness network. Based on theory complex network, this paper analyses changing...
This paper analyzes the cryptography scheme of Trust Platform Model(TPM). The focus discussion would be comparison elliptic curve and nowadays widely used 2048-bit RSA in evaluating which better suited to on TPM. A TPM implementation based ECC is proposed, includes encryption decryption schemes, signature verification scheme, key agreement scheme. Corresponding examples commands also given.
Accurate techniques for testing production sections are important when developing horizontal wells, but appropriate methods also needed transporting loggers through well segments. The reciprocating grip traction robot is a pipeline that has already been tested and broadly accepted use in wells. Reciprocating robots have received great deal of attention because they very (more than 40%) efficient, although many other tractors only 10% to 20% the remaining energy being converted waste heat....