Xiaojun Yu

ORCID: 0000-0003-0943-1782
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Optical Network Technologies
  • Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Cloud Data Security Solutions
  • Optical Coherence Tomography Applications
  • Advanced Data Storage Technologies
  • Energy, Environment, Economic Growth
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Advanced Decision-Making Techniques
  • Advanced Malware Detection Techniques
  • Photoacoustic and Ultrasonic Imaging
  • China's Socioeconomic Reforms and Governance
  • ECG Monitoring and Analysis
  • Cloud Computing and Resource Management
  • Corporate Social Responsibility Reporting
  • E-commerce and Technology Innovations
  • EEG and Brain-Computer Interfaces
  • Environmental Sustainability in Business
  • Digital Rights Management and Security
  • Political Influence and Corporate Strategies
  • Retinal Imaging and Analysis
  • Image and Signal Denoising Methods

Northwestern Polytechnical University
2021-2025

City University of Hong Kong
2019-2022

Capital University of Economics and Business
2021

Ningxia Water Conservancy
2020

Macquarie University
2017

Beijing University of Posts and Telecommunications
2009-2015

China Information Technology Security Evaluation Center
2014-2015

Nanyang Technological University
2009-2015

Xi'an Technological University
2015

Jiangsu University of Technology
2014

An electrocardiograph (ECG) is widely used in diagnosis and prediction of cardiovascular diseases (CVDs). The traditional ECG classification methods have complex signal processing phases that leads to expensive designs. This paper provides a deep learning (DL) based system employs the convolutional neural networks (CNNs) for signals present PhysioNet MIT-BIH Arrhythmia database. proposed implements 1-D residual network (ResNet) model performs feature extraction by directly using input...

10.1371/journal.pone.0284791 article EN cc-by PLoS ONE 2023-04-25

Data security has become one of core problems cloud computing. Many solutions have been proposed, however, most them only focus stage data life cycle, such as storage stage, which is not enough to solve problem threats exist in whole cycle. In this paper, we argue that the should be solved form After detail analysis cycle model and threats, a suggested design process solution given. The proposed idea simple but important create complete security.

10.1109/cise.2010.5676895 article EN 2010-12-01

Multi-channel detection is an effective way to improve data throughput of spectral-domain optical coherence tomography (SDOCT). However, current multi-channel OCT requires multiple detectors, which increases the complexity and cost system. We propose a novel design based on single spectrometer. Each camera pixel receives interferometric spectral signals from all channels but with shift between two channels. This effectively broadens bandwidth each pixel, reduces relative intensity noise...

10.3788/col202321.051102 article EN Chinese Optics Letters 2023-01-01

With the rising popularity of multicast applications, various algorithms using either lightpath or light-tree schemes have been proposed for dynamic traffic grooming in meshed wavelength division multiplexing (WDM) networks. To best our knowledge, however, no systematic comparison has ever made between performance two minimizing network blocking probability. In this paper, we address problem WDM networks and present comprehensive comparisons these different cases. Our main contributions are...

10.1364/jocn.5.000870 article EN Journal of Optical Communications and Networking 2013-07-18

An integrated configuration is proposed to convert tunable slow light from signal another frequency in a wide bandwidth by using 70 m-long highly nonlinear photonic crystal fiber (HN-PCF). A 10 GHz RZ delayed Gbit/s 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">31</sup> -1 pseudo random bit sequence (PRBS) stimulated Brillouin scattering (SBS) pump, and the converted broadband four-wave mixing (FWM). By this way, not only converted, but...

10.1109/jlt.2008.2007575 article EN Journal of Lightwave Technology 2009-04-24

In overlay IP over WDM networks, there are only limited information exchanges between the two layers through user network interface (UNI) [1] for service requests and responses. To enhance performance while maintaining its simplicity, we propose first time to learn from historical data of lightpath setting up costs maintained by logical layer operator(s), facilitate routing process. Using a simple cost updating strategy alleviate outdating issue, present dynamic LSP algorithms, namely...

10.1109/icics.2009.5397524 article EN 2009-12-01

To support multicast applications while improving wavelength capacity utilization in division multiplexing (WDM) networks, dynamic traffic grooming problem has been extensively studied recent years, and various algorithms using either lightpath or light-tree schemes have proposed. the best of our knowledge, however, no systematic comparison ever made between blocking performances these two different types schemes. In this paper, we firstly present a brief survey existing for grooming,...

10.1109/pgc.2012.6458069 article EN 2012-12-01

Multipath routing employs multiple parallel paths between the source and destination for a connection request to improve resource utilization of network. In this paper, we present an integrated design multipath with delay constraints failure survivability in MPLS networks. By combining schemes into algorithms, path protection or restoration policies will enable network accommodate link failures at same time achieve significant improvement on utilization. We propose number working-backup...

10.1093/ietcom/e90-b.4.856 article EN IEICE Transactions on Communications 2007-04-01

This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, dynamic, unlimited times verification and sampling verification. The detail design is provided the theory analysis about correctness, security performance are also described. experiment emulation compare suggest feasibility advantage.

10.1109/ccis.2014.7175805 article EN 2014-11-01

With the rising popularity of multicasting services in meshed wavelength division multiplexing (WDM) networks, protecting dynamic sub-wavelength granularity multicast requests against network failures becomes an important issue operation process. This paper investigates survivable traffic grooming problem WDM and a connection-level segment shared protection (CL-SSP) algorithm is proposed to protect single link failure Specifically, improve resource sharing process, lightpath-fragmentation...

10.1109/icics.2013.6782928 article EN 2013-12-01

It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial leakage and privacy violate problem. This risk exists not only in system, but also client platform. To reduce paper proposed a new solution. makes full use of searchable encryption trusted computing technology. Given performance limit devices, it proposes proxy based protection architecture. The design basic idea, deploy model key flows are detailed. analysis from shows...

10.1117/12.2014030 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2013-03-13

10.1109/icicn62625.2024.10761537 article EN 2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN) 2024-08-21

PurposeOptical coherence tomography (OCT) is a noninvasive, high-resolution imaging modality capable of providing both cross-sectional and three-dimensional images tissue microstructures. Owing to its low-coherence interferometry nature, however, OCT inevitably suffers from speckles, which diminish image quality mitigate the precise disease diagnoses, therefore, despeckling mechanisms are highly desired alleviate influences speckles on images.ApproachWe propose multiscale denoising...

10.1117/1.jmi.10.2.024006 article EN Journal of Medical Imaging 2023-03-30

With the rapid development of network technology, a variety new attack methods to come out endlessly. Traditional firewalls, depending on static feature data base, have more and limitations these attacks. To alleviate this problem, in paper we propose honeynet-based firewall scheme with initiative security strategies. In scheme, data-analyzing module can timely discover behaviors by analyzing output result honeynet data-mining furthermore, according findings rule-learning dynamically create...

10.1109/cnmt.2009.5374492 article EN International Symposium on Computer Network and Multimedia Technology 2009-12-01

Overlay IP/MPLS over WDM network holds great promise for the Next-Generation Internet. One key design challenge with such a is limited information exchange between its two layers. We evaluate influences of WDM-layer link cost and routing strategies on performances dynamic multicast traffic grooming. Simulation results show that both strategy have significant impacts performances, especially when resources are abundant. In addition, more compared to those strategy. The suggest there potential...

10.1109/icocn.2015.7203687 article EN 2022 20th International Conference on Optical Communications and Networks (ICOCN) 2015-07-01
Coming Soon ...