Guoquan Yuan

ORCID: 0000-0003-1229-1231
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Data Security
  • Mobile Crowdsensing and Crowdsourcing
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Advanced Steganography and Watermarking Techniques
  • Topic Modeling
  • Cloud Computing and Resource Management
  • Domain Adaptation and Few-Shot Learning
  • Video Surveillance and Tracking Methods
  • Text and Document Classification Technologies
  • Cognitive Functions and Memory
  • Digital and Cyber Forensics
  • Advanced Database Systems and Queries
  • Access Control and Trust
  • Service-Oriented Architecture and Web Services
  • Digital Media Forensic Detection
  • Data-Driven Disease Surveillance

Shanghai Electric (China)
2022-2025

ABSTRACT With the rise of social media and spread a large number pictures on Internet, protecting data privacy verifying copyright has become hot research. A common method is to use digital watermarking. However, existing blind watermarking methods only consider embedding watermark in image itself ignore fact that attacker can remove through other shooting devices. Therefore, solve this problem, we propose an based few‐shot learning. We autoencoder learn extraction watermarks. Then,...

10.1002/cpe.8389 article EN Concurrency and Computation Practice and Experience 2025-02-11

Network traffic classification has become an important part of network management, which is conducive to realizing intelligent operation and maintenance, improving quality service (QoS), ensuring security. With the rapid development various applications protocols, more encrypted appears in network. Due loss semantic information after encryption, poor content intelligibility, difficulty feature extraction, traditional detection methods are no longer applicable. Existing solutions mainly rely...

10.1145/3571662.3571678 article EN 2022-11-03

This paper presents a feature fusion and sparse transformer-based anomalous traffic detection system (FSTDS). FSTDS utilizes network to encode the data sequences extracting features, fusing them into coding vectors through shallow deep convolutional networks, followed by using transformer capture complex relationships between flows; finally, multilayer perceptron is used classify achieve anomaly detection. The of improves extraction from small sample data, encoder enhances understanding...

10.3390/math12111643 article EN cc-by Mathematics 2024-05-24

Traditional machine learning-based entity extraction methods rely heavily on feature engineering by experts, and the generalization ability of model is poor. Prototype networks, other hand, can effectively use a small amount labeled data to train models while using category prototypes enhance models. Therefore, this paper proposes prototype network-based named recognition (NER) method, namely FSPN-NER model, solve problem difficult sensitive in data-sparse text. The utilizes positional...

10.3390/math12172791 article EN cc-by Mathematics 2024-09-09

The goal of privacy-preserving social graph publishing is to protect individual privacy while preserving utility. Node nearest neighbor structure a crucial utility as it the basis for many analysis tasks. Most existing methods with differential focus on degree distribution yet neglect maintenance connections between nodes' neighbors. Moreover, they require massive noise added mask change single edge, thereby rendering poor structure. As result, tough preserve high under privacy. To tackle...

10.1109/access.2023.3297437 article EN cc-by-nc-nd IEEE Access 2023-01-01

This paper first introduces the performance dilemma faced by OLAP database, and then combines operational characteristics of OLTP innovatively adopts loosely coupled distributed architecture, designs a high-performance database integrating transaction analysis (DITAA), analyzes its structure data, queries number scan lines experiment to verify improvement analysis.

10.1109/icomssc45026.2018.8941810 article EN 2018 International Computers, Signals and Systems Conference (ICOMSSC) 2018-09-01

Network intrusion detection (NID) has attracted much attention as it is essential in preventing security threats and protecting networks from attacks. However, existing methods face the following challenges: (1) poor feature extraction capability; (2) not well-designed to address class imbalance problem; (3) failure take full use of label information learn classification-oriented features, degrading NID performance. To this end, we proposed SC-Net, a two-stage training model with deep...

10.1109/iccc56324.2022.10065890 article EN 2022-12-09

The group relationship (Community Relation) contained in the trajectory data can be used for hot spot exploration, community governance, and traffic diversion, which has broad application prospects. Trajectory association privacy refers to user with a similar movement mode data. Publishing analysts without protection will cause leakage of such privacy. Recently, correlation attracted attention researchers, proposing solutions based on differential Still, existing methods are limited...

10.1109/iccc56324.2022.10066004 article EN 2022-12-09
Coming Soon ...