- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Biometric Identification and Security
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Spam and Phishing Detection
- Digital and Cyber Forensics
- Particle accelerators and beam dynamics
- Advanced Software Engineering Methodologies
- Machine Learning in Healthcare
- Adversarial Robustness in Machine Learning
- Magnetic confinement fusion research
- Interactive and Immersive Displays
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
- Digital and Traditional Archives Management
- Advanced Decision-Making Techniques
- Low-power high-performance VLSI design
- Handwritten Text Recognition Techniques
- Mobile and Web Applications
- Modular Robots and Swarm Intelligence
- Environmental Engineering and Cultural Studies
- Multi-Agent Systems and Negotiation
Beijing Institute of Technology
2011-2025
Zhejiang Lab
2023-2024
Menlo School
2024
Nanjing University of Aeronautics and Astronautics
2017-2023
Ministry of Transport
2022
State Key Laboratory of Cryptology
2020
University of Luxembourg
2016-2018
University of Science and Technology of China
2017-2018
Southwestern Institute of Physics
2018
National University of Defense Technology
2017
The emergence of cloud infrastructure has significantly reduced the costs hardware and software resources in computing infrastructure. To ensure security, data is usually encrypted before it's outsourced to cloud. Unlike searching sharing plain data, it challenging search share after encryption. Nevertheless, a critical task for service provider as users expect conduct quick return result without losing confidentiality. overcome these problems, we propose ciphertext-policy attribute-based...
Cloud computing enables enterprises and individuals to outsource share their data. This way, cloud eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due ability achieve one-to-many sharing. Revocation is critical requirement systems. After outsourcing attribute-based ciphertext cloud, owner may want revoke some recipients that were authorized previously, which means...
Outsourcing the heavy decryption computation to a cloud service provider has been promising solution for resource-constrained mobile device deploy an attribute-based encryption scheme. However, current attribute based with outsourced schemes only enable verify whether returned correct result, they lack mechanism escape from device's wrong claim if it result. This article, first time, proposes reliable scheme using blockchain smart contract. In proposed scheme, not can but also result is...
Cloud computing, which provides adequate storage and computation capability, has been a prevalent information infrastructure. Secure data sharing is basic demand when was outsourced to cloud server. Attribute-based proxy re-encryption promising approach that allows secure encrypted on clouds. With attribute-based re-encryption, delegator can designate set of shared users through issuing key will be used by the server transform delegator's users'. However, existing schemes lack mechanism...
The application of the Internet Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities hijack devices, control services, steal data, or make devices operate illegally. These restrictions have led huge security risks for IoT, and challenged management critical infrastructure services. Based on these problems, this article proposes an anomaly detection system detecting illegal behavior (DIB) IoT...
Mobile payment system has been expected to provide more efficient and convenient methods. However, compared traditional payments, mobile issues related the security of electronic accounts apps present serious challenges. In this paper, we find potential risks by analyzing commonly used tokenized method put forward corresponding off-site attack strategy. scenario, attackers are not only limited malicious third parties but also can be illegal merchants. To address attack, especially who may...
The development of deep learning techniques has significantly increased the ability computers to recognize CAPTCHA (Completely Automated Public Turing test tell Computers and Humans Apart), thus breaking or mitigating security existing captcha schemes. To protect against these attacks, recent works have been proposed leverage adversarial machine perturb pictures. However, they either require prior knowledge solving models lack adaptivity evolving behaviors attackers. Most importantly, none...
To support robust plan execution of autonomous robots in dynamic environments, robot software should include adaptive and reactive capabilities to cope with the dynamics uncertainties evolving states real-world environments. However, conventional architectures such as sense-model-plan-act behaviour-based paradigms are inadequate for meeting requirements. A lack sensing during acting paradigm makes slow react run-time contingencies, whereas typically fall short planning long-range steps...
Today's blockchain systems store detailed runtime information in the format of transactions and blocks, which are valuable not only to understand finance blockchain-based ecosystems but also audit security on-chain applications. However, exploring this “big data” is challenging due data heterogeneity huge amount. Existing exploration techniques either incomplete or inefficient, making them inapt time-sensitive This paper presents <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Recent research has shown that language models have a tendency to memorize rare or unique token sequences in the training corpus. After deploying model, practitioners might be asked delete any personal information from model by individuals' requests. Re-training underlying every time individuals would like make these requests is computationally expensive. We employ teacher-student framework and propose novel leave-one-out ensemble method unlearn targeted textual model. In our approach,...
The Internet of Things (IoT) is a new manifestation data science. To ensure the credibility about IoT devices, authentication has gradually become an important research topic in ecosystem. However, traditional graphical passwords and text can cause user’s serious memory burdens. Therefore, convenient method for determining user identity needed. In this article, we propose handwriting recognition scheme named HandiText based on behavior biometrics features. When people write word by hand,...
Emotion analysis of online customer service conservation is important for good user experience and satisfaction. However, conventional metrics do not fit this application scenario. In work, by collecting labeling conversations on Twitter, we identify 8 new metrics, named as tones, to describe emotional information. To better interpret each tone, extend the Latent Dirichlet Allocation (LDA) model Tone LDA (T-LDA). T-LDA, latent topic explicitly associated with one three semantic categories,...
In this article, Electron Cyclotron Resonance (ECR) absorption, Upper-Hybrid (UHR) absorption and Bernstein Wave (EBW) conversion are systematically confirmed in magnetically confined KT-5D plasma which is sole-excited by a magnetron source. A 2.45 GHz ECR system has been developed on the toroidal helimak to produce sustain steady-state plasma. 0.98 kW electron cyclotron wave produced injected into vacuum chamber through rectangular waveguides with power efficiency of 40∼50%. excited density...
Clos networks provide theoretically optimal solution to build high-radix switches. Dynamically reconfiguring a three-stage network is more difficult in asynchronous circuits than synchronous circuits. This study proposes novel dispatching (AD) algorithm for general networks. It compared with the classic concurrent round-robin (CRRD) unbuffered The AD avoids contention central modules using state feedback scheme and outperforms throughput of CRRD behavioural simulations. Two are implemented...
The decision and execution of autonomous robot behaviors highly depend on constant perceiving the situated environment, in order to respond various changes.Existing control architectures for software generally follow a sequential sense-model-plan-act (SMPA) architecture, which sensing activity only interacts with modelling that triggers planning acting activity.However, dynamic world, changes environment not influence robot's behavior decisions but also affects their plan execution.The...
Purpose This paper aims to facilitate the research and development of resilient navigation approaches, explore robustness adversarial training different interferences promote their practical applications in real complex environments. Design/methodology/approach In this paper, authors first summarize accidents self-driving cars develop a set methods simulate challenging scenarios by introducing simulated disturbances attacks into input sensor data. Then robust transferable approach is...
The development of Large Language Models (LLMs) has significantly advanced various AI applications in commercial and scientific research fields, such as literature summarization, writing assistance, knowledge graph construction. However, a significant challenge is the high risk hallucination during LLM inference, which can lead to security concerns like factual inaccuracies, inconsistent information, fabricated content. To tackle this issue, it essential develop effective methods for...