- Chaos-based Image/Signal Encryption
- Data Management and Algorithms
- Graph Theory and Algorithms
- Advanced Image and Video Retrieval Techniques
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Cryptographic Implementations and Security
- Insect Pheromone Research and Control
- Advanced Graph Neural Networks
- Neural Networks and Applications
- Species Distribution and Climate Change
- Mobile Agent-Based Network Management
- Cellular Automata and Applications
- Network Packet Processing and Optimization
- Caching and Content Delivery
- Computational Physics and Python Applications
- Internet Traffic Analysis and Secure E-voting
- Peer-to-Peer Network Technologies
- Misinformation and Its Impacts
- Physical Unclonable Functions (PUFs) and Hardware Security
- Image and Object Detection Techniques
- Geoscience and Mining Technology
- Advancements in PLL and VCO Technologies
- Medical Image Segmentation Techniques
- Access Control and Trust
Chinese Academy of Sciences
2019-2024
University of Chinese Academy of Sciences
2019-2024
Institute of Information Engineering
2019-2024
Tianjin University of Technology and Education
2021-2024
China Information Technology Security Evaluation Center
2020-2023
China University of Geosciences (Beijing)
2011-2021
Beijing University of Posts and Telecommunications
2020-2021
Institute of Automation
2019-2021
Shandong Institute of Automation
2019-2021
Data Assurance and Communication Security
2017-2019
True random number generators (TRNGs) are widely used in cryptographic systems, and their security is the base of many algorithms protocols. At present, entropy estimation based on a stochastic model well-recommended approach to evaluate specific TRNG structure. Besides, generation speed also an important property for TRNGs. For this purpose, analog-to-digital converter (ADC) can be employed sample noisy signal achieve high bit rate. However, no research focuses basis toward ADC sampling. In...
Widely used as fundamental security components in most cryptographic applications, random number generators (RNGs) rely mainly on randomness provided by entropy sources. If the is less than expected, RNGs may be compromised and thus impair of whole applications. However, common assumptions (e.g., outputs are independent identically distributed, i.e., IID) not always hold. For example, many sources based some physical phenomena that fragile sensitive to external factors temperature), which...
Automatic detecting rumors on social media has become a challenging task. Previous studies focus learning indicative clues from conversation threads for identifying rumorous information. However, these methods only model various views but fail to fuse multi-view features very well. In this paper, we propose novel fusion framework rumor representation and classification. It encodes the multiple based Graph Convolutional Networks (GCN) leverages Neural (CNN) capture consistent complementary...
True Random Number Generator (TRNG) is indispensable in cryptographic algorithms and protocols, the quality of randomness directly influences security applications. Multiple theoretical or offline entropy estimation methods have been proposed to evaluate TRNGs, while their ideal assumptions commonly cannot be satisfied due perturbation operating conditions at runtime, which makes it difficult achieve sufficient for output TRNGs practice. Moreover, bitrate TRNG another fundamental concern...
News recommendations aimed at alleviating network information overload. Traditional methods cannot simultaneously consider the representation of entities in news level knowledge and influence social networks on user interest points. The above two factors have a huge correlation with efficiency recommendation. In order to these factors, this paper proposes recommendation model based graph which integrates into recommendations. is deep framework content for click-through rate prediction....
Random number generator (RNG) is a fundamental and important cryptographic element, which has made an outstanding contribution to guaranteeing the network communication security of applications in Internet age. In reality, if random used cannot provide sufficient randomness (unpredictability) as expected, these are vulnerable threats cause system crashes. Min-entropy one approaches that usually employed quantify unpredictability. The NIST Special Publication 800-90B adopts concept...
Microservice architecture is embraced by a growing number of enterprises due to the benefits modularity and flexibility. However, being composed numerous interdependent microservices, it prone cascading failures afflicted arising problem troubleshooting, which entails arduous efforts identify root cause node ensure service availability. Previous works use call graph characterize causality relation-ships microservices but not completely or comprehensively, leading an insufficient search...
Combined with quantum computing and genetic algorithm, algorithm (QGA) shows considerable ability of parallelism. Experiments have shown that QGA performs quite well on TSP, job shop problem some other typical combinatorial optimization problems. The problems like nutritional diet which can be transformed into specific combinational also solved through smoothly. This paper sums up the main points for general These such as modeling problem, qubit decoding rotation strategy are useful to...
Based on the measurement of in-situ stress and engineering-geological conditions, we built computing models with pre-exerting boundary loads simulated regional field involved. Boundary can be approximately determined by use multiple linear regressions, further optimized artificial neural network. By calculation, corresponding initial reach ideal accuracy. As an example, inversely analyzed engineering problem in Chinese Wo-bei mine. The results shows that simulation meet point very well,...
In this paper, we investigate the properties of cycles for node representation in star graph. Cycles can be any order. The position each symbol ordinary cycle is fixed and not nested into other cycle. However, cyclic shift operations on symbols a none-ordinary are allowed number distinct paths graph determined using combinatorial analysis.
In order to solve the printing failure caused by projection part of light source in 3D process, this paper proposes a system adjustment scheme. By analyzing polymerization state photosensitive resin, detecting intensity ultraviolet light, extracting outline picture, and comparing similarity optical detection can find out cause provide us with advice on how adjust ensure that continue be normal. following, authors proposed process system, simulated experiment confirm whether irradiated resin...
An outdoor plume tracing method with a TDLAS gas sensor on UAV is proposed in this paper. The installed modified 3-axis aerial gimbal, and oriented fixed angle Į to the vertical direction. During flying of UAV, rotated continuously by controlling yaw scanning three-dimensional area beneath UAV. With time series detected odor concentration line integral (CLI), searching path planned find trace source. verified CPTS-3D simulation platform. results experiments show that has high search...