- Cryptography and Data Security
- Advanced Algebra and Geometry
- Algebraic Geometry and Number Theory
- Analytic Number Theory Research
- Chaos-based Image/Signal Encryption
- Complexity and Algorithms in Graphs
- Security in Wireless Sensor Networks
- Distributed Control Multi-Agent Systems
- graph theory and CDMA systems
- Advanced Mathematical Identities
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Neural Networks Stability and Synchronization
- Nonlinear Dynamics and Pattern Formation
- Stability and Control of Uncertain Systems
- stochastic dynamics and bifurcation
- Plant Ecology and Soil Science
- Energy Efficient Wireless Sensor Networks
- Video Surveillance and Tracking Methods
- Geology and Paleoclimatology Research
- Cloud Data Security Solutions
- Finite Group Theory Research
- Mathematical and Theoretical Epidemiology and Ecology Models
- Service-Oriented Architecture and Web Services
- Distributed systems and fault tolerance
Beijing University of Technology
2018-2024
East China Normal University
2024
Guizhou University
2024
Chinese Academy of Sciences
2019-2024
Institute of Zoology
2024
Shaanxi University of Science and Technology
2023
Nanjing University of Posts and Telecommunications
2021-2022
Anhui Institute of Information Technology
2022
South China Normal University
2007-2021
Chifeng University
2021
Abstract In this paper, we modify the proof methods of some previously weakly consistent variants random forest into strongly methods, and improve data utilization these in order to obtain better theoretical properties experimental performance. addition, propose Data-driven Multinomial Random Forest (DMRF) algorithm, which has same complexity with BreimanRF (proposed by Breiman) while satisfying strong consistency probability 1. It performance classification regression tasks than previous RF...
Terrestrial dissolved organic matter (tDOM) holds great promise for controlling cyanobacteria blooms through watershed management. To identify tDOM that could inhibit the growth, photosynthesis and colony formation, unicellular Microcystis aeruginosa Kützing (FACHB-469) was cultivated treated with varying concentrations of gallic acid, proline tea polyphenols at different levels iron. The results indicated acid growth by suppressing formation reducing extracellular polysaccharides (EPS)...
With the assistance of edge computing which reduces heavy burden cloud center server by using network servers, Internet Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve over encrypted in cross-domain Based characteristics technical requirements IoT, we propose an efficient fine-grained revocable...
Among the classification algorithms in machine learning, KNN (K nearest neighbor) algorithm is one of most frequent used methods for its characteristics simplicity and efficiency. Even though very effective many situations while it still has two shortcomings, not only efficiency this obviously affected by redundant dimensional features, but also categorization accuracy seriously influenced distribution training samples. In paper, we proposed a stepwise based on kernel attribute reduction...
As one of the three pillars information technology, wireless sensor networks (WSNs) have been widely used in environmental detection, healthcare, military surveillance, industrial data sampling, and many other fields due to their unparalleled advantages deployment cost, network power consumption, versatility. The advent 5G standard era Industry 4.0 brought new opportunities for development networks. However, limited capacity nodes themselves, harsh environment will bring a great difficulty...
Abstract Callosobruchus maculatus is one of the most competitive stored grain pests, which causes a great loss to agricultural economy. However, due an inadequacy high-quality reference genome, molecular mechanisms for olfactory and hypoxic adaptations environments are unknown require be revealed urgently, will contribute detection prevention invasive pests C. . Here, we presented chromosome-level genome based on Illumina, Nanopore Hi-C sequencing data. The total size was 1.2 Gb, 65.17%...
Shrinking the size of photoelectrodes into nanoscale will enable precise modulation cellular and subcellular behaviors a single neuron neural circuits. However, compared to photovoltaic devices, reduced causes compromised efficiencies. Here, we present highly efficient nanoelectrode based on bimetallic zinc gold porphyrin (ZnAuPN). Upon light excitation, observe ultrafast energy transfer (~66 ps) charge (~0.5 through ring, enabling 97% efficiency in separating transferring photoinduced...
In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in random oracle model under Diffie-Hellman assumption.Our adopts approach that private key associated with an identity rather than master of PKG shared.Comparing to the-state-of-art work by Baek and Zheng, our has following advantages.(1) The round-complexity signing protocol optimal.Namely, during procedure, each party broadcasts only one message.(2) communication...
We propose a new identity-based threshold signature (IBTHS) scheme from bilinear pairings enjoying the following advantages in efficiency, security and functionality. The round-complexity of signing protocol is optimal since each party pays no other communication cost except broadcasting one single message. computational complexity procedure considerably low there appears time-consuming pairing two for verifying shares. channel requirement lowest broadcast among signers enough. It provably...
This paper considers the problem of robust control synthesis such that time-delay multi-agent systems are consensus and capture finite frequency domain H∞ performance. Using a linear transformation, is first transformed into partial stability problem. Then, based on dual version generalised Kalman–Yakubovich–Popov (GKYP) lemma multiplier expansion method, new sufficient conditions guaranteeing existence static output feedback controller proposed in terms matrix inequalities (LMIs) without...
With the development of new generation Internet technology, Digital Object Architecture (DOA)/Handle system plays an important role in industrial system. The and technical characteristics DOA/Handle technology is studied this paper. Then function architecture distributed data acquisition based on proposed. Through detailed design functions architecture, core such as acquisition, management, security sharing, governance are realized environment. At end paper, typical scenarios summarized, a...
Real-time detecting objects on captured images UAV (Unmanned Aerial Vehicle) platforms, rather than barely transmitting back to supporting equipment for post-processing, is a core requirement advanced applications. However, due limited computing capacity and memory of it very challenging deploy real-time detection models them. In addition, there are more small in aerial images, which makes difficult detect accurately. To solve these problems, this paper brings dense connection Yolo(You Only...
With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a network. In typical wormhole attack, attacker receives packets network, forward them through wired link with high-bandwidth low-latency links than network links, relay to another point this paper, we propose use key techniques probabilistic multi-path redundancy transmission (PMRT) detect...
At present, it is a great challenge that solving high-dimension and text sparsity problems in short classification. To resolve these problems, this paper proposes method which takes the correlation between lexical items tags before completing Latent Dirichlet Allocation(LDA) topic model. Meanwhile, adjusts parameters of Support Vector Machine(SVM) to find optimal values by K-fold cross validation. Besides, using kernel SVM as classifier, we successfully categorize labeled Chinese documents....