- Genomics and Chromatin Dynamics
- Network Security and Intrusion Detection
- Text and Document Classification Technologies
- Topic Modeling
- Multimodal Machine Learning Applications
- Advanced Malware Detection Techniques
- Natural Language Processing Techniques
- Epigenetics and DNA Methylation
- Complex Network Analysis Techniques
- Advanced Text Analysis Techniques
- Smart Grid Security and Resilience
- Web Data Mining and Analysis
- Sentiment Analysis and Opinion Mining
- Speech Recognition and Synthesis
- RNA and protein synthesis mechanisms
- Genomics and Phylogenetic Studies
- RNA modifications and cancer
- Advanced Image and Video Retrieval Techniques
- Advanced biosensing and bioanalysis techniques
- Bioinformatics and Genomic Networks
- Internet Traffic Analysis and Secure E-voting
- RNA Research and Splicing
- Spam and Phishing Detection
- Speech and Audio Processing
- Information and Cyber Security
Peking University
2011-2024
Beijing National Laboratory for Molecular Sciences
2020-2024
Zunyi Medical University
2024
Northwestern University
2024
National Taiwan Normal University
2024
National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2015-2022
Lanzhou University
2022
117th Hospital of People's Liberation Army
2022
Chinese People's Liberation Army
2022
Wuhan University of Technology
2016
The CpG dinucleotide and its methylation behaviors play vital roles in gene regulation. Previous studies have divided genes into several categories based on the intensity around transcription starting sites found that housekeeping tend to possess high density, whereas tissue-specific are generally characterized by low density. In this study, we investigated how density distribution of a affects regulation pattern. Based site, means semi-supervised neural network designed, which took data...
Scientific literature ranking is essential to help researchers find valuable publications from a large collection. Recently, with the prevalence of webpage algorithms such as PageRank and HITS, graph-based have been widely used iteratively rank papers through networks formed by citation coauthor relationships. However, existing mostly focus on current importance literature. For who enter an emerging research area, they might be more interested in new young that are likely become influential...
Learning the embedding for social media data has attracted extensive research interests as well boomed a lot of applications, such classification and link prediction. In this paper, we examine scenario multimodal network with nodes containing contents connected by heterogeneous relationships, images (e.g., visual content text description), linked various forms in same album or tag). However, given network, simply learning from structure subset results sub-optimal representation. propose...
Learning social media data embedding by deep models has attracted extensive research interest as well boomed a lot of applications, such link prediction, classification, and cross-modal search. However, for images which contain both information multimodal contents (e.g., text description, visual content), simply employing the learnt from network structure or content results in sub-optimal image representation. In this paper, we propose novel approach called Deep Multimodal Attention Networks...
The Industrial Control System (ICS) is a public facility that provides services to lots of users; thus, its security has always been critical factor in measuring availability. Recently, new type attack on ICS occurred frequently, which realizes the extortion users by invading information domain and destroying physical domain. However, due diversity unavailability an control logic, targets such attacks are usually limited PCs servers, leaving more disruptive methods unexplored. To contribute...
Dynamic chromatin structure acts as the regulator of transcription program in crucial processes including cancer and cell development, but a unified framework for characterizing structural evolution remains to be established. Here, we performed graph inferences on Hi-C data sets derived contact networks. We discovered significant decreases information transmission efficiencies colorectal (CRC) T-cell acute lymphoblastic leukemia (T-ALL) compared corresponding normal controls through...
The interactome networks at the DNA, RNA, and protein levels are crucial for cellular functions, diverse variations of these heavily involved in establishment different cell states. We have developed a diffusion-based method, Hi-C to geometry (C T G), obtain reliable geometric information on chromatin from data. C G produces consistent reproducible framework 3D genomic structure provides quantitative understanding alterations structures under conditions. yielded by serves as an architectural...
Ransomware is a new business model for cybercrime which mainly targets individual users and machines. Many events have shown how profitable the technique can be. Industrial control systems (ICS) are becoming next domain. More more researchers attackers become focus on this field presented some ICS ransomware. But existing ransomware theoretically feasible has limited effect real ICS. In work, we present ICS-BROCK, full-fledged that compromise real-world. To demonstrate capability of use...
Direct query to IP geolocation databases is a convenient and widespread way for determining geographic location where host with corresponding address is. However, many available on the Internet may not provide accuracy data as they claim. In this paper, we focus analyzing addresses of mainland China recorded in popular China-based databases. First, distributions characteristics blocks at different granularities are analyzed. Second, entries consistency comparisons among implemented those...
Website fingerprinting attack is an effective way to infer which web page a user browsing through anonymous network. Previous studies focused more on the selection of traffic features and improvements in traditional classification methods. In this paper, we present new website technique based deep learning. The method uses complex neural network automatically learn classify fingerprints. model two-layer GRU extract time feature 50-layer residual spatial fingerprint. main idea resides fact...
To examine the effects of 2,4-dihydroxybenzophenone (BP-1), a benzophenone derivative used as an ultraviolet light absorbent, on acetaminophen (APAP)-induced hepatotoxicity in C57BL/6J mice.Mice were administered orally with BP-1 at doses 200, 400 and 800 mg/kg body weight respectively every morning for 4 d before hepatotoxic dose APAP (350 weight) was given subcutaneously. Twenty four hours after intoxication, serum enzyme including alaine aminotransferase (ALT), aspartate (AST), lactate...
Nowadays, the challenge of learning from large scale and imbalanced data set have attracted a great deal attention both industry academia, which is also deemed to be an important task for fraud detection in telecommunication, finance, online commerce. In general, it's almost impossible train classification model on complete set, especially era big data, due space-time complexity. Thus, how sample training original large-scale that can provide more accurate prediction result has become focal...
Dinucleotide densities and their distribution patterns vary significantly among species. Previous studies revealed that CpG is susceptible to methylation, enriched at topologically associating domain boundaries its along the genome correlates with chromatin compartmentalization. However, multi-scale organizations of in linear genome, role organization, how they change evolution are only partially understood. By comparing different genomic length scales, we quantify difference between...
Abstract High-throughput chromosome conformation capture (Hi-C) technique profiles the genomic structure in a genome-wide fashion. The reproducibility and consistency of Hi-C data are essential characterizing dynamics structures. We developed diffusion-based method, C T G (Hi-C To Geometry), to deal with technical bias induced by insufficient sampling sequencing obtain reliable gemeotric information chromatin. properly quantifies dubiously weak or even undetected interactions produces...
Phase images derived from imaging devices are usually wrapped into discontinuous images, so phase unwrapping is needed for image reconstruction. The wrap counts of every voxel determined by the assumption that true spatially continuous. However, it difficult to distinguish whether jump caused or noise. In this paper, a new 3D method proposed using Markov Random Fields. formulated as discrete energy minimization problem defined on MRF. Experimental results show substantial improvements in and...