- Cloud Data Security Solutions
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- DNA and Biological Computing
- Privacy, Security, and Data Protection
- Security and Verification in Computing
- Access Control and Trust
- Cellular Automata and Applications
- Vehicular Ad Hoc Networks (VANETs)
- Advanced MIMO Systems Optimization
- Numerical methods for differential equations
- Advanced biosensing and bioanalysis techniques
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Advanced Vision and Imaging
- Mobile Agent-Based Network Management
- Differential Equations and Numerical Methods
- IPv6, Mobility, Handover, Networks, Security
- Service-Oriented Architecture and Web Services
- Network Traffic and Congestion Control
- Blind Source Separation Techniques
- Digital Transformation in Industry
- Network Packet Processing and Optimization
- Wireless Communication Security Techniques
- Explainable Artificial Intelligence (XAI)
Henan Polytechnic University
2012-2024
Huazhong University of Science and Technology
2023-2024
Ministry of Education of the People's Republic of China
2023
Jilin University
2023
China Electronics Technology Group Corporation
2023
Harbin Institute of Technology
2016
Harbin University of Commerce
2013
Wuhan University of Technology
2011
Beijing University of Posts and Telecommunications
2009-2010
Cloud manufacturing (CMfg) has become a brand-new service-oriented networked manufacturing. The key technology that achieves this manufacture mode is to aggregate all kinds of potential CMfg services create value-added composite services, so as satisfy various requirements. As massive with the same functionalities and different quality service (QoS) are emerging on Internet, dynamic composition becomes more complex. One challenge how efficiently solve problem multipath composition. Another...
The swift advancement in communication technology alongside the rise of Medical Internet Things (IoT) has spurred extensive adoption diverse sensor-driven healthcare and monitoring systems. While rapid development systems is underway, concerns about privacy leakage medical data have also attracted attention. Federated learning plays a certain protective role data, but studies shown that gradient transmission under federated environments still leads to leakage. Therefore, we proposed secure...
In this paper, we propose a multi-object tracking framework for videos captured by UAVs, considering motion imperfection in the following two aspects: 1) blurring of objects due to high-speed UAV and objects, deteriorating performance detector; 2) coupling global movement camera with object motion, resulting nonlinearity trajectories adjacent frames further more difficult predict. For blurring, paper proposes hybrid deblurring module that deals blurred while retaining clear frames, trading...
The security strength of the traditional one-time-pad encryption system depends on randomness secret key. However, It can hardly to generatea truerandom key by using existing technologies and methods, it is also difficult issue store random keywhich at least as long plaintext. Therefore, we pay more attention logical operation used in decryption but not how generate calculator, a three-dimensional DNA self-assembly pyramid structure, designed construct four common operations (AND, OR, NOT,...
We propose two novel methods to improve the source location privacy security protection and node energy utilization in Wireless sensor networks (WSN). A preservation protocol for WSN based on angles(APS) an Enhanced (EAPS), which dynamically adjusts emission radius during routing. The APS produces geographically dispersed phantom nodes utilizes from energy-abundant regions make routing path versatile among entire network. In EAPS protocol, according number of its own adjacent nodes, residual...
In order to solve the problems of low computational security in encoding mapping and difficulty practical operation biological experiments DNA-based one-time-pad cryptography, we proposed a cipher algorithm based on confusion DNA storage technology. our constructed algorithm, methods such as chaos map, mapping, table simulating process are used increase key space. Among them, provide realization conditions for transition data information. By selecting parameters confounding parameters,...
Remote platform integrity attestation is a method by which client attests its hardware and software configuration to remote server. The goal of enable challenger determine the level trust in another attestator's configuration. However, existing reporting protocol vulnerable man-in-the-middle(MITM) attacks. In this paper, we describe kind attacks against protocols for attestation, propose security-enhanced scheme preventing man-in-the middle
Due to the advantages of low latency, power consumption and high flexibility FPGA-based acceleration technology, it has been more widely studied applied in field computer vision recent years. An feature extraction tracking accelerator for real-time visual odometry (VO) simultaneous localization mapping (V-SLAM) is proposed, which can realize complete processing capability image front-end directly output point ID coordinates backend. The consists preprocessing, pyramid processing, optical...
To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt bilinear pairing theory to propose an identity-based batch scheme for VANET.The tamper-proof device on-board unit trusted authority jointly realize anonymity vehicle identity signature messages, which further enhances this scheme, as well reduces overhead authority.Batch can improve VANET.Security analyses demonstrate that not only satisfies such properties anonymity,...
This paper is devoted to the stability and convergence analysis of two-step Runge-Kutta (TSRK) methods with Lagrange interpolation numerical solution for nonlinear neutral delay differential equations. Nonlinear D-convergence are introduced proved. We discuss the<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mtext>GR</mml:mtext><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>l</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math>-stability,<mml:math...
Aimed at improving the security and efficiency of anonymous authentication in vehicular ad hoc network (VANET), a certificateless batch scheme without bilinear pairings is put forward. By coordinating Trust Authority (TA) vehicles to generate public/private key pairs pseudonyms, system freed from dependency on tamperproof devices. Through comprehensive analyses, this proved not only be able realize such properties as authentication, anonymity, traceability, unforgeability, forward or...
A split-step theta (SST) method is introduced and used to solve the nonlinear neutral stochastic delay differential equations (NSDDEs). The mean square asymptotic stability of for studied. It proved that under one-sided Lipschitz condition linear growth condition, with<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mi mathvariant="normal">θ</mml:mi><mml:mo>∈</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mn...
Artificial intelligence (AI) has immense potential in time series prediction, but most explainable tools have limited capabilities providing a systematic understanding of important features over time. These typically rely on evaluating single point, overlook the ordering inputs, and neglect time-sensitive nature applications. factors make it difficult for users, particularly those without domain knowledge, to comprehend AI model decisions obtain meaningful explanations. We propose CGS-Mask,...
Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed.On basis anonymized identities users and candidates who request LBS, this adopts similarity function to select candidate whose most certain time intervals, then selected substitutes user send LBS request, so as protect like identity, query trajectory.Security analyses prove that able guarantee such...
Machine learning models are increasingly used in time series prediction with promising results. The model explanation of falls behind the development and makes less sense to users understanding decisions. This paper proposes ES-Mask, a post-hoc model-agnostic evolutionary strip mask-based saliency approach for applications. ES-Mask designs mask consisting strips same salient value consecutive steps produce binary sustained feature importance scores over easy interpretation series. uses an...
Mobile terminals boost the prosperity of location-based service (LBS) which have already involved in every aspect People's daily life and are increasingly used various industries. Aimed at solving security efficiency problem existing location privacy protection schemes, a K-anonymity preservation scheme based on mobile terminal is proposed. Firstly, number rational dummy locations selected from cloaking region, more favorable further filtered according to entropy, so better anonymity effect...
In this study, we consider a multiway massive multi-input multi-output (MIMO) relay network over Rician fading channels, where all users intend to share their information with the other via amplify-and-forward (AF) relays equipped great number of antennas. More practical, imperfect channel state (CSI) is taken into account. To evaluate performance considered networks, derived an analytical approximation expression for spectral efficiency zero-forcing (ZF) receivers in closed form. obtain...
One of the important technologies in trusted computing is secure storage. The key management one However, there a synchronization problem existing authorization mechanism for Trusted Computing Platform. To solve problem, we propose log-based scheme plaform. new can effectively enhance trust and security storage through constructing an information log all keys.
The NAC (network access control) technology which enforces the endpoint decision based on collected security status information and platform measurement has been developed by various companies widely deployed in intranets. Besides intranet, mobile telecommunication networks also find is required. This paper introduces main solutions industry analyzes essential of current technologies perspective protocol. And then this describes explicit requirement remote integrity validation may utilize...
To solve the problems of policy compatibility which are caused by multiple heterogeneous policies that were used in a single virtual organization, new mapping model is proposed. The mapped local to Ponder objects be instanced with different parameters based on language. Each type defined as base class, each class can dynamically generate one or more execution requirements and overloaded parameters. testing results prototype system show realize unified management contribute implementation...
This article combines FBLMS algorithm with the blind decision algorithm, and proposes a frequency domain equalization which can be applied in ATSC 8VSB system. In addition, shortcoming of poor tracking capability traditional dynamic channel, this paper new equalizer tap update method effectively improve time-varying channel. The simulation indicates that improved significantly performance both static multi-path channels.