- Human Mobility and Location-Based Analysis
- Digital and Cyber Forensics
- Mobile Agent-Based Network Management
- Memory Processes and Influences
- Memory and Neural Mechanisms
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Crime Patterns and Interventions
- Service-Oriented Architecture and Web Services
- Epilepsy research and treatment
- Advanced Technologies in Various Fields
- Software System Performance and Reliability
- Network Security and Intrusion Detection
- Humor Studies and Applications
- Domain Adaptation and Few-Shot Learning
- Economic and Technological Developments in Russia
- Sentiment Analysis and Opinion Mining
- Comics and Graphic Narratives
- Data Management and Algorithms
- Advanced Text Analysis Techniques
- Narrative Theory and Analysis
- Simulation and Modeling Applications
- Multimodal Machine Learning Applications
- Neural and Behavioral Psychology Studies
- Traffic Prediction and Management Techniques
National University of Singapore
2024
Wuhan University
2016-2022
Xidian University
2022
Beijing University of Posts and Telecommunications
2019
Peking University
2013-2016
Renmin University of China
2012
Zhen Ding Technology (Taiwan)
2012
Existing literature suggests that feedback could effectively reduce false memories in younger adults. However, it is unclear whether memory performance older adults also might be affected by feedback. The current study tested the hypothesis can use immediate to adjust their strategy, similar adults, but after removed, may not able maintain using strategy. Older will display more than due a reduction attentional resources. In Study 1, both and adjusted gist processing item-specific biases...
Heterogeneous model aggregation (HMA) is an effective paradigm that integrates on-device trained models heterogeneous in architecture and target task into a comprehensive model. Recent works adopt knowledge distillation to amalgamate the of learned features predictions from realize HMA. However, most them ignore disclosure exposes privacy attacks. Moreover, aggregated may suffer imbalanced supervision caused by uneven distribution amalgamated about each class show bias. In this article,...
We investigated the psychological mechanism of survival processing advantage from perspective false memory in two experiments. Using a DRM paradigm combination with analysis based on signal detection theory, we were able to separately examine participants' utilization verbatim representation and gist representation. Specifically, Experiment 1, participants rated semantically related words scenario for condition but pleasantness same lists non-survival control condition. The results showed...
Private user information can be compromised while revealing individual location data in widely used location-based social networks (LBSNs). In order to reveal the risk of privacy faced by users, we demonstrate a method, which transforms into Bayesian networks, infer private through and relationships among users LBSNs, such as Gowalla, regardless whether are active or inactive. Location from easily like consumption level. For example, people who frequently appear expensive restaurants likely...
This paper proposes a multiple factor bandwidth strategy (MFBS), an anonymity assessment scheme based on strategy. We first analyzed the path selection algorithm mechanism and constraint conditions then elaborated overall architecture key module design of MFBS scheme. A detailed was carried out so that it can be applied for evaluation Tor’s anonymous communication system. Finally, according to running data in node resource file network, we from different dimensions. By evaluating consumed by...
Abstract With the rapid development of IoT technology, medical is one current research focuses and hotspots. In practical application IoT, achieving accurate localization effective data fusion conducive to improving operational efficiency reducing power consumption network. Therefore, this paper uses SVM KNN algorithms improve accuracy, proposes an event-driven cluster-tree algorithm DFC based on special characteristics in IoT.The a combined topology dynamically partition clusters decide...