- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Advanced Computational Techniques and Applications
- Higher Education and Teaching Methods
- Digital and Cyber Forensics
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Inertial Sensor and Navigation
- Multi-Criteria Decision Making
- Caching and Content Delivery
- Advanced Decision-Making Techniques
- Astronomical Observations and Instrumentation
- Traffic Prediction and Management Techniques
- Experimental Learning in Engineering
- Advanced Numerical Analysis Techniques
- Technology and Security Systems
- Advanced Algorithms and Applications
- Reinforcement Learning in Robotics
- Educational Reforms and Innovations
- Security and Verification in Computing
- Advanced Wireless Communication Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Economic Development and Digital Transformation
- User Authentication and Security Systems
- Advanced Data and IoT Technologies
University of Waterloo
2024
Beijing Institute of Fashion Technology
2024
University of Windsor
2020-2022
Tianjin University
2020
Texas A&M University – Corpus Christi
2019-2020
The University of Texas at San Antonio
2015-2019
Shenyang University
2014
Hebei University
2013
Dalian University of Technology
2012
Hubei University
2009-2011
The Android mobile platform supports billions of devices across more than 190 countries around the world. This popularity coupled with user data collection by apps has made privacy protection a well-known challenge in ecosystem. In practice, app producers provide policies disclosing what information is collected and processed app. However, it difficult to trace such claims corresponding code verify whether implementation consistent policy. Existing approaches for policy alignment focus on...
Nowadays, Apple iOS and Android are two most popular platforms for mobile applications. To attract more users, many software companies organizations migrating their applications from one platform to the other, besides source files, they also need migrate GUI tests. The migration of tests is tedious difficult be automated, since have subtle differences there often few or even no migrated learning. address problem, in this paper, we propose a novel approach, TestMig, that migrates Android,...
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower sectors being smart, autonomous, efficient, safety. However, due the large number build-in IIoT smart devices, systems are vulnerable side-channel attack. In this article, a novel side-channel-based passwords cracking system, namely MAGLeak, is proposed recognize victim's by leveraging accelerometer, gyroscope, magnetometer touch-screen device. Specifically, event-driven data...
The integration of the space–air–ground-integrated network and Internet Vehicles (IoV) enables IoV to achieve full coverage better performance. However, large scale complex cooperation mechanism make credibility nodes in service delivery questioned. In this article, hardware trusted module is used as root trust build chain running environment provide protection state attestation for services. order overcome large-scale high-concurrency performance bottlenecks remote verification states IoV,...
Resisting the adversarial sample attack on encrypted traffic is a challenging task in Intelligent Transportation System. This paper focuses classification, samples and defense method for traffic. To be more specific, one-dimensional data firstly translated into two-dimensional images further utilization. Then different classification networks based deep learning algorithm are adopted to classify data. Moreover, various generation methods employed generate implement attacking process network....
Unmanned aerial vehicles (UAVs) have been recently considered as a flying platform to provide wide coverage and relaying services for mobile users (MUs). Mobile edge computing (MEC) is developed new paradigm improve quality of experience MUs in future networks. Motivated by the high flexibility controllability UAVs, this study, authors study multi-UAV-enabled MEC system, which UAVs computation resources offer offloading opportunities MUs, aiming reduce MUs' total consumptions terms time...
We propose a novel true random number generator using mouse movement and one‐dimensional chaotic map. utilize the x ‐coordinate of to be length an iteration segment our TRNs y initial value this segment. And, when it iterates, we perturb parameter with real produced by TRNG itself. And find that proposed conquers several flaws some former mouse‐based TRNGs. At last take experiments test randomness algorithm NIST statistical suite; results illustrate is suitable produce numbers (TRNs) on...
With the increasing usage of UAV in reconnaissance, agriculture, logistics and entertainment, it's necessary for multi-UAV to automatically avoid dynamic obstacles order ensure safety drones livings environment. The automatic obstacle avoidance is a classic multiple agent decision-making problem. Traditional algorithms, limited method state classification policy selection, are not applicable such complex scene including randomly cooperative decision-making. In this paper, Advantaged...
In distributed storage for Big Data systems, there is a need exact repair, high bandwidth codes. The challenge repair in big-data to simultaneously enable both very using Map-Reduce and simple coding schemes that also combine robust maximally distance separable (MDS) repair. MDS the rare, but exceptional outlier error patterns requiring optimum erasure code reconstruction. We construct fast sources. Our system uses Map-Reduce, algorithm combines with second decode cloud environment....
In the process of electric energy substitution, many industries have gradually replaced traditional consumption equipment with new electrical ones. To avoid disadvantage one-sidedness in evaluation and provide a more comprehensive reference for enterprises to replace equipment, two-dimensional model composed static dynamic rating is proposed this paper based on combined weighting algorithm, considering performance both inherent properties actual power features equipment. The parameters...
With the increasing of number edge-devices and demand real-time experience, end-edge-cloud hierarchical storage system (EECHSS) is emerged recently for reliable caching fast offloading massive amounts data. EECHSS can accommodate various services, save computing power improve capacity, due to transformation from central-cloud edge-cloud, considerable reducing service delay communication overhead. One main challenges brought by edge-cloud architecture consistency problem. It difficult...
For multiple transmitter-receiver pairs communication in a frequency-selective environment, typical power allocation method is the Iterative-Waterfilling (IW) algorithm. Main drawback of IW its poor convergence performance, including low probability and slow speed certain scenarios, which lead to high computational load. Large-scale network significantly magnifies above by lowering speed, difficult satisfy real-time requirements. In this work, we propose scheme based on convolutional neural...
In Intelligent Transportation microscopic study, driver's physical and psychological factors play an important role for driving decisions . Considered by static dynamic factors, this paper establishes 22 the car-following decision in hierarchy.We use principal component analysis gain that nine indicators a crucial decision-making.Conclusion article provides theoretical support establishment of next drive decision-making model
The scale of mobile users for parallel access is constrained by the capacity base stations. When extremely dense terminal exceeds stations, failure and a performance degradation will occur. early detection prediction important events timely possible large-scale are significant aspects in ensuring quality communication achieved. For automatic events, methods based on neural network can learn features automatically without feature engineering have been proven to be efficient event detection....
Accurate aircraft positioning is the key to construct a reliable network topology when aircrafts are used assist 6G cellular networks in ground communications. Distance Measuring Equipment (DME) has been widely with help of multiple ground-based radar stations. In this paper, learning-based health prediction method for airborne DME receiver proposed by using signal processing techniques achieve quantitative status assessment and failure degradation trend prediction, measure distance between...