- Advanced Computational Techniques and Applications
- Blockchain Technology Applications and Security
- Access Control and Trust
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Data Mining Algorithms and Applications
- Data Management and Algorithms
- Web Applications and Data Management
- Service-Oriented Architecture and Web Services
- Digital Rights Management and Security
- Human Mobility and Location-Based Analysis
- Cryptography and Data Security
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Video Analysis and Summarization
- Advanced Steganography and Watermarking Techniques
- Advanced Decision-Making Techniques
- Cryptographic Implementations and Security
- Cloud Computing and Resource Management
- Web and Library Services
- Geographic Information Systems Studies
- Privacy, Security, and Data Protection
- Rough Sets and Fuzzy Logic
- Advanced Malware Detection Techniques
Hebei University
2008-2025
Chinese Academy of Sciences
2013-2024
Institute of Geographic Sciences and Natural Resources Research
2024
China Guodian Corporation (China)
2024
Alibaba Group (China)
2022
Yanshan University
2009-2021
Tufts University
2021
Fujian Electric Power Survey & Design Institute
2021
NARI Group (China)
2019
Renmin University of China
2018
Length of stay is a vital element in tourists’ decision-making process and tourism demand. Divergent results studies concerning connections between length tourist expenditures imply the saturation effect often-repeated extended stay. To address this research gap, current analyzes influences on expenditure, visitor satisfaction, intentions to recommend revisit. With survey data from visitors world-renowned gaming destination, study empirically verified proposed existence trip duration. This...
ABSTRACT Scene memory generation (SMG) refers to training AI agents recall scene memories similarly the human brain. This is key work realize artificial system. The challenge generate scenes rich in motion and keep it realistic while ensuring temporal consistency. Inspired by principles of function brain neuroscience, this paper proposes a motion‐aware model named SMG based on style modulation (SMG‐MATSM), which ensures consistency redesigning latent representation constructing matrix guide...
Government information resource (GIR) sharing, an important means for efficient government working, requires new technology to enhance its reliability and security. Blockchain, as emerging building decentralized applications, is gradually penetrating various fields. In this paper, we present a technical combination that consists of Blockchain structure, network sharing model consensus algorithms. With these techniques, design implement Blockchain-based GIR system (BGIRSS), which...
The bitcoin peer-to-peer network has drawn significant attention from researchers, but so far mostly focused on publicly visible portions of the network, i.e., reachable peers. This ignores hidden parts network: unreachable Bitcoin peers behind NATs and firewalls. In this paper, we characterize that might be or firewalls different perspectives. Using a special-purpose measurement tool conduct large scale study discover several previously unreported usage patterns: small number are involved...
Data uncertainty is inherent in emerging applications such as location-based services, sensor monitoring systems, and data integration. To handle a large amount of imprecise information, uncertain databases have been recently developed. In this paper, we study how to efficiently discover frequent itemsets from databases, interpreted under the Possible World Semantics. This technically challenging, since an database induces exponential number possible worlds. tackle problem, propose novel...
AbstractThe shortest path problem lies at the heart of network flows that seeks for paths with minimum cost from source node to sink in networks. This paper presents a hybrid genetic-ant colony optimization algorithmic approach optimal selection problem. First, some existing solutions are analyzed, and shortages flaws pointed out. Second, data organization method road based on graph theory is proposed. Furthermore, algorithm integrated sinusoidal probability transfer rules, pheromone update...
Sequential Recommendation aims to predict the next item by mining out dynamic preference from user previous interactions. However, most methods represent each as a single fixed vector, which is incapable of capturing uncertainty item-item transitions that result time-dependent and multifarious interests users. Besides, they struggle effectively exploit side information helps better express preferences. Finally, noise in user's access sequence, due accidental clicks, can interfere with...
Abstract For many years, non‐repudiation in data delivery has not been satisfactorily achieved due to the difficulty of supervising behavior. Existing fair protocols are still entirely free third parties who usually as trustworthy expected. Moreover, most them built on complex encryption schemes, resulting inefficiencies when handling large chunks and non‐exchanged sharing. To be able deliver without repudiation, we propose staged protocol (SDDP) that integrates into Blockchain consensus...
Aiming at the demand for information system password encryption protection, this paper proposed a new set of storage and transmission model. In process encryption, built two keys included main key working key, is responsible updated automatically regular intervals. using AES algorithm, improved process, adopted method adding random number as to encrypted password. On basis, introduced RSA compared with in encryption. Experiments show that advanced faster than has higher practicability security.
In board games, game-logs record past game processes, which can be regarded as an accumulation of experience. Similar to a real person, computer player gradually increase its skill by learning from game-logs. Therefore, the becomes more interesting. This paper proposes extensible approach mine experiential patterns increasing The improves strategies utilizing these growing patterns, just it acquires To evaluate effect and performance approach, we designed sample test platform elaborated...
Changing the store layout of a shopping mall is usually costly in terms time, resources, and money. Balancing customer flow obviously an economical way to rationalize without displacing stores or changing their locations. However, it has long been big challenge for managers malls, because difficult build trust among sake regulating flow. This depends on multi-party cooperation model, which agreements are implemented asymmetric information. Unfortunately, any form endorsement with human...
P2P e-commerce as a new shopping pattern is developing rapidly, and users can transact with anybody anytime anywhere in the system, but often interact strangers, hence building trust among users, make know each other well, estimate risk of participating transaction, enable to securely system an urgent problem be solved for nowadays. In order settle problem, this paper provides novel reputation-based model system. The main thought proposed that node has two types reputation: local reputation...
In this paper, we introduced some concepts, technologies and applications of digital rights management first. According to the got a kind DRM solution for mobile journals publishing based on OMA 2.0 devices' characteristics. Especially, focused security mechanism in new system, such as encrypting, decrypting keys transmission technologies.
Spatial data mining can mine automatically or semi-automatically unknown, creditable, effective, integrative schematic knowledge which be understood from the increasingly complex spatial database and enhance ability of interpreting to generate useful knowledge. There are large amounts existing in government GIS. However, a great deal is idle, has caused huge waste due rarely effectively utilization practice. It very necessary with task based on Government In this paper, an example land cover...
The subway system as the most important transportation for daily urban commuting is a typical non-equilibrium complex system. Unlike systems composed of single type basic units, consists 2 types units with service relationship: passengers demander services and trains supplier services. main challenge operation arises from passenger stranding at stations, which arise spatiotemporal mismatch supply scale demand scale. There special phenomenon propagation (PPS) within stations in by forming...
<title>Abstract</title> With the widespread deployment of Internet Things (IoT) devices, security issues with identity authentication are becoming increasingly prominent. Traditional methods cannot adequately meet requirements for managing multiple devices in IoT contexts. Therefore, we propose an innovative multi-device mechanism (MDIAM), which is designed based on fuzzy extractor and blockchain technology. MDIAM enables users to set different credentials using just one fingerprint. The...
<title>Abstract</title> The rapid growth of IoT devices and the increasing demand for device interaction between different network partitions have significantly pressured management. To realize cross-domain trust integration partitioned devices, management becomes key technology to communication. However, heavily relies on third-party entities, posing centralized risks. Therefore, we propose an system based federated learning blockchain. By utilizing assess reputation ratings while...