- Caching and Content Delivery
- Network Packet Processing and Optimization
- Network Security and Intrusion Detection
- Algorithms and Data Compression
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- Simulation and Modeling Applications
- Carbon and Quantum Dots Applications
- Network Traffic and Congestion Control
- Industrial Technology and Control Systems
- Covalent Organic Framework Applications
- Interconnection Networks and Systems
- Peer-to-Peer Network Technologies
- Advanced Computational Techniques and Applications
- Educational Technology and Assessment
- Multimodal Machine Learning Applications
- Natural Language Processing Techniques
- IPv6, Mobility, Handover, Networks, Security
- Traffic Prediction and Management Techniques
- Radiomics and Machine Learning in Medical Imaging
Philips (China)
2022-2025
Beijing Institute of Technology
2014-2024
Beijing Institute of Education
2024
Shanghai Jiao Tong University
2024
Chongqing University
2021-2023
Civil Aviation Administration of China
2022
Beijing University of Posts and Telecommunications
2022
Beijing Institute of Big Data Research
2022
Qiqihar Medical University
2022
Beijing Haidian Hospital
2020
Named-based packet forwarding represents a core characteristic of many information-centric networking architectures. IP-inspired methods are not suitable because a) name-based must support variable-length keys unbounded length, and b) namespaces for data substantially larger than the global address prefix rulesets used in today's Internet. In this paper, we introduce evaluate an approach that can realistically scale name to billions prefixes. Our driven by two key insights. First, show that,...
Vehicular named data networking (VNDN) is a architecture candidate to support various kinds of content-oriented applications in high dynamic topology environment. Its inherent in-network caching facilitates content delivery and the communication efficiency vehicular network. However, during process delivery, fast varying vehicle mobility changes position relay routers, which makes packet delivered through reverse path difficult. Furthermore, frequent link disruption retransmission lead...
Pattern matching is one of the most important components for content inspection based applications network security, and it requires well designed algorithms architectures to keep up with increasing speed. For solutions, AC its derivative are widely used. They on DFA model but utilize large amount memory because so many transition rules. An algorithm, called ACC, presented in this paper multiple pattern matching. It uses a novel model, namely cached deterministic finite automate (CDFA). In...
Although information-centric networking (ICN) can boost the performance of sensor data delivery in wireless networks (WSNs), its energy efficiency may be significantly impaired due to receiver-driven request-response transmission model. ICN sensors have keep long-time active mode wait for requests that arrive at any time, resulting nontrivial waste energy-constrained WSNs. An intuitive method conserve is schedule partial nodes fall asleep, but cost extra fetching delay. In this work, we...
URL filtering systems provide a simple and effective way to prevent people from browsing undesirable or malicious Websites. These require well-designed lookup method as the core operation. A high-performance engine is proposed in this paper for systems. It combines compression algorithm with multiple string matching based (Wu-Manber-like) algorithm. Using method, can achieve high performance efficient memory utilization storing ever-increasing blacklist ability of prefix matching....
Partial domain adaptation (PDA) attempts to learn transferable models from a large-scale labeled source small unlabeled target with fewer classes, which has attracted recent surge of interest in transfer learning. Most conventional PDA approaches endeavor design delicate weighting schemes by leveraging predictions align cross-domain distributions the shared class space. Accordingly, two crucial issues are overlooked these methods. First, prediction is double-edged sword, and inaccurate will...
Vehicular Named Data Networking (VNDN) is a promising information-centric network architecture to achieve efficient data delivery among vehicles. With subscription-based communication paradigm, it can disseminate event-triggered like traffic updates or road accident notifications in timely way. However, due vehicle mobility and dynamics, the subscription path normally fragile consequently dissemination efficiency would be diminished. To address this problem, we propose SegSub, an adaptive...
Vehicular named data networking (VNDN) is a potential candidate to be deployed in information rich applications of vehicular communication. Due vehicle mobility, it difficult construct stable and reliable connections between nodes. Consequently, VNDN suffering low quality experience heavy network load transmission. In order solve these problems improve performance, we propose Cluster-based Selective Cooperative Caching (CSCoC) strategy VNDN. The main idea CSCoC cache popular at set vehicles...
Efficient automatic segmentation of multi-level (i.e. main and branch) pulmonary arteries (PA) in CTPA images plays a significant role clinical applications. However, most existing methods concentrate only on PA or branch separately ignore efficiency. Besides, there is no public large-scale dataset focused segmentation, which makes it highly challenging to compare the different methods. To benchmark algorithms, we organized first \textbf{P}ulmonary \textbf{AR}tery \textbf{SE}gmentation...
Existing communication protocols for mobile ad hoc networks (MANETs) mis-fit flying (FANETs) due to their exclusive design challenges on the typical long distance and high mobility degree of nodes. To tackle them, we introduce a hybrid omnidirectional multi-beam directional antenna structure gradient-elastic control-data separation. Based dual antennas, further propose novel strategy, which combines location prediction with target tracing, catch trace targets by adaptively exchanging...
Space–air–ground Internet of Vehicle networks is a promising network paradigm to support diverse vehicular services. Exploiting the unique advantages spatial, aerial, and terrestrial segments, Quality Service (QoS) different services can be met by smart access selection. However, integrated inevitably has face many challenges, such as dynamic topology, heterogeneous resources, long propagation latency, which seriously degrade QoS performance. In order provide guarantee vehicles, we propose...
Segmentation ambiguity in generative linguistic steganography could induce decoding errors. One existing dis-ambiguating way is removing the tokens whose mapping words are prefixes of others each candidate pool. However, it neglects probability distribution candidates and degrades imperceptibility. To enhance steganographic security, meanwhile addressing segmentation ambiguity, we propose a secure disambiguating approach for steganography. In this letter, focus on two questions: (1) Which...
Abstract Wind-induced vibration (WIV) and power extraction performances of a circular cylinder with symmetrically installed fin-shaped rods (FSR) were experimentally numerically investigated under different coverages. The FSR coverage which is expressed as an angle ( α ) measured from the upstream edge to downstream rod. effect installation θ stagnation point rod was also considered in this work. exposed uniform wind allowed vibrate cross-flow direction. output electric realized by...
Heterogeneous domain adaptation (HDA) is expected to achieve effective knowledge transfer from a label-rich source heterogeneous target with scarce labeled data. Most prior HDA methods strive align the cross-domain feature distributions by learning invariant representations without considering intrinsic semantic correlations among categories, which inevitably results in suboptimal performance across domains. Therefore, address this issue, we propose novel <italic...
With the rapid expansion of customer population and link bandwidth, energy expenditures Internet have been rising dramatically. To gain efficiency, we propose a novel router architecture, which allows each its modules to adjust frequency according traffic loads. Several modulation strategies are also discussed ensure dwell time on low states reduce blind switches. Our preliminary results show that adjustment could save up 40% total consumption.
The theoretical and computational aspects of weighted Voronoi diagrams have been widely researched applied, but few algorithms are implemented in combination with the geographic information system software for practical use. A general vector-based approach is proposed to generate multiplicatively diagrams, additively power points by using methods region division union based on ArcGIS Engine, aiming establish a kind spatial data model used boundary division, urban centricity expression force...
Energy efficient routers are important and promising devices in the roadmap toward green networking. In this paper, we explore topic with a traffic aware design that can automatically adapt router's energy consumption to network real time transitions at scale from microseconds nanoseconds. make three contributions. First, propose an router architecture using frequency scaling, which is extended contemporary line card of router. Second, prototype our on gigabit NetFPGA platform, extends...
Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate attacks and propagate malwares, posing serious threats cybersecurity. Current normally conduct small-volume transmission under the covers of various disguising techniques, making them hard detect especially when a detector has little priori knowledge their traffic features. In this article, we propose generic sensitive detection approach, which simultaneously (i) identify types without (ii) maintain...