Ze Jin

ORCID: 0000-0003-3379-5113
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • AI in cancer detection
  • Advanced Malware Detection Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Medical Image Segmentation Techniques
  • IoT and Edge/Fog Computing
  • Vehicle License Plate Recognition
  • Innovative Educational Techniques
  • Network Security and Intrusion Detection
  • Handwritten Text Recognition Techniques
  • Security and Verification in Computing
  • Higher Education and Teaching Methods
  • Educational Reforms and Innovations
  • Medical Imaging Techniques and Applications
  • Privacy, Security, and Data Protection
  • Thin-Film Transistor Technologies
  • COVID-19 diagnosis using AI
  • Face recognition and analysis
  • Biometric Identification and Security
  • Internet Traffic Analysis and Secure E-voting
  • Medical Imaging and Analysis
  • Image Retrieval and Classification Techniques
  • Face and Expression Recognition
  • Image Processing and 3D Reconstruction
  • Brain Tumor Detection and Classification
  • User Authentication and Security Systems

Chinese Academy of Sciences
2023-2025

University of Chinese Academy of Sciences
2022-2025

Ningbo Institute of Industrial Technology
2025

Tokyo Institute of Technology
2020-2024

Institute of Information Engineering
2022-2024

National Institute of Information and Communications Technology
2022

Indiana University Bloomington
2022

Suzuki (Japan)
2021

California University of Pennsylvania
2019

University of Pennsylvania
2019

Abstract As a progressive security strategy, the zero trust model has attracted notable attention and importance within realm of network security, especially in context Internet Things (IoT). This paper aims to evaluate current research regarding highlight its practical applications IoT sphere through extensive bibliometric analysis. We also delve into vulnerabilities explore potential role mitigating these risks via thorough review relevant schemes. Nevertheless, challenges associated with...

10.1186/s42400-024-00212-0 article EN cc-by Cybersecurity 2024-05-03

Abstract Organic solar cells now surpass 20% efficiency in small‐area devices, but the use of chloroform as a solvent poses industrial scalability challenges because its limited ability uniform film formation and toxicity. High‐boiling, non‐halogenated solvents are being studied alternatives, their low solubility slow evaporation complicate crystallization process. Here, study introduces seed crystal strategy by incorporating oligo (ethylene glycol)‐modified small‐molecule donors to optimize...

10.1002/adma.202420308 article EN Advanced Materials 2025-02-26

Java is one of the preferred options modern developers and has become increasingly more prominent with prevalence open-source culture. Thanks to serialization deserialization features, programs have flexibility transmit object data between multiple components or systems, which significantly facilitates development. However, features may also allow attackers construct gadget chains lead vulnerabilities. Due highly flexible customizable nature deserialization, finding an exploitable chain...

10.1109/dsn58367.2023.00028 article EN 2023-06-01

Modern IoT device manufacturers are taking advantage of the managed Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) clouds (e.g., AWS IoT, Azure IoT) for secure convenient development/deployment. The access control is achieved by manufacturer-specified, cloud-enforced policies (cloud-standard JSON documents, called Policies) stating which users can devices/resources under what constraints. In this paper, we performed a systematic study on security cloud-based modern...

10.1145/3548606.3560680 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

10.1016/j.engappai.2023.107774 article EN Engineering Applications of Artificial Intelligence 2023-12-28

Data augmentation enhances the accuracy of DL models by diversifying training samples through a sequence data transformations. While recent advancements in have demonstrated remarkable efficacy, they often rely on computationally expensive and dynamic algorithms. Unfortunately, current system optimizations, primarily designed to leverage CPUs, cannot effectively support these methods due costs limited resource availability. To address issues, we introduce FusionFlow, that cooperatively...

10.14778/3636218.3636238 article EN Proceedings of the VLDB Endowment 2023-12-01

Many medical image processing and analysis operations can benefit a great deal from prior information encoded in the form of models/atlases to capture variations over population form, shape, anatomic layout, appearance objects. However, fundamental question "How many models/ atlases are needed for optimally encoding address differing body habitus factor given population?" has remained difficult open problem. We propose method seek an answer this assuming that set Ι images representative...

10.1117/12.2513073 article EN Medical Imaging 2022: Image Processing 2019-03-15

10.2991/iserss-19.2019.84 article EN cc-by-nc Proceedings of the 2nd International Seminar on Education Research and Social Science (ISERSS 2019) 2019-01-01

Third-party advertising libraries, which furnish mobile applications with ads, offer a revenue stream for Android application developers. However, the loaded ads potentially expose users to privacy infringements and security threats. For instance, tracking scripts embedded in third-party monitor user behavior can entice into downloading malicious files. Therefore, detection of libraries is crucial protection serves as foundation preventing from compromising privacy.

10.1145/3627106.3627182 article EN cc-by Annual Computer Security Applications Conference 2023-12-02

10.7544/issn1000-1239.2018.20180087 article EN Journal of Computer Research and Development 2018-07-01

10.2991/iserss-19.2019.228 article EN cc-by-nc Proceedings of the 2nd International Seminar on Education Research and Social Science (ISERSS 2019) 2019-01-01

Medical image processing and analysis operations, particularly segmentation, can benefit a great deal from prior information encoded to capture variations over population in form, shape, anatomic layout, appearance of objects. Model/atlas-based methods are extant medical segmentation. Although multi-atlas/ multi-model have shown improved accuracy for if the atlases/models do not cover representatively distinct groups, then may be generalizable new populations. In previous study, we given an...

10.1117/12.2549827 article EN 2020-03-16
Coming Soon ...