- AI in cancer detection
- Advanced Malware Detection Techniques
- Radiomics and Machine Learning in Medical Imaging
- Medical Image Segmentation Techniques
- IoT and Edge/Fog Computing
- Vehicle License Plate Recognition
- Innovative Educational Techniques
- Network Security and Intrusion Detection
- Handwritten Text Recognition Techniques
- Security and Verification in Computing
- Higher Education and Teaching Methods
- Educational Reforms and Innovations
- Medical Imaging Techniques and Applications
- Privacy, Security, and Data Protection
- Thin-Film Transistor Technologies
- COVID-19 diagnosis using AI
- Face recognition and analysis
- Biometric Identification and Security
- Internet Traffic Analysis and Secure E-voting
- Medical Imaging and Analysis
- Image Retrieval and Classification Techniques
- Face and Expression Recognition
- Image Processing and 3D Reconstruction
- Brain Tumor Detection and Classification
- User Authentication and Security Systems
Chinese Academy of Sciences
2023-2025
University of Chinese Academy of Sciences
2022-2025
Ningbo Institute of Industrial Technology
2025
Tokyo Institute of Technology
2020-2024
Institute of Information Engineering
2022-2024
National Institute of Information and Communications Technology
2022
Indiana University Bloomington
2022
Suzuki (Japan)
2021
California University of Pennsylvania
2019
University of Pennsylvania
2019
Abstract As a progressive security strategy, the zero trust model has attracted notable attention and importance within realm of network security, especially in context Internet Things (IoT). This paper aims to evaluate current research regarding highlight its practical applications IoT sphere through extensive bibliometric analysis. We also delve into vulnerabilities explore potential role mitigating these risks via thorough review relevant schemes. Nevertheless, challenges associated with...
Abstract Organic solar cells now surpass 20% efficiency in small‐area devices, but the use of chloroform as a solvent poses industrial scalability challenges because its limited ability uniform film formation and toxicity. High‐boiling, non‐halogenated solvents are being studied alternatives, their low solubility slow evaporation complicate crystallization process. Here, study introduces seed crystal strategy by incorporating oligo (ethylene glycol)‐modified small‐molecule donors to optimize...
Java is one of the preferred options modern developers and has become increasingly more prominent with prevalence open-source culture. Thanks to serialization deserialization features, programs have flexibility transmit object data between multiple components or systems, which significantly facilitates development. However, features may also allow attackers construct gadget chains lead vulnerabilities. Due highly flexible customizable nature deserialization, finding an exploitable chain...
Modern IoT device manufacturers are taking advantage of the managed Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) clouds (e.g., AWS IoT, Azure IoT) for secure convenient development/deployment. The access control is achieved by manufacturer-specified, cloud-enforced policies (cloud-standard JSON documents, called Policies) stating which users can devices/resources under what constraints. In this paper, we performed a systematic study on security cloud-based modern...
Data augmentation enhances the accuracy of DL models by diversifying training samples through a sequence data transformations. While recent advancements in have demonstrated remarkable efficacy, they often rely on computationally expensive and dynamic algorithms. Unfortunately, current system optimizations, primarily designed to leverage CPUs, cannot effectively support these methods due costs limited resource availability. To address issues, we introduce FusionFlow, that cooperatively...
Many medical image processing and analysis operations can benefit a great deal from prior information encoded in the form of models/atlases to capture variations over population form, shape, anatomic layout, appearance objects. However, fundamental question "How many models/ atlases are needed for optimally encoding address differing body habitus factor given population?" has remained difficult open problem. We propose method seek an answer this assuming that set Ι images representative...
Third-party advertising libraries, which furnish mobile applications with ads, offer a revenue stream for Android application developers. However, the loaded ads potentially expose users to privacy infringements and security threats. For instance, tracking scripts embedded in third-party monitor user behavior can entice into downloading malicious files. Therefore, detection of libraries is crucial protection serves as foundation preventing from compromising privacy.
Medical image processing and analysis operations, particularly segmentation, can benefit a great deal from prior information encoded to capture variations over population in form, shape, anatomic layout, appearance of objects. Model/atlas-based methods are extant medical segmentation. Although multi-atlas/ multi-model have shown improved accuracy for if the atlases/models do not cover representatively distinct groups, then may be generalizable new populations. In previous study, we given an...