- Mathematical and Theoretical Epidemiology and Ecology Models
- Nonlinear Differential Equations Analysis
- Complex Network Analysis Techniques
- Advanced Differential Equations and Dynamical Systems
- Opinion Dynamics and Social Influence
- Network Security and Intrusion Detection
- Neural Networks Stability and Synchronization
- Advanced Authentication Protocols Security
- Advanced Semiconductor Detectors and Materials
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Spam and Phishing Detection
- Stability and Control of Uncertain Systems
- User Authentication and Security Systems
- COVID-19 epidemiological studies
- Security in Wireless Sensor Networks
- Adversarial Robustness in Machine Learning
- Marriage and Sexual Relationships
- Mine drainage and remediation techniques
- Semiconductor Quantum Structures and Devices
- Chalcogenide Semiconductor Thin Films
- Energy Efficient Wireless Sensor Networks
- Aerospace Engineering and Energy Systems
- Text and Document Classification Technologies
- Advanced Memory and Neural Computing
Nanjing University of Information Science and Technology
2025
Chongqing University of Technology
2014-2024
Shanghai University
2024
Guangdong University of Foreign Studies
2023
Sichuan University
2021
West China Hospital of Sichuan University
2021
Capital Normal University
2021
China National Salt Industry Corporation (China)
2020-2021
Dalian University of Technology
2020
Nanjing University of Posts and Telecommunications
2019
Abstract The popularity of the Web improves growth web threats. Formulating mathematical models for accurate prediction malicious propagation over networks is great importance. aim this paper to understand mechanisms malware and impact human intervention on spread hyperlinks. Considering characteristics malware, a new differential epidemic model which extends traditional SIR by adding another delitescent compartment proposed address spreading behavior links networks. threshold system...
This paper examines the propagation behavior of computer virus under human intervention. A dynamical model describing spread virus, which a susceptible can become recovered directly and an infected directly, is proposed. Through qualitative analysis this model, it found that virus‐free equilibrium globally asymptotically stable when basic reproduction number R 0 ≤ 1, whereas viral if > 1. Based on these results parameter analysis, some appropriate measures for eradicating across Internet...
These days, the increasing incremental cost consensus-based algorithms are designed to tackle economic dispatch (ED) problem in smart grids (SGs). However, one principal obstruction lies privacy disclosure for generators and consumers electricity activities between supply demand sides, which may bring great losses them. Hence, it is extraordinarily essential design effective privacy-preserving approaches ED problems. In this article, we propose a two-phase distributed heterogeneous...
Water-soluble ions are an important component of atmospheric particles. However, there has been limited research on water-soluble inorganic in particulates agricultural areas until now. In this study, the characteristics eight (Na+, NH4+, K+, Mg2+, Ca2+, NO3-, SO42-, and Cl-) different sizes (>9.0, 5.8-9.0, 4.7-5.8, 3.3-4.7, 2.1-3.3, 1.1-2.1, 0.65-1.1, 0.43-0.65, <0.43 μm) were analyzed by sampling farmland suburb Nanjing from December 2020 to November 2021. The results showed that...
The economic dispatch problems (EDPs) in a microgrid (MG) have been extensively investigated by variety of emerging algorithms. In this paper, we propose two newly distributed dynamic optimization algorithms to respectively study the EDPs under both cases without and with generation constraints directed topology network. Two novel are based on incremental cost consensus (ICC), where mismatch between total demand power is considered. Our only require weight matrix network be row stochastic....
In a recent paper, Chang and Le proposed an efficient smart card–based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the scheme subject capture attack which breaks session security of scheme. An improved fix this problem.
Ransomware attacks are becoming increasingly sophisticated, more damaging to victims and challenging prevent. In this paper, a dynamic modelling method is used study the spreading behaviors of ransomware. The state each network node assumed be statistically dependent states its neighboring nodes. By incorporating full topology propagating via adjacent matrix, novel node-based model developed which also suitable over generic connected networks. dynamics theoretically analyzed. Especially,...