- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Distributed systems and fault tolerance
- Autism Spectrum Disorder Research
- Cloud Data Security Solutions
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Access Control and Trust
- Reproductive tract infections research
- Advanced Decision-Making Techniques
- Information and Cyber Security
- Privacy-Preserving Technologies in Data
- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Reproductive Physiology in Livestock
- Gaze Tracking and Assistive Technology
- Parallel Computing and Optimization Techniques
- Anomaly Detection Techniques and Applications
- Cognitive Computing and Networks
- Advanced Steganography and Watermarking Techniques
- Advanced Sensor and Control Systems
- Digital Rights Management and Security
Qinghai University
2025
Shanghai Jiao Tong University
2012-2024
Huazhong University of Science and Technology
2018-2022
Institute of Sociology
2011-2022
Chinese Academy of Social Sciences
2011-2022
Union Hospital
2022
Shanghai Electric (China)
2021
Chinese Academy of Sciences
2018
Chongqing University of Posts and Telecommunications
2018
Shandong Institute of Automation
2018
The focus of this article is to analyze and predict the visual attention children with Autism Spectrum Disorder (ASD) when looking at human faces. Social difficulties are hallmark features ASD will lead atypical toward various stimuli more or less, especially on Learning could contribute related research in field medical science, psychology, education. We first construct a Visual Attention Faces for (VAFA) database, which consists 300 natural scene images faces corresponding eye movement...
Deniable authentication is a new kind of authentication, by which means receiver cannot prove the source message to third party. A deniable protocol, based on Deffie-Hellman key exchange presented. It does not require trusted party, and protocol can resist person-in-the-middle attack.
We design and implement TwinsCoin, the first cryptocurrency based on a provably secure scalable public blockchain using both proof-of-work proof-of-stake mechanisms. Different from Bitcoin, our construction uses two types of resources, computing power coins (i.e., stake). The in system is more robust than that pure system; even if adversary controls majority mining power, we can still have chance to by relying honest stake. In contrast, Bitcoin will be insecure 50% power.
Byzantine fault tolerant (BFT) consensus protocols are becoming an appealing solution to blockchains. As most blockchain systems deployed on Wide Area Networks (WANs), with each node acting behalf of its entity, partially synchronous BFT that rely network synchrony elect a single leader can be ill-suited. In contrast, asynchronous have no such timing assumptions. Existing confront challenges in terms both flexibility and performance.
Federated learning is a privacy-protected way of decentralized machine learning. In Learning system, the server uses aggregation algorithm to obtain global model from clients. The traditional method called FedAvg simple arithmetic average, but it has never been proved efficient. Moreover, there are many potential attacks and network instability in systems. This paper aims achieve two goals by replacing server-side strategy: 1) Accelerate model's convergence speed 2) Make reliable when facing...
Abstract In the last five years, Chinese government has begun to encourage development of non-government organisations (NGO) increase supply social support. Although changes in NGO sector China are well researched, questions remain about barriers increasing services from registered NGOs. We use Mattei's managerial and democratic accountability framework examine empirical data relationship between way disability Beijing organised improving type, quantity quality their services. Barriers...
Mobile crowd sensing (MCS) is becoming a popular paradigm to collect information, which has the potential change people's life. However, MCS vulnerable security threats due increasing reliance on communication and computing. The challenges of unique privacy caused by include protection, integrity, confidentiality, availability. To tackle these issues concurrently, we present design dynamical credibility assessment privacy-preserving (CAPP) strategy, novel assessment-based solution protect in...
Recently Shim gave an attack on Harn's modified authenticated multiple-key agreement protocol. The authors point out Shim's is not workable. However, protocol still insecure and the give another it. Finally, propose efficient that can prevent this attack.
Edge computing reduces the overhead of data centers and improves efficiency processing. However, traditional cloud protection mechanisms are no longer applicable to edge devices. Data leakage other privacy issues may occur when computation is outsourced nodes. The decentralization raises new challenge for control, storage computation. In this work, we present Cerberus, a brand-new framework that preserves in by combining blockchain, distributed trusted execution environment (TEE). Blockchain...
The characteristic of heterogeneous grid environment results in that the task scheduling is constrained by a number factors such as length scheduling, performance security, and cost , etc. Firstly, under consideration demand for secure performance. A security benefit function corresponding time model are constructed. Secondly according to past behavior resource nodes, simple efficient node’s credibility dynamic evaluation built using weighted function. Thirdly, b ased on these, new...
Background Hepatocellular carcinoma (HCC) is the third leading cause of death in world, characterized by high morbidity, poor prognosis and mortality. Histone modifications regulate intracellular gene expression at post-transcriptional level, disturbances regulatory pattern histone individual locus or across genome can lead to tumorigenesis HCC. In this study, we constructed a prognosis-related phosphorylation regulated (HPR) genes signature elucidated whether HPR predict overall survival...
This paper firstly analyzes security vulnerabilities, threats and special requirements of current vehicle information system. And further referring to the classified protection evaluation standards traditional system, we establish system for summarizes typical assets in car divides into two classes/levels: family business, defines target requirement kinds respectively. Finally, a series feasible methods tools are presented practice. A big contribution this is explore fills up gap evaluating...
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on cryptographically strong session key. One must ensure that protocols are immune off-line dictionary attacks in which an adversary exhaustively enumerates all possible passwords attempt determine the correct one. Recently Katz, et al. [6] gave new framework realizing PAKE without random oracles, common reference string model. In this paper, we instantiate of...
Asynchronous Byzantine Fault-Tolerant (BFT) consensus protocols maintain strong consistency across nodes (i.e., ensure safety) and terminate probabilistically liveness) despite unbounded network delay. In contrast to under partial synchrony, asynchronous counterparts pay no extra timing assumptions for electing a special role, thus is more robust issues. To formally study this feature, we propose new classification method accordingly categorize relevant work: timing-balanced are those that...
Cryptocurrencies have recently gained huge popularity. It is desirable to come up with effective approaches constructing better blockchain protocols. In this paper, inspired by the 2-hop design Duong et al (ePrint 2016/716), we put forth a generic paradigm for design, called n-hop blockchain. includes one main chain, which supported (n -- 1) supporting chains; hence, chain can achieve security performance. our paradigm, show that be easily extended + 1)-hop design. To demonstrate power of...