- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Functional Brain Connectivity Studies
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Privacy, Security, and Data Protection
- Neural dynamics and brain function
- Distributed systems and fault tolerance
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Software-Defined Networks and 5G
- Advanced MRI Techniques and Applications
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Electricity Theft Detection Techniques
- Security and Verification in Computing
- Radio Wave Propagation Studies
- Artificial Immune Systems Applications
- PAPR reduction in OFDM
- Peer-to-Peer Network Technologies
- Attention Deficit Hyperactivity Disorder
- Smart Grid Energy Management
Peking University
2022-2024
Peking University Shenzhen Hospital
2022-2024
University of Electronic Science and Technology of China
2017-2021
Beijing Institute of Big Data Research
2020
University of Bechar
2015
Disseminating medical data beyond the protected cloud of institutions poses severe risks to patients’ privacy, as breaches push them point where they abstain from full disclosure their condition. This situation negatively impacts patient, scientific research, and all stakeholders. To address this challenge, we propose a blockchain-based sharing framework that sufficiently addresses access control challenges associated with sensitive stored in using immutability built-in autonomy properties...
Electricity is the commonest commodity for most businesses in our world today. The use of electricity has been a breakthrough discovery new technologies and become main driving force behind several innovations. With introduction smart grid systems, there have improvements how utility companies interact with their customers regards to use. However, since readings are done via Internet, tendency data be compromised when it gets into hands wrong people. Moreover, mostly do not know why they pay...
According to research, classifiers and detectors are less accurate when images blurry, have low contrast, or other flaws which raise questions about the machine learning model’s ability recognize items effectively. The chest X-ray image has proven be preferred modality for medical imaging as it contains more information a patient. Its interpretation is quite difficult, nevertheless. goal of this research construct reliable deep-learning model capable producing high classification accuracy on...
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of utility in increasing provider efficiency decreasing administrative costs, one challenge that has persisted is the data owners inability to control after transmission. The lack technical mechanisms effectively patients' health network significantly affects participation medical institutions while perpetrating silo-based management locks value potential inherent data....
The metaverse gradually evolves into a virtual world containing series of interconnected sub-metaverses. Diverse digital resources, including identities, contents, services, and supporting data, are key components the sub-metaverse. Therefore, Domain Name System (DNS)-like system is necessary for efficient management resolution. However, legacy DNS was designed with security vulnerabilities trust risks due to centralized issues. Blockchain used mitigate these concerns its decentralized...
As a subset of distributed systems, blockchain technology is equally bound by the CAP trilemma. Specifically, no system can satisfy consistency, availability, and partition tolerance simultaneously. Informally, innovative trilemma has been theorized to include security, scalability, decentralization. While many software approaches on blockchains claim solve problem, almost all known have proven involve tradeoffs fail reach upper bounds, meaning they do not achieve theoretical limit value in...
Cloud servers offer data owners the opportunityto upload and store encrypted that several users can access. However, after outsourcing to cloud, have limited control of their data, external systems are incorporated manage it. Several research-based solutions use encryption techniques prevent unauthorized access but ignore challenge maintaining trace valid changes applied data. Provenance be used ascertain integrity and, therefore, should immutable secured from adversaries since it contains...
With the vast increase in data transmission due to a large number of information collected by devices, management, and security has been challenge for organizations. Many owners (DOs) outsource their cloud repositories several economic advantages service providers present. However, DOs, after are outsourced, do not have complete control data, therefore, external systems incorporated manage data. Several kinds research refer use encryption techniques prevent unauthorized access but prove be...
As part of vehicle to everything (V2X) environments, intelligent connected vehicles (ICVs) generate a large amount data, which can be exploited securely and effectively through decentralized techniques such as federated learning (FL). Existing FL systems, however, are vulnerable attacks barely meet the security requirements for real-world applications. If malicious or compromised ICVs upload inaccurate low-quality local model updates central aggregator, they may reduce accuracy global model,...
Because electricity is the core of our daily lives, no one denies massive progress we have reached thanks to such a fossil fuel-based technology. But at same time, these advancements costly affected environment. Consequently, recent trends towards restructuring electrical grids in way intended be more monitored, secured and environmental are brought forefront scientific research. The attempts reconfiguring electric power were coined as "smart grid". Basically, internet, ZigBee, wireless mesh...
The distribution of personal health records (PHRs) via a cloud server is promising platform as it reduces the cost data maintenance. Nevertheless, semi-trusted and can expose patients’ PHRs to unauthorized third parties for financial gains or compromise query result. Therefore, ensuring integrity results privacy well realizing fine-grained access control are critical key issues when shared computing. Hence, we propose new sharing scheme with verifiable based on B+ tree structure...
Anomalies in large-scale cognitive control networks impacting social attention abilities are hypothesized to be the cause of deficit hyperactivity disorder (ADHD). The precise nature abnormal brain functional connectivity (FC) dynamics including other regions, on hand, is unknown. concept that insular dynamic FC (dFC) among distinct regions dysregulated children with ADHD was evaluated using Insular subregions, and we studied how these dysregulations lead dysfunctioning. Data from 30 28...
Abstract Decentralized cryptocurrency systems, known as blockchains, have shown promise an infrastructure for mutually distrustful parties to securely agree on transactions. Nevertheless, blockchain systems are constrained by the CAP Trilemma. Due performance degradation, it is impossible address this issue improving simply consensus layer or network layer. To alleviate constraint in consortium we propose a topological construction method optimize physical based multi‐dimensional hypercubes...
Recently, more and mobile devices have been connected to the Internet. The Internet environment is complicated, network security incidents emerge endlessly. Traditional blocking killing passive defense measures cannot fundamentally meet requirements. Inspired by heuristic establishment of multiple lines in immunology, we designed prototyped a Double Defense strategy with Endogenous Safety Security (DDESS) based on multi-identifier (MIN) architecture. DDESS adopts idea zero-trust network,...
Multiple-input multiple-output (MIMO)-Integrated Radar and Communication System (IRCS) configuration is made up of multiple IRCS communication users. The MIMO-IRCS uses the Orthogonal Frequency Division Multiplexing (OFDM) waveform, this paper provides a power allocation strategy for both systems. Karush-Kuhn-Tuckers (KKT) optimality requirements are used to formulate solve convex optimization problem analytically. suggested reduces total transmitted while meeting two system prerequisites:...
Cloud computing provides users with cost-effective on-demand resource sharing, but the shared resources also creates additional security risks due to co-location malicious tenants. In addition static defensive technologies, Virtual Machine (VM) migration, a type of Moving Target Defense (MTD) technique, an alternative solution mitigate co-resident attacks by dynamically migrating services/tasks among various servers. Although significant progress has been made in this area, critical gaps...
The metaverse gradually evolves into a virtual world containing series of interconnected sub-metaverses. Diverse digital resources, including identities, contents, services, and supporting data, are key components the sub-metaverse. Therefore, Domain Name System (DNS)-like system is necessary for efficient management resolution. However, legacy DNS was designed with security vulnerabilities trust risks due to centralized issues. Blockchain used mitigate these concerns its decentralized...
The recent coronavirus (COVID-19) pandemic has brought the world to an apocalyptic standstill with huge economic burden and catastrophic healthcare consequences. COVID-19 neither clinically proven vaccine nor drugs so far. It is now obvious that in dire need for non-clinical, real-time, faster cost-effective secure smart solutions monitoring, contact tracing, diagnosing/detecting patients hence mitigating on systems. Therefore, Machine learning approaches can be leveraged all aspects could...
Decentralized cryptocurrency systems, known as blockchains, have shown promise an infrastructure for mutually distrustful parties to securely agree on transactions. Nevertheless, blockchain systems are constrained by the CAP Trilemma. Due performance degradation, it is impossible address this issue improving simply consensus layer or network layer. To alleviate constraint in consortium we propose a topological construction method optimize physical based multi-dimensional hypercubes with...