- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- Age of Information Optimization
- Caching and Content Delivery
- Spam and Phishing Detection
- Security and Verification in Computing
- Cryptography and Data Security
- Visual Attention and Saliency Detection
- Advanced Decision-Making Techniques
- Advanced Vision and Imaging
- Advanced Image and Video Retrieval Techniques
- Engineering Education and Curriculum Development
- Innovative Educational Techniques
- Image and Video Quality Assessment
- Advanced Computing and Algorithms
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Robotics and Sensor-Based Localization
- Data Management and Algorithms
- Digital Media and Visual Art
- IoT and Edge/Fog Computing
- Data Stream Mining Techniques
Zhejiang University of Science and Technology
2022-2024
Zhejiang University
2013-2023
Nanjing University of Science and Technology
2012
National Institute of Measurement and Testing Technology
2008
Recent years have witnessed explosive growth in blockchain smart contract applications. As contracts become increasingly popular and carry trillion dollars worth of digital assets, they more an appealing target for attackers, who exploited vulnerabilities to cause catastrophic economic losses. Notwithstanding a proliferation work that has been developed detect impressive list vulnerabilities, the bad randomness vulnerability is overlooked by many existing tools. In this article, we make...
Nowadays, the rise in popularity of massive open online courses (MOOCs) is significant. However, current education service heavily relies on a third-party platform, which acts as middleman to process transactions occurred among system participants. On one hand, this centralized business model based database management system, once compromised, data consistency and safety transaction records can no longer be guaranteed. other it's more expensive resolve disputes possible fraud via mediator...
Blockchain, a distributed and shared ledger, provides credible transparent solution to increase application auditability by querying the immutable records written in ledger. Unfortunately, existing query APIs offered blockchain are inflexible unscalable. Some studies propose off-chain solutions provide more flexible scalable services. However, service providers (SPs) may deliver fake results without executing real computation tasks collude cheat users. In this article, we novel intelligent...
This article focuses on a simple, yet fundamental question of distributed edge computing: "how to handle IoT traffic with different levels sensitivity and criticality by satisfying the application-specific latency constraints?" arises in practical deployment computing, where user data can arrive at much faster rate than that they be processed an node. Addressing this is critical for meeting requirement latency-sensitive applications, but existing approaches are inadequate problem. We present...
E-commerce platforms provide entrances for customers to enter mini-apps that can meet their specific shopping requirements. Trigger items displayed on entrance icons attract more entering. However, conventional Click-Through-Rate (CTR) prediction models, which ignore user instant interest in trigger item, fail be applied the new recommendation scenario dubbed Trigger-Induced Recommendation Mini-Apps (TIRA). Moreover, due high stickiness of some mini-apps, existing trigger-based methods...
ICPS software and hardware suffer from low update frequency, making it easier for insiders to bypass external defenses launch concealed destructive attacks. To address these concerns, we design a device fingerprinting method based on multi-physical features, augmenting current intrusion detection techniques in the environment. In this paper, use sorting system as an example, demonstrating that proposed technology has generality of control flow. Specifically, first formalize physical model...