- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Advanced Steganography and Watermarking Techniques
- Distributed and Parallel Computing Systems
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Peer-to-Peer Network Technologies
- Cloud Computing and Resource Management
- Advanced Vision and Imaging
- Mobile Ad Hoc Networks
- Service-Oriented Architecture and Web Services
- Big Data and Digital Economy
- Advanced Multi-Objective Optimization Algorithms
- Higher Education and Teaching Methods
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Advanced Image Processing Techniques
- Metaheuristic Optimization Algorithms Research
- Advanced Image and Video Retrieval Techniques
- IoT and Edge/Fog Computing
- Image Processing Techniques and Applications
- Advanced Data Storage Technologies
- User Authentication and Security Systems
- Complex Network Analysis Techniques
- Cloud Data Security Solutions
Tsinghua University
2025
Hubei Engineering University
2015-2024
Fanjingshan National Nature Reserve
2012-2024
Hubei University
2020-2024
University of Science and Technology Beijing
2007-2012
National University of Defense Technology
2010-2012
University of Alberta
2012
Beihang University
2011
Beijing Information Science & Technology University
2007-2008
In socially aware networking, nodes typically behave selfishly due to resource constraints and social correlations, resulting in low network performance. To incentivize selfish actively participate message forwarding, this paper proposes a resource-based dynamic pricing forced forwarding incentive algorithm (DFIA). Firstly, the introduces virtual currency as transaction medium then designs function based on factors such node’s status, participation contribution, location relevance,...
The purpose of this paper is to explore an intelligent identification method autonomous vehicle moving trajectory based on friction nano-generator. This uses nano-generator obtain energy from the between tire and ground, realizes perception recognition motion state. On basis, through analysis processing state data, model vehicles established realize prediction control driving vehicles. Therefore, a large number movement data collected, are preprocessed feature extracted, constructed by...
The Internet of Things (IoT) technology and systems have penetrated every aspect our lives generated enormous economic benefits. At the same time, research on data security IoT has been one key topics in fields. Network attacks intrusions become main threats to IoTs, which obstacles development application IoTs. In this article, we propose an attack detection model ensure by using Transformer multiwavelets learning. Based architecture systems, first proposed a multi-level intrusion detect...
The environmental/economic dispatch (EED) problem, as one of the most important optimization problems in power systems operations, is a highly constrained, nonlinear, multiobjective problem. Multiobjective evolutionary algorithms have become effective tools for solving EED To obtain higher quality Pareto solutions well further improve uniformity and diversity set, this paper proposes novel algorithm, namely grey prediction evolution algorithm (MOGPEA). MOGPEA first develops (GPEA) based on...