- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Information and Cyber Security
- Spam and Phishing Detection
- Advanced Frequency and Time Standards
- Caching and Content Delivery
- User Authentication and Security Systems
- Spectroscopy and Quantum Chemical Studies
- Web Application Security Vulnerabilities
- Software Engineering Research
- Software Testing and Debugging Techniques
- Laser-Matter Interactions and Applications
- Anomaly Detection Techniques and Applications
- Machine Learning and Data Classification
- GNSS positioning and interference
- Cell Image Analysis Techniques
- Software System Performance and Reliability
- Corporate Finance and Governance
- Mass Spectrometry Techniques and Applications
- Biometric Identification and Security
- Network Time Synchronization Technologies
- Data Visualization and Analytics
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
National University of Defense Technology
2007-2025
Tianjin Chengjian University
2024
Anhui University
2021-2023
Tianjin University of Technology
2023
Fudan University
2020-2021
Chongqing University of Posts and Telecommunications
2021
Central South University
2020
Chinese Academy of Sciences
2012-2018
Wuhan Institute of Physics and Mathematics
2017-2018
University of Chinese Academy of Sciences
2018
Strong-field laser-molecule interaction forms much of the basis for initiating and probing ultrafast quantum dynamics. Previous studies aimed at elucidating origins vibrational coherences induced by intense laser fields have been confined to diatomic molecules. Furthermore, in all cases examined date, wave packet motion is found be R-selective depletion; launched bond softening, though theoretically predicted, remains hitherto unobserved. Here we employ exquisite sensitivity femtosecond...
While recent debiasing methods for Scene Graph Generation (SGG) have shown impressive performance, these efforts often attribute model bias solely to the long-tail distribution of relationships, overlooking more profound causes stemming from skewed object and pair distributions. In this paper, we employ causal inference techniques causality among observed Our insight lies in ability capture unobservable effects between complex distributions, which is crucial tracing roots bias. Specifically,...
Password guessing is a crucial research direction in password security, considering vulnerabilities like reuse and data breaches. While has extensively explored intra-site guessing, the complexities of cross-site attacks, where attackers use leaked from one site to target another, remain less understood. This study investigates impact dataset feature similarity on performance, revealing that differences significantly influence success more than model variations. By analyzing eight datasets...
Password guessing is a primary method for password strength evaluation. Despite various models have been proposed, there still significant gap between their effectiveness and the actual cracking capabilities of attackers. Integrating multiple guessing, also known as hybrid could better capture real However, reason why can enhance capabilities, how to effectively integrate heterogeneous models, are not well understood. To address these issues, this paper draws inspiration from concept...
The centralization of the global DNS ecosystem may accelerate creation an oligopoly market, thereby, increasing risk a single point failure and network traffic manipulation. Earlier studies have revealed level in terms market share public services seen by major CDN providers. However, infrastructure Ecosystem is not well understood. In this paper, we present novel lightweight measurement approach that effectively discovers resolver pools from probing point. We conduct Internet-wide active on...
Due to the increasing number of network security vulnerabilities, vulnerability risk assessment must be performed prioritize repair high-risk vulnerabilities. Traditional is based primarily on Common Vulnerability Scoring Systems (CVSS) and attack graphs. Nevertheless, CVSS metrics ignore impact specific network, which accounts that identical exists in different environments assigned repeated values. Additionally, graphs still suffer from scalability readability issues. To solve above...
User authentication plays a critical role in access control of man-machine system, where the knowledge factor, such as personal identification number, constitutes most widely used element. However, factors are usually vulnerable to spoofing attack. Recently, inheritance fingerprints, emerges an efficient alternative resilient malicious users, but it normally requires special equipment. To this end, article, we propose WiPass, device-free system only leveraging pervasive Wi-Fi infrastructure...
IP spoofing has nowadays become a research focus, as it been bothering netizens since the emergence of Internet. Though many studies have made their contributions to prevention IP-spoofing, most excellent one is SAVI (Source Address Validation Improvement) proposal advocated by IETF, can prevent IP-spoofing from happening automatically binding key properties hosts in layer2 access subnet. Nevertheless, till now, only focuses on IPv6 stack and simple network scenarios. To best our knowledge,...
With the popularity of network technology and expansion scale, security risks are increasingly serious. Network vulnerability assessment methods, a active defense, have attracted many researchers. Most existing methods store different types data in ways, which makes querying analyzing inefficient, especially complex large-scale environment. In order to solve this problem, paper proposes method based on graph database. The host information, association relationship between hosts information...
A plethora of software vulnerabilities are exposed daily, posing a severe threat to the Internet. It is almost impossible for security experts or developers deal with all vulnerabilities. Therefore, it imperative rapidly assess severity vulnerability be able select which one should given preferential attention. CVSS now industry’s de facto evaluation standard, calculated quantitative formula measure vulnerability. The consists several metrics related vulnerability’s features. Security need...
This paper studies Chinese firms' earnings management strategy in response to the trade dispute investigations initiated by U.S. from 2001 2018. topic is important given increasingly severe international environment and significant influence of macro economy on financial reporting. We find that firms affected U.S.-initiated engage more upward management. Additionally, result pronounced with a negative market reaction around announcement investigations. Cross-sectional tests provide evidence...
Penetration testing is widely acknowledged as the foremost method for evaluating network security. However, three challenges impede generation of strategies that align with human expectations. In this article, we present, first time, a based on feedback to enhance strategy generation. Our approach comprises two components: agent training and decision-making. During training, establish hierarchical framework decompose tasks knowledge base offer advice improving data efficiency. We then impose...
Internet users have suffered from phishing attacks for a long time. Attackers deceive through malicious constructed websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent years, many detection solutions been proposed, which mainly leverage whitelists or blacklists, content, side channel-based techniques. However, with the continuous improvement of technology, current methods difficulty in achieving effective detection. Hence, this...
The technique of binary code similarity detection (BCSD) has been applied in many fields, such as malware detection, plagiarism and vulnerability search, etc. Existing solutions for the BCSD problem usually compare specific features between binaries based on control flow graphs functions from or compute embedding vector solve deep learning algorithms. In this paper, another research perspective, we propose a new lightweight method to <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...
With the vigorous development of Internet, ecosystem cyber-physical systems is also developing at a high speed, but may be accompanied by unknown vulnerabilities in process concrete implementation. Thus, number has been increasing year year. The vulnerability evaluation speed cannot keep up with exposure speed. traditional manual method can no longer effectively deal such large-scale vulnerabilities, resulting backlog vulnerabilities. Therefore, results have certain lag. To address this...
With the rapid development of Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts been made classify variants, but there are still many challenges, including incapacity deal with various belonging similar families, problem time and resource consuming, etc. This paper proposes novel method, called Malware Entropy Sequences Reflect Family (MESRF), improve classification based on entropy sequences features. In prior research,...
Last year the zero-baseline common-view test using BeiDou Navigation Satellite system (BDS) is done in BIRMM and result better than 5 ns. In this year, we have developed our own GPS/BD common view time frequency transfer receiver. Using receiver carried out two remote experiments BIRM-SIMT link BIRM-NTSC link, separately. Besides, took TWSTFT experiment together when made to check result. The some results are shown paper which show that precision BD at same level of GPS but slightly lower GPS.
In recent years, Internet of things (IoT) devices are playing an important role in business, education, medical as well other fields. Devices connected to the is much more than number world population. However, it may face all kinds attacks from easily for its accessibility. As we know, most against IoT based on Web applications. So protecting security services can effectively improve situation ecosystem. Conventional attack detection methods highly rely samples, and artificial intelligence...
This paper gives a test method of BeiDou timing receiver delay. A System simulator and time interval counter were used in the experiments. During process, most important step is to calibrate delay simulator. The uncertainty this analyzed be less than 1.5ns. Using method, some typical Chinese commercial receivers tested, results are shown figures. variations with temperature have been studied.
Determining the application and version of nodes in Inter⁃ net Things (IoT) is very important for warning about managing vulnerabilities IoT. This article defines attributes determining By improving structure Internet web crawler, which obtains raw data from nodes, we can obtain da⁃ ta We improve on existing strate⁃ gy, only determinations are stored, by also storing downloaded locally MongoDB. stored be conveniently used to determine type node when a new determination method emerges or...
In this work, we have developed a new Micro-Mechanic-Hydrodynamic Model (MMH Model) to predict the yield stress of MagnetoRheological (MR) fluids, which is also applicable without no-slip boundary condition. We first determine storage modulus MR fluid with three-dimensional chain structure model taking into account field concentration between particles inside aggregates and effect saturation magnetisation particles. Then apparent viscosity by using balance magnetic torque hydrodynamic...