Chuhan Wang

ORCID: 0000-0003-4715-4667
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Land Use and Ecosystem Services
  • Web Application Security Vulnerabilities
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Forest Management and Policy
  • Distributed Sensor Networks and Detection Algorithms
  • Distributed systems and fault tolerance
  • Software Engineering Research
  • Microbial Inactivation Methods
  • Epistemology, Ethics, and Metaphysics
  • Biochemical and biochemical processes
  • Fire effects on ecosystems
  • IPv6, Mobility, Handover, Networks, Security
  • Museums and Cultural Heritage
  • User Authentication and Security Systems
  • Advanced Data Storage Technologies
  • Security and Verification in Computing
  • Essential Oils and Antimicrobial Activity
  • GABA and Rice Research
  • Advanced Authentication Protocols Security
  • Animal Nutrition and Physiology
  • Mobile Crowdsensing and Crowdsourcing

Ollscoil na Gaillimhe – University of Galway
2024

Northwest A&F University
2024

Tsinghua University
2023-2024

Dalian University of Technology
2024

Sanya University
2024

Beijing Jiaotong University
2024

Sun Yat-sen University
2024

Guangdong University of Technology
2024

Xi'an Technological University
2023

Fudan University
2023

With the development of science and technology, Internet TV (OTT TV) has gradually entered public view. The article starts from analysis current situation traditional OTT TV, extends to thinking domestic policy. At same time, summarize several advantages introduce value-added business, fragmented marketing other key points promote as well expansion field, finally combined with professional -- digital media objectively view TV.

10.54691/rq2npx58 article EN Scientific journal of humanities and social sciences. 2025-04-11

Email spoofing attacks pose a severe threat to email systems by forging the sender's address deceive recipients.Sender Policy Framework (SPF), an authentication protocol that verifies senders their IP addresses, is critical for preventing attacks.However, attackers can bypass SPF validation and launch convincing evade authentication.This paper proposes BreakSPF, novel attack framework bypasses enable spoofing.Attackers actively target domains with permissive configurations utilizing cloud...

10.14722/ndss.2024.23113 article EN 2024-01-01

5G messaging services, based on Global System for Mobile Communications Association (GSMA) Rich Communication Service (RCS) and 3rd Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS), have been deployed globally by more than 90 mobile operators serving over 421 million monthly active users via 1.2 billion devices. Despite the widespread use, security research of remains sparse. In this paper, we present a comprehensive analysis measurement assisted semi-automated testing...

10.1145/3643833.3656131 article EN 2024-05-20

Data-intensive technologies require reliable and efficient storage solutions to ensure the integrity availability of vast amounts generated data. Redundant Arrays Independent Disks (RAID) technology has emerged as a popular choice, offering fault tolerance improved performance. Among RAID configurations, RAID-6 stands out for its ability tolerate up two disk failures. This is achieved through algorithms like Row-Diagonal Parity (RDP) coding, which introduces redundancy enables data recovery....

10.54097/dw5yqj95 article EN cc-by-nc Highlights in Science Engineering and Technology 2024-01-26

Content Delivery Networks (CDNs) are ubiquitous middleboxes designed to enhance the performance of hosted websites and shield them from various attacks.Numerous notable studies show that CDNs modify a client's request when forwarding it original server.Multiple inconsistencies in this operation have been found potentially result security vulnerabilities like DoS attacks.Nonetheless, existing research lacks systematic approach studying CDN inconsistencies.In work, we present REQSMINER, an...

10.14722/ndss.2024.24031 article EN 2024-01-01

Mobile crowd sensing campaigns usually require spatial-temporal coverage. However, there are numerous circumstances where human participants unable or unwilling to reach the target regions, such as traffic jams accidents. Furthermore, may not prefer be interrupted frequently leak private information too much. All of these salient challenges that affect task achievement. To solve problems, we propose in this paper a method employs and UAVs sense data together. For participants, proposed takes...

10.1109/tvt.2024.3374719 article EN IEEE Transactions on Vehicular Technology 2024-03-12

Cryptocurrency mining is a crucial operation in blockchains, and miners often join pools to increase their chances of earning rewards. However, the energy-intensive nature PoW cryptocurrency has led its ban New York State United States, China, India. As result, pools, serving as central hub for activities, have become prime targets regulatory enforcement. Furthermore, cryptojacking malware refers self-owned stealthy evade detection techniques conceal profit wallet addresses. no systematic...

10.1145/3576915.3616677 article EN cc-by Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Background/Objectives:Clostridium perfringens is a common opportunistic pathogen that causes gastrointestinal diseases in livestock and poultry. Our preliminary research has demonstrated administering oral yeast-cell microcapsule (YCM)-mediated DNA vaccines can effectively stimulate mucosal immunity, thereby preventing the occurrence of diseases. Methods: In this study, C. α-toxin gene was first cloned H126G C-terminal (C247–370) mutations were created. The corresponding vaccine cassettes...

10.3390/vaccines12121360 article EN cc-by Vaccines 2024-12-01

Email attachments have become a favored delivery vector for malware campaigns. In response, email attachment detectors are widely deployed to safeguard security. However, an emerging threat arises when adversaries exploit parsing discrepancies between and clients evade detection. Currently, uncovering these vulnerabilities still depends on manual, ad hoc methods. this paper, we perform the first systematic evaluation of detection against ambiguity vulnerabilities. We propose novel testing...

10.1145/3658644.3670386 article EN cc-by 2024-12-02

For distributed computing with Byzantine machines under Privacy Protection (PP) constraints, this paper develops a robust PP quasi-Newton estimation, which only requires the node to transmit five vectors central processor high asymptotic relative efficiency. Compared gradient descent strategy more rounds of transmission and Newton iteration entire Hessian matrix be transmitted, novel has advantages in reducing privacy budgeting cost. Moreover, our algorithm does not depend on boundedness...

10.48550/arxiv.2408.12353 preprint EN arXiv (Cornell University) 2024-08-22

To address the problem that artificial potential field method (APF) is easy to fall into local minima in path planning of dual robotic arms, a combining improved APF and advanced Rapidly expanding random trees (RRT) algorithm proposed. method. First, sewing machine device used as research object model arm well analyze its positive kinematics; second, workspace double analyzed, enclosing box simplify obstacles, collision detection linkage performed; then, plan main dynamic obstacles...

10.1109/isas59543.2023.10164424 article EN 2022 5th International Symposium on Autonomous Systems (ISAS) 2023-06-23

10.1007/s44204-022-00058-8 article EN Asian Journal of Philosophy 2023-01-07

This paper proposes a Robust One-Step Estimator(ROSE) to solve the Byzantine failure problem in distributed M-estimation when moderate fraction of node machines experience failures. To define ROSE, algorithms use robust Variance Reduced Median Of Local(VRMOL) estimator determine initial parameter value for iteration, and communicate between central processor Newton-Raphson iteration procedure derive VRMOL gradient, Hessian matrix so as obtain final estimator. ROSE has higher asymptotic...

10.48550/arxiv.2307.07767 preprint EN other-oa arXiv (Cornell University) 2023-01-01
Coming Soon ...