- Security and Verification in Computing
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Adversarial Robustness in Machine Learning
- Advanced Data Storage Technologies
- Face recognition and analysis
- Digital and Cyber Forensics
- Advancements in Battery Materials
- Cloud Data Security Solutions
- Physical Unclonable Functions (PUFs) and Hardware Security
- Biometric Identification and Security
- Privacy-Preserving Technologies in Data
- IPv6, Mobility, Handover, Networks, Security
- Melanoma and MAPK Pathways
- Wireless Communication Networks Research
- Advanced Battery Technologies Research
- Signaling Pathways in Disease
- Mechanical Engineering and Vibrations Research
- Extraction and Separation Processes
- Fault Detection and Control Systems
- Dynamics and Control of Mechanical Systems
- Toxin Mechanisms and Immunotoxins
- Digital Media Forensic Detection
- Remote Sensing and LiDAR Applications
- Cryptographic Implementations and Security
Central South University
2020-2025
Fudan University
2001-2023
Huzhou University
2021-2023
Xiangya Hospital Central South University
2022-2023
Mira Dx (United States)
2023
Hunan Cancer Hospital
2022
SKiN Health
2022
Huashan Hospital
2022
Shanghai Jiao Tong University
2010-2021
Cornell University
2021
As the number of Mobile IP (MIP) [C. Perkins, (1996)] users grow, so will demand for delay sensitive real-time applications, such as audio streaming, that require seamless handoff, namely, a packet lossless Quality-of-Service guarantee during handoff. Two well-known approaches in reducing MIP handoff latency have been proposed literature. One aims to reduce (home) network registration time through hierarchical management structure, while other tries minimize lengthy address resolution by...
One rising trend in today's consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions smartwatches shipped, however, security implications such devices are not fully understood. Although previous studies have pointed out some privacy concerns about data that can be collected, like personalized health information, threat considered low as leaked highly sensitive and there no real attack implemented. In this paper we investigate a problem coming from sensors...
Previous research about sensor based attacks on Android platform focused mainly accessing or controlling over sensitive components, such as camera, microphone and GPS. These approaches obtain data from sensors directly need corresponding invoking permissions.
The popularity of mobile devices has made people's lives more convenient, but threatened privacy at the same time. As end users are becoming and concerned on protection their private information, it is even harder for hackers to track a specific user by using conventional technologies. For example, cookies might be cleared regularly. Besides, OS designers have developed series measures cope with tracker. Apple stopped apps accessing UDIDs, Android phones use some special permissions protect...
With the proliferation of Internet Things, there is a growing interest in embedded system attacks, e.g., key extraction attacks and firmware modification attacks. Code execution tracking, as first step to locate vulnerable instruction pieces for conduct control-flow integrity checking against therefore great value. Because systems, especially legacy have limited resources may not support software or hardware update, it important design low-cost code tracking methods that require little...
Accurate face recognition techniques make a series of critical applications possible: policemen could employ it to retrieve criminals' faces from surveillance video streams; cross boarder travelers pass authentication inspection line without the involvement officers. Nonetheless, when public security heavily relies on such intelligent systems, designers should deliberately consider emerging attacks aiming at misleading those systems employing recognition. We propose kind brand new attack...
Machine learning has been attracting strong interests in recent years. Numerous companies have invested great efforts and resources to develop customized deep-learning models, which are their key intellectual properties. In this work, we investigate what extent the secret of models can be inferred by attackers. particular, focus on scenario that a model developer an adversary share same GPU when training Deep Neural Network (DNN) model. We exploit side-channel based context-switching...
Dear Editor, This letter provides a simple framework to generalized zero-shot learning for fault diagnosis. For industrial process monitoring, supervised and (ZSL) can only deal with seen unseen faults, respectively. However, in the online monitoring stage of actual process, both faults may occur. makes impractical monitoring. Generalized (GZSL) handle this problem, but its implementation is too complicated. introduces GZSL into diagnosis, end-to-end provided implement GZSL-based In...
Face authentication systems are becoming increasingly prevalent, especially with the rapid development of Deep Learning technologies. However, human facial information is easy to be captured and reproduced, which makes face vulnerable various attacks. Liveness detection an important defense technique prevent such attacks, but existing solutions did not provide clear strong security guarantees, in terms time. To overcome these limitations, we propose a new liveness protocol called Flashing...
Adversarial examples revealed the weakness of machine learning techniques in terms robustness, which moreover inspired adversaries to make use attack systems employing learning. Existing researches covered methodologies adversarial example generation, root reason existence examples, and some defense schemes. However practical against real world did not appear until recent, mainly because difficulty injecting a artificially generated into model behind hosting system without breaking...
Developmental dysplasia of the hip (DDH) is common, and features a widened Sharp's angle as observed on pelvic x-ray images. Determination angle, essential for clinical decisions, can overwhelm workload orthopedic surgeons. To aid diagnosis DDH reduce false negative diagnoses, simple cost-effective tool proposed. The model was designed using artificial intelligence (AI), evaluated its ability to screen anteroposterior radiographs automatically, accurately, efficiently.Orthotopic anterior...
Previous schemes for designing secure branch prediction unit (SBPU) based on physical isolation can only offer limited security and significantly affect BPU's capability, leading to prominent performance degradation. Moreover, encryption-based SBPU periodic key re-randomization have the risk of being compromised by advanced attack algorithms, overhead is also considerable. To this end, paper proposes a conflict-invisible (CIBPU). CIBPU employs redundant storage design, load-aware indexing,...
Mine ramps, serving as a critical transportation hub in underground mining activities, are beset by severe issues of dust pollution and secondary generation. While suppressants more efficient than the commonly used sprinkling methods mines, traditional single-function inadequate for complex application environment mine ramps. Building on development conventional suppressants, this research optimized components bonding, wetting, moisturizing agents. Through single-factor optimization...
Abstract According to previous reports, information could be leaked from GPU memory; however, the security implications of such a threat were mostly over-looked, because only limited indirectly extracted through side-channel attacks. In this paper, we propose novel algorithm for recovering raw data directly memory residues many popular applications as Google Chrome and Adobe PDF reader. Our enables harvesting highly sensitive including credit card numbers email contents residues. Evaluation...
Cache side-channel attacks lead to severe security threats the settings where a CPU is shared across users, e.g., in cloud. The majority of rely on sensing micro-architectural state changes made by victims, but this assumption can be invalidated combining spatial (e.g., Intel CAT) and temporal isolation. In work, we advance cache showing stateless server-grade CPUs, that bypass both Unlike stateful timing difference between hit or miss, our attack exploits caused interconnect congestion....
The popularity of mobile device has made people's lives more convenient, but threatened privacy at the same time. As end users are becoming and concerned on protection their private information, it is even harder to track a specific user using conventional technologies. For example, cookies might be cleared by regularly. Apple stopped apps accessing UDIDs, Android phones use some special permission protect IMEI code. To address this challenge, recent studies have worked tracing smart...
PCIe (Peripheral Component Interconnect express) protocol is the de facto to bridge CPU and peripheral devices like GPU, NIC, SSD drive. There an increasing demand install more on a single machine, but interfaces offered by Intel CPUs are fixed. To resolve such contention, switch, PCH (Platform Controller Hub), or virtualization cards installed machine allow multiple share interface. Congestion happens when collective traffic from overwhelm link capacity, transmission delay then...
Abstract Background Malignant transformation of the epidermis is an essential process in pathogenesis cutaneous squamous-cell carcinoma (cSCC). Although evidence has demonstrated that CD147 plays key roles various tumors, role epidermal malignant vivo remains unclear. Methods Epidermal CD147-overexpression or knockout (Epi CD147-OE Epi CD147-KO ) transgenic mouse models were generated for study. RNA-sequencing and q-PCR performed to identify differentially expressed genes....
With the vigorous development of renewable energy, large-scale wind power is connected to grid. Compared with conventional energy sources, generation has stochastic and intermittent characteristics, which brings great challenges safe stable operation grids. Forecasting essential for rational, effective use power. Thus, ability predict in a timely accurate manner particularly significant.The short-term prediction error mainly caused by inherent factors extrinsic factors. The factor refers...
Previous research about sensor based attacks on Android platform focused mainly accessing or controlling over sensitive device components, such as camera, microphone and GPS. These approaches get data from sensors directly need corresponding invoking permissions. This paper presents a novel approach (GVS-Attack) to launch permission bypassing zero application (VoicEmployer) through the speaker. The idea of GVS-Attack utilizes an system built-in voice assistant module -- Google Voice Search....