- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Hydrogels: synthesis, properties, applications
- Digital Rights Management and Security
- Advanced Materials and Mechanics
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Mobile Agent-Based Network Management
- Radar Systems and Signal Processing
- Advanced SAR Imaging Techniques
- Auction Theory and Applications
- Advanced Steganography and Watermarking Techniques
- Advanced Theoretical and Applied Studies in Material Sciences and Geometry
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Algal biology and biofuel production
- Software System Performance and Reliability
- Spam and Phishing Detection
- Advanced Physical and Chemical Molecular Interactions
- Microbial Fuel Cells and Bioremediation
- Cloud Data Security Solutions
- Software Engineering Research
- Advanced Data Storage Technologies
- Advanced Optical Imaging Technologies
- Advanced Authentication Protocols Security
KTH Royal Institute of Technology
2024
Beijing Institute of Technology
2019-2023
China Agricultural University
2020-2022
Sichuan University
2017
Philips (China)
2011
Philips (Finland)
2010
Chinese University of Hong Kong
2004-2008
Kaifeng University
2007
Xidian University
2002-2003
University of North Texas
1997-2001
Digital radio frequency memory (DRFM)-based main-lobe interrupted sampling repeater jamming (ISRJ) can achieve the effects of both deception and suppression, which cause serious performance degradation in modern radar systems. In this article, we propose an electronic counter-countermeasure (ECCM) scheme based on signal reconstruction mismatched filtering (SC-MMF). The ECCM consists two steps: time-domain filter (MMF) design. First, without noise is reconstructed using provided perception...
In today's digital landscape, the importance of timely and accurate vulnerability detection has significantly increased. This paper presents a novel approach that leverages transformer-based models machine learning techniques to automate identification software vulnerabilities by analyzing GitHub issues. We introduce new dataset specifically designed for classifying issues relevant detection. then examine various classification determine their effectiveness. The results demonstrate potential...
Despite the vast body of research literature proposing algorithms with formal guarantees, amount verifiable code in today's systems remains minimal. This discrepancy stems from inherent difficulty verifying code, particularly due to time-consuming nature and strict formalism proof details that verification tools require. However, emergence transformers Large Language Models presents a promising solution this challenge. In position paper, we believe have potential read papers propose proofs...
Large Language Models (LLMs) have demonstrated their exceptional performance in various complex code generation tasks. However, broader adoption is limited by significant computational demands and high resource requirements, particularly memory processing power. To mitigate such model pruning techniques are used to create more compact models with significantly fewer parameters. current approaches do not focus on the efficient extraction of programming-language-specific sub-models. In this...
The kinetics of gel swelling is theoretically analyzed by considering coupled motions both the solvent and polymer network. This model avoids two process approach Li Tanaka, in which motion indirectly considered. Analytical solutions network movement are found from collective diffusion equations for a long cylindrical large disk gel. For gel, speed proportional to −r/(2a) along radial direction z/a axial direction, respectively. Here r z represent coordinates, respectively, radius cylinder....
This paper explores opportunities to utilize Large Language Models (LLMs) make network configuration human-friendly, simplifying the of devices & development routing algorithms and minimizing errors. We design a set benchmarks (NetConfEval) examine effectiveness different models in facilitating automating configuration. More specifically, we focus on scenarios where LLMs translate high-level policies, requirements, descriptions (i.e., specified natural language) into low-level...
Tanaka's approach to swelling kinetics of a solid gel sphere is extended spherical microgel shell. The boundary condition at the inner surface obtained from minimization shear elastic energy. Temporal evolution shell represented in form expansion over eigenfunctions corresponding diffusion equation. recovered as special case our general solution if radius approaches zero. In another limiting thin (balloon-like) shell, set reduced single exponential term. case, swells slightly faster than...
The average turbid optical properties of the N-isopropylacrylamide (NIPA) polymer solution entrapped inside a polyacrylamide hydrogel (called an NIPA/PAAM gel system) were studied using multiwavelength oblique-incidence reflectometer. turbidity such system can be drastically changed by simply switching temperature from below low critical NIPA, around 33C, to above. absorption coefficient and reduced scattering obtained as function wavelength for samples with selected NIPA blue dextran...
Electronic auctions have become an integral part of electronic commerce nowadays. Besides the popular single-sided auction protocols, i.e. English auction, Vickrey etc., continuous double (CDA) is important protocol that permits multiple buyers and sellers to trade goods. Internet CDAs been widely used in financial commodities markets. Although provides excellent infrastructure for CDAs, anonymity security are issues CDA marketplaces. While most studies focusing on strategies agent-oriented...
Analysis by Forrester research revealed that 18% of global exports will flow online in 2004 and the volume e-commerce surpass $400 billion. Digital rights protection is a major issue multimedia contents. Watermarking technology has been proposed as promising enabling for digital A unique watermark embedded each piece contents before it distributed to customer. When unauthorized copies are found, customer who owns can be readily identified means watermark. However, may also come from content...
This paper explores opportunities to utilize Large Language Models (LLMs) make network configuration human-friendly, simplifying the of devices and minimizing errors. We examine effectiveness these models in translating high-level policies requirements (i.e., specified natural language) into low-level APIs, which requires understanding hardware protocols. More specifically, we propose NETBUDDY for generating configurations from scratch modifying them at runtime. splits generation...
Extensive studies have been made on electronic voting in the last twenty years, and many schemes proposed, which both security effectiveness improved. However, most available secure vote mainly focused simple "one man, one vote" plurality protocol. We address issues of Borda protocol, another important social decision a voter can rank candidates by assigning them different points. propose scheme that guarantees full privacy protection voters as well universal verifiability weak robustness....
Electronic voting has become one of the most popular activities over Internet. Security and privacy are always regarded as crucial factors in electronic system design. Various secure schemes have been proposed past several years to ensure safe operation them focused on common "one man, vote" plurality voting. In this paper, we study security issues Clarke tax protocol, another important social choice protocol. This protocol is voting, especially software agent based because a voter's...
It is believed that the mobile agent technology going to play an important role in future electronic commerce due characteristics of mobility and autonomy agents, which make it ideal for applications open network environment. However, a couple security issues need be tackled before we can employ agents real life commercial applications. Some schemes have been proposed solve problems paradigm, such as undetachable signature scheme, secure scheme using proxy others. Most current work, however,...
DRM (Digital Rights Management) is a basic tool to protect digital content from unauthorized using, which regarded as one of the most important mechanisms in industry. In scenario application, there are couple roles involved, named Content Provider (CP), Service (SP) and consumer Device. CP makes distributes SP, who will then deliver user through its network. current delivery architecture, has no control after it distributed means SP may use way that not consistent with agreement between SP....
Connected and interoperable healthcare system promises to reduce the cost of delivery, increase its efficiency enable consumers better engage with clinicians manage their care. However at same time it introduces new risks towards security privacy personal health information, which are considered be prominent impediments realization full benefits connected healthcare. In future, different technologies will used address in trust domains. For domain healthy lifestyle services, is less trusted,...
The swelling behavior of gels with built-in anisotropy is investigated near the volume-phase transition. anisotropic consist two interpenetrating polymer networks. One them (N-isopropylacrylamide) prestressed before gelation other one (polyacrylamide) takes place, resulting in anisotropy. It found that these have a preferred direction for swelling: above phase transition point, gel swells more along direction. ratio length (non-pre-stressed) to its diameter (prestressed) exhibits stepwise...
To enhance the drug uptake and release capacity of silicone rubber (SR), N-isopropylacrylamide (NIPA) hydrogel particles have been incorporated into a SR membrane. The NIPA were thoroughly blended with uncured certain ratio at room temperature. mixture was then cast in Petri dish to 1 mm thickness cured 10 hours 90°C. SR/NIPA composite gel can absorb water approximately equal its dry weight. Brilliant blue, used as mock drug, loaded gel. Drug increased exponentially final value that is...
Abstract Spinodal decomposition in a chemically crosslinked N ‐isopropylacrylamide (NIPA) polymer gel was investigated using turbidity and ultrasonic techniques. The of the quenched NIPA measured over five orders magnitude timescales. With an increase time, transfers from transparent swollen to cloudy inhomogeneous gel, eventually collapsed gel. first transformation is rapid process that only involves local arrangement network solvent into dilute dense domains. second very slow global...