Chengbin Huang

ORCID: 0009-0003-2127-3841
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • Privacy, Security, and Data Protection
  • Hip and Femur Fractures
  • Geomagnetism and Paleomagnetism Studies
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced X-ray and CT Imaging
  • Image and Signal Denoising Methods
  • Sparse and Compressive Sensing Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Data and IoT Technologies
  • Speech and Audio Processing
  • Software-Defined Networks and 5G
  • Network Packet Processing and Optimization
  • Algorithms and Data Compression
  • Geophysical and Geoelectrical Methods
  • Bone health and osteoporosis research
  • Privacy-Preserving Technologies in Data

Second Affiliated Hospital & Yuying Children's Hospital of Wenzhou Medical University
2025

Wenzhou Medical University
2025

China Telecom
2022-2023

China Telecom (China)
2022-2023

Cloud Computing Center
2022

Abstract Introduction A large number of middle-aged and elderly patients have an insufficient understanding osteoporosis its harm. This study aimed to establish validate a convolutional neural network (CNN) model based on unenhanced chest computed tomography (CT) images the vertebral body skeletal muscle for opportunistic screening in with osteoporosis. Materials methods Our team retrospectively collected clinical information from participants who underwent CT dual-energy X-ray...

10.1186/s13244-024-01817-2 article EN cc-by Insights into Imaging 2025-01-10

Data compression and encryption are required in wireless sensor networks (WSNs) for an acoustic signal. However, it is difficult the nodes with low configuration to support complex computation. In order solve mismatch between resources requirement, compressed sensing (CS) measurement matrix based on Logistic chaotic sequence applied The excellent performance of CS system can achieve data sampling, compression, at same time without experimental results show that most SNR all-acoustic frames...

10.1145/3531232.3531252 article EN 2022-03-18

The more complex 5G mobile communication network faces serious security challenges. authentication and key agreement (AKA) is utilized for user equipment (UE) the network. cryptographic functions in AKA protocol are foundation ensuring of existing uses AES algorithm as encryption core function by default. However, some special application requires autonomous controllable algorithms to diversify solutions. In light this, SM4 proposed China Cryptographic Administration programmed Python...

10.1109/icaml57167.2022.00090 article EN 2022-07-01

Abstract. IPSec protocol has been used to protect user plane transmission in the network layer of 5G mobile communication network. Compared protocols transport or higher, must deal with issues reliability and fragmentation, which increases its complexity overhead. Therefore, implementation is quite vital for application efficiency. In this paper, a kind method called packet slicing proposed promote processing efficiency principle segmentation parallel, can cut down time delay high traffic...

10.1145/3605801.3605818 article EN 2023-06-16

In recent years, the operation and maintenance (O&M) of wind farms has gradually developed towards intellectualization. However, due to fact that most are built in remote areas with backward network infrastructure, progress intelligent O&M is slow. Based on current situation requirements O&M, this paper proposes a hybrid networking mode 5G private traditional power communication network, integrates basis retaining original production network. This not only ensures safe access inspection...

10.1145/3529299.3530211 article EN 2022-04-22

In the evolution of mobile communications from 4G to 5G, concept security design and protection has been proposed. The wireless air interface may face risks, such as identity spoofing, service denial replay attacks. It is crucial protect confidentiality integrity data. this article, we analyze performances for three kinds algorithms 5G interface, put forward application strategies in different scenarios. beneficial popularize various cryptographic make mechanism customized network perfect.

10.1109/cncit56797.2022.00033 article EN 2022-06-01

Abstract Long-term geomagnetic data monitoring will generate a huge amount of data, and compression algorithms be required to reduce the save storage transmission expenses. To adapt application with limited resources, CCSDS lossless algorithm is applied measurement in our work. This made up two parts: preprocessor an adaptive entropy coder. In this study, unit-delay predictor chosen as based on properties signal, coder chooses suitable for data. A 14-hour continuous was performed. The...

10.1088/1742-6596/2387/1/012039 article EN Journal of Physics Conference Series 2022-11-01
Coming Soon ...