- Water Systems and Optimization
- Data Mining Algorithms and Applications
- Network Security and Intrusion Detection
- Structural Health Monitoring Techniques
- Advanced Graph Neural Networks
- Flow Measurement and Analysis
- Machine Learning in Materials Science
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Technology and Security Systems
- Cloud Data Security Solutions
- Embedded Systems Design Techniques
- Geophysical Methods and Applications
- Infrastructure Maintenance and Monitoring
- Artificial Intelligence in Games
- Web Data Mining and Analysis
- Oil and Gas Production Techniques
- Service-Oriented Architecture and Web Services
- Text and Document Classification Technologies
- Power Transformer Diagnostics and Insulation
- Advanced Malware Detection Techniques
- Topic Modeling
Beijing University of Posts and Telecommunications
2024
Indiana University Bloomington
2024
Tsinghua University
2024
State Grid Corporation of China (China)
2024
Tianjin University
2015-2021
This paper proposes a continuous leakage location method based on the ultrasonic array sensor, which is specific to gas in pressure container with an integral stiffener. collects signals generated from hole through piezoelectric sensor array, and analyzes space-time correlation of every collected signal array. Meanwhile, it combines frequency compensation superposition time domain (SITD), acoustic characteristics stiffener, obtain high-accuracy result stiffener wall. According experimental...
Zero Knowledge Proof (ZKP) is a very effective method of preserving privacy as it hides the most confidential information throughout transaction. In this paper, we present security and privacy-preserving approach for blockchain that relies on account multi-data asset models using mechanism. We provide options transferring data assets detecting duplicate expenditures, also develop transaction structures, anonymised addresses metadata assets. To create validate ZKP, use zk-SNARKs algorithm...
In this work, we present DeepEraser, an effective deep network for generic text removal. DeepEraser utilizes a recurrent architecture that erases the in image via iterative operations. Our idea comes from process of erasing pencil script, where area designated removal is subject to continuous monitoring and attenuated progressively, ensuring thorough clean erasure. Technically, at each iteration, innovative module deployed, which not only explicitly aggregates previous progress but also...
Abstract Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research focused on threats of large language (LLMs), yet comprehensive studies TTI are notably scarce. This paper introduces a systematic tool, named EvilPromptFuzzer, designed to fuzz evil prompts in models. For 15 kinds fine-grained risks, EvilPromptFuzzer employs strong knowledge-mining LLMs construct seed...