- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Telecommunications and Broadcasting Technologies
- Parallel Computing and Optimization Techniques
- Embedded Systems Design Techniques
- Context-Aware Activity Recognition Systems
- Explainable Artificial Intelligence (XAI)
- User Authentication and Security Systems
- Age of Information Optimization
- Digital Media Forensic Detection
- Advanced Computational Techniques and Applications
- Artificial Intelligence in Healthcare and Education
- Adversarial Robustness in Machine Learning
- Data Mining Algorithms and Applications
- Educational Games and Gamification
- IoT and Edge/Fog Computing
- Virtual Reality Applications and Impacts
- Rough Sets and Fuzzy Logic
- Advanced Malware Detection Techniques
- Interconnection Networks and Systems
- Smart Grid Security and Resilience
- Evacuation and Crowd Dynamics
Shanghai Electric (China)
2023-2024
China Mobile (China)
2020-2024
Henan University of Technology
2023
China Academy of Safety Sciences and Technology
2023
Samsung (United States)
2022
Research!America (United States)
2022
Tongji University
2022
Verizon (United States)
2022
Ericsson (United States)
2022
University of California, Davis
2022
Recently, with the development of COVID-19 pandemic and next generation telecommunication network (5G), metaverse, in which users interact each other through avatars, has attracted increasingly attention. However, like traditional cyberspace, a three-dimensional (3D) virtual world built on internet, also faces various unexpected security threats. In addition, some forms methods cyberspace threats have undergone further evolution metaverse environment. Consequently, social engineering attacks...
Concept lattice is an effective tool for knowledge representation and data analysis. It have been successfully applied to many fields. This paper illustrates the theory of compact dependencies in concept lattice, then study approach briefest rules extraction based on dependencies, including decision association with confidence 1. Finally, method example relationship between process parameters aim parameters,as well as other parameters, are discussed. provides a useful support advanced...
With the development of Internet Things (IoT) technology, massive heterogeneous equipment involving all walks life has been connected to networks. However, many current authentication methods have poor robustness and cannot ensure safety access due complexity uncertainty network environment. To deal with this problem, a hierarchical system was proposed in paper. First, an identification method (EIM), using stack denoising autoencoders (SDAs), is developed weaken recognize type equipment....
In recent years, the proliferation of Internet Things devices in power grids has exposed these critical infrastructure systems to numerous malicious network attacks. These attacks are characterized by their extensive scale, scope, and potential for harm. Concurrently, smart China utilize poor-performing domestic devices, owing policy mandates. Consequently, centralized deep learning techniques commonly leveraged anomaly detection on have limited applicability grids. To address this problem,...
To cope with rapid increases in both the number of smart devices and amount computation-intensive edge applications on such devices, distributed cross-device computing systems have received much attention Internet-of-Things (IoT) community. The heterogeneity IoT dynamic nature environments make it hard to manage resources a uniform manner that enables collaboration sharing among devices. In this paper, we propose Intelligent Distributed Edge Computing (IDEC) system architecture, which is...
RapidIO is an emerging high-performance and point-to-point packetized interconnection technology. In this paper, the design of logical core based on safety arbitration mechanisms described in detail. The packing unpacking I/O Logical, Message Passing Globally Shared Memory transactions are achieved. Excellent average data transfer rates, up to 7.8 bytes per cycle reached certain with 256-byte payloads, meanwhile efficiencies more than 95%. Moreover, maintenance read targeted at local...