- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Advanced Graph Neural Networks
- Internet Traffic Analysis and Secure E-voting
- Complex Network Analysis Techniques
- Imbalanced Data Classification Techniques
- Network Traffic and Congestion Control
- Cloud Computing and Resource Management
- Colorectal Cancer Surgical Treatments
- Text and Document Classification Technologies
- Software System Performance and Reliability
- Opinion Dynamics and Social Influence
- Advanced Optical Network Technologies
- Anomaly Detection Techniques and Applications
- Data Stream Mining Techniques
- Video Surveillance and Tracking Methods
- Colorectal and Anal Carcinomas
- Interconnection Networks and Systems
- Advanced Database Systems and Queries
- Colorectal Cancer Treatments and Studies
- Cognitive Computing and Networks
- Caching and Content Delivery
- Appendicitis Diagnosis and Management
- Intraperitoneal and Appendiceal Malignancies
- Human Mobility and Location-Based Analysis
Xintai People's Hospital
2025
PLA Information Engineering University
2020-2024
System Equipment (China)
2014-2024
Zhejiang University of Technology
2023-2024
Songshan Lake Materials Laboratory
2022-2024
Wuhou District People's Hospital, Chengdu
2022
National Tsing Hua University
2019-2022
First Affiliated Hospital of GuangXi Medical University
2019-2022
Guangxi Medical University
2019-2022
China Medical University Hospital
2021
Along with the rapid evolution of mobile communication technologies, such as 5G, there has been a significant increase in telecom fraud, which severely dissipates individual fortune and social wealth. In recent years, graph mining techniques are gradually becoming mainstream solution for detecting fraud. However, imbalance problem, caused by Pareto principle, brings severe challenges to data mining. This emerging complex issue received limited attention prior research. this paper, we propose...
Distributed control plane is a promising approach to scalable software-defined networking (SDN). However, traffic changes could incur load imbalance among individual controllers. Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch using available resource. Such has performed with well-defined mechanism fully utilize the resource In this paper, we study decide which and where it should migrated for balanced plane, define as...
Software Defined Networking (SDN) is a revolutionary networking paradigm towards the future network, experiencing rapid development nowadays. However, its main characteristic, separation of control plane and data plane, also brings about new security challenges, i.e., Denial-of-Service (DoS) attacks specific to OpenFlow SDN networks exhaust bandwidth overload buffer memory switch. To mitigate DoS in networks, we design implement SGuard, application on top NOX controller that mainly contains...
In recent years, the increasing prevalence of mobile social network fraud has led to significant distress and depletion personal wealth, resulting in considerable economic harm. Graph neural networks (GNNs) have emerged as a popular approach tackle this issue. However, challenge graph imbalance, which can greatly impede effectiveness GNN-based detection methods, received little attention prior research. Thus, we are going present novel cost-sensitive (CSGNN) article. Initially, reinforcement...
Software-defined networking (SDN) has emerged as a new paradigm that can provide fine-grained network management service. Since the SDN controller makes control decision for network, it becomes main target of denial service (DoS) attacks. In this paper, we propose BWManager to mitigateE which mainly consists mitigate DoS attacks on with four key components: 1) simplified detection module; 2) forecasting engine; 3) priority manager; and 4) scheduler. The module calculates comprehensive...
Summary Distributed control plane is a promising approach to scalable software‐defined networking (SDN). Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch traffic using available resource. However, such has performed with well‐designed mechanism fully utilize resources in all three resource dimensions: CPU, bandwidth, and memory. In this article, we first provide model for SDN reduce the decision centralized utilization...
The authors present a case of an infected anterolateral thigh flap repairing the defect after auricular squamous cell carcinoma surgery. A 59-year-old male with in right auricle was admitted to hospital. After extended excision tumor, repaired free flap. accidentally multiple digestive tract bacteria. Computed tomography (CT) angiography employed reconstruct anastomosed artery patient followed up for 3 years. survived well. No recurrence or metastasis observed. In addition, satisfied...
With the rapid evolution of mobile communication networks, number subscribers and their practices is increasing dramatically worldwide. However, fraudsters are also sniffing out benefits. Detecting from massive volume call detail records (CDR) in networks has become an important yet challenging topic. Fortunately, Graph neural network (GNN) brings new possibilities for telecom fraud detection. presence graph imbalance GNN oversmoothing problems makes fraudster detection unsatisfactory. To...
Telecom fraud detection is of great significance in online social networks. Yet the massive, redundant, incomplete, and uncertain network information makes it a challenging task to handle. Hence, this paper mainly uses correlation attributes by entropy function optimize data quality then solves problem telecommunication with incomplete information. First, filter out redundancy noise, we propose an attribute reduction algorithm based on max-correlation max-independence rate (MCIR) improve...
Software-Defined Networking (SDN) has quickly emerged as a promising technology for future networks and gained much attention. However, the centralized nature of SDN makes system vulnerable to denial-of-services (DoS) attacks, especially currently widely deployed multicontroller system. Due DoS model may additionally face risk cascading failures controllers. In this paper, we propose SDNManager, lightweight fast denial-of-service detection mitigation SDN. It five components: monitor,...
Elastic control could balance the distributed plane in Software-Defined Networking (SDN). Dynamic switch migration has been proposed to achieve it. However, existing schemes mainly focus on how execute operation, but not why. This paper designs a decision-making mechanism based zero-sum game theory reelect new controller as master for migrated switches. It first chooses heavy which invites its neighbors players compete role of this game-playing field (GPF) is an occasional and loose domain...
Several reported studies have focussed particular interest on the elastic control via OpenFlow (OF) switch migrations in software‐defined networks to avoid uneven load distributions among controllers. However, it is not clear which should be migrated and where will moved. A paradigm that heavy controller tries migrate its switches, other light controllers compete for designed. Then, taking as game players OF switches commodities, a zero‐sum model exploited, emulate competitions This first...
Recently, a number of similarity-based methods have been proposed for link prediction complex networks. Among these indices, the resource-allocation-based perform very well considering amount resources in information transmission process between nodes. However, they ignore channels and their capacity two endpoints. Motivated by Cannikin Law, definition is to quantify capability any Then, based on capacity, potential (PIC) index prediction. Empirical study 15 datasets has shown that PIC we...
In this letter, we model the dynamic instance switching problem based on fact that some routing instances could have common vulnerabilities. We propose correlation-aware (CDIS) algorithm to solve problem. The simulation results show that, compared with baseline algorithms, CDIS improves network compromised ratio by at least 10%.
INTRODUCTION: Natural orifice specimen extraction is the next step in minimally invasive colorectal surgery but can be technically challenging, with additional risks, especially for oncologic surgery. For several key reasons, sigmoid volvulus well suited natural We describe our method and experience double-stapled anastomosis transrectal volvulus. TECHNIQUE: Using 3- or 4-port laparoscopy, mesentery separated from long loop. After distal bowel tied off washed out, rectum completely...
Super spread detection has been widely applied in network management, recommender systems, and cyberspace security. It is more complicated than heavy hitter owing to the requirement of duplicate removal. Accurately detecting a super real-time with small memory demands remains nontrivial yet challenging issue. The previous work either had low accuracy or incurred overhead could not provide precise cardinality estimation. This paper designed an invertible sketch for high accuracy. introduces...