- IoT and Edge/Fog Computing
- Distributed Control Multi-Agent Systems
- Software-Defined Networks and 5G
- Remote-Sensing Image Classification
- Stability and Control of Uncertain Systems
- Caching and Content Delivery
- Human Pose and Action Recognition
- Neonatal Respiratory Health Research
- Service-Oriented Architecture and Web Services
- Power Systems and Technologies
- Privacy, Security, and Data Protection
- Infrared Target Detection Methodologies
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Age of Information Optimization
- Satellite Communication Systems
- Anomaly Detection Techniques and Applications
- Robotics and Sensor-Based Localization
- Privacy-Preserving Technologies in Data
- Inhalation and Respiratory Drug Delivery
- Advanced Malware Detection Techniques
- Nanoplatforms for cancer theranostics
- Gait Recognition and Analysis
- Access Control and Trust
- Financial Distress and Bankruptcy Prediction
University of Electronic Science and Technology of China
2013-2025
Shanghai Jiao Tong University
2024
Nanjing University of Aeronautics and Astronautics
2023-2024
Jiangxi Maternal and Child Health Hospital
2024
Washington University in St. Louis
2024
Sichuan University
2024
Nanjing Foreign Language School
2023
Northeastern University
2023
China Telecom
2023
China Telecom (China)
2023
Skeleton-based action recognition has been widely investigated considering their strong adaptability to dynamic circumstances and complicated backgrounds. To recognize different actions from skeleton sequences, it is essential crucial model the posture of human represented by its changes in temporal dimension. However, most existing works treat sequences spatial dimension same way, ignoring difference between data which not an optimal way sequences. The each frame proposed be modeled...
The booming growth of the internet things has brought about widespread deployment devices and massive amounts sensing data to be processed. Federated learning (FL)-empowered mobile edge computing, known for pushing artificial intelligence network while preserving privacy in cooperation, is a promising way unleash potential information data. However, FL’s multi-server collaborative operating architecture inevitably results communication energy consumption between servers, which poses great...
Cooperative unmanned aerial vehicle (UAV) swarms could expand the mission capability of single UAV and overall combat effectiveness. We consider dynamic scenarios where an swarm confronts multiple maneuvering high-value targets (HVTs) attackers. In such hostile scenarios, each would generally strive to survive through collaboratively offending their opponents self-defense from potential attacks. modeling as biologically inspired mobile adaptive networks imitate confrontations swarms. It is...
Abstract Material stiffness, a significant parameter of contact interface, is investigated to improve the uniformity pressure. A interface material stiffness optimization design algorithm developed based on modified solid isotropic with penalization (SIMP) method. The pressure field represented by its variance and defined as objective. node-to-node frictionless elastic theory adopted perform analysis. effectiveness for improving surface verified two cases. Because relationship between...
Sepsis is defined as a systemic inflammatory response syndrome caused by dysregulated host to bacterial infection and the leading cause of death in intensive care unit at hospitals. At present, despite discovery many potential therapeutic methods for anti-infective treatment immune-suppressing treatment, effective drug treatments sepsis are lacking clinic. Herein, coloaded dual agent liposome (Cip·HCl/Cur@Lip-γ3) nanoplatform was developed enveloping Cip·HCl Cur into pH-responsive...
Background: Alzheimer’s Disease (AD) is a highly prevalent form of age-related dementia. However, the underlying mechanisms AD are largely unexplored. Materials and Methods: In this study, bioinformatics analysis was performed to identify possible therapeutic targets for AD. The GEO database used screen Differentially Expressed Genes (DEGs). Enrichment analysis, protein-protein interaction network, LASSO model analyses were successfully performed. Furthermore, an ELISA assay also conducted...
With the fast development of wireless sensor network (WSN) and Internet things (IOT), as key technologies both them, security nodes networks is becoming more important. Compared with other protocols, hierarchical topology has advantages in energy saving control, but almost none existing protocols been considered about when join or quit from network, while it will badly threaten network. In this paper, secure mechanism on joining quitting deeply studied, a clustering algorithm proposed to...
Recent decades have witnessed an increasing academic interest in mobile-assisted vocabulary learning. To explore the possible influencing factors on learning outcomes, this study aimed at examining effects of self-regulation and peer scaffolding among undergraduate students using Shanbay App beyond classroom. end, altogether 71 intermediate-level English learners aged 17-19 years were chosen as participants, with 37 experimental group (with scaffolding) 34 control (without scaffolding). Data...
In this correspondence, we consider suppressing non-circular interferences for Global Navigation Satellite Systems (GNSS) receivers utilizing polarization sensitive arrays, regarding high dynamic scenarios. We model the widely linear array receive signal corrupted by potentially interferences. analyze second-order statistics of and extend covariance matrix taper (CMT) methodology to cope with signal. further develop null broadening algorithms suppress high-dynamic Simulation results validate...
An Automated Target Recognition system (ATR) was developed to locate and target small object in images videos. The data is preprocessed sent a grayscale optical correlator (GOC) filter identify possible regionsof- interest (ROIs). Next, features are extracted from ROIs based on Principal Component Analysis (PCA) neural network (NN) be classified. analyzed by the NN classifier indicating if each ROI contains desired or not. ATR found useful identifying boats open sea. However, due "noisy...
Vehicular edge computing servers as a decentralized network extension to offer distributed and proximity services for computation-intensive vehicular applications. For some complex tasks, when they are offloaded from smart vehicles servers, environment needs be established on the which requires extra power brings unprecedented computation delay. To address this problem, we incorporate transfer learning into networks, leveraging existing knowledge experience of similar improve agility...
Automated Target Recognition (ATR) systems aim to automate target detection, recognition, and tracking. The current project applies a JPL ATR system low-resolution sonar camera videos taken from unmanned vehicles. These images are inherently noisy difficult interpret, pictures underwater were unreliable due murkiness inconsistent lighting. breaks recognition into three stages: 1) Videos of both footage broken frames preprocessed enhance detect Regions Interest (ROIs). 2) Features extracted...
This article investigates the problem of circumnavigation multi-agent system with a second-order integrator dynamic model, and drive agents enclose around moving target desired speed orbit radius. Unlike mostly nowaday researches, this promotes control law rather than first-order to directly agents' accelerated velocity. A fully-actuated approach is applied simplify nonlinear matters, rigorous proof given for validity law. Finally simulation then performed verify feasibility proposed method.
Alzheimer's disease [AD] disproportionately affects our seniors, diminishing their health and life expectancy. As the world population grows older, collective burden of AD has become unsustainable. Globally, there were 43.8 million patients in 2016, with a projection affecting 152 by 2050. Recent discoveries have shown that molecular changes characteristic to manifested 20 years before discernable neurological phenotypes emerge. It is feasible halt or reverse this pathological process...
This paper analyzes the deficiency of P2DR security model, and proposes a kind new active dynamic model AD-RPPDRRM, in which risk analysis, management recovery are imported.On basis this basic technologies used to implement defense depth system discussed.At last, in-depth typical network is given.