- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Advanced Decision-Making Techniques
- Security and Verification in Computing
- Video Surveillance and Tracking Methods
- Internet Traffic Analysis and Secure E-voting
- Information and Cyber Security
- Reproductive Physiology in Livestock
- Bayesian Methods and Mixture Models
- Fault Detection and Control Systems
- Human Pose and Action Recognition
- Gestational Diabetes Research and Management
- Probiotics and Fermented Foods
- Cryptography and Data Security
- Gait Recognition and Analysis
- Digital Media Forensic Detection
- Pregnancy and preeclampsia studies
- Simulation and Modeling Applications
- Smart Grid and Power Systems
- Software Testing and Debugging Techniques
- Artificial Intelligence in Law
- Milk Quality and Mastitis in Dairy Cows
- Human Mobility and Location-Based Analysis
University of Pennsylvania
2024
Ningxia Academy of Agriculture and Forestry Sciences
2022
Shanxi University
2020
Qingdao University
2019
Affiliated Hospital of Qingdao University
2019
Sichuan University
2019
West China Hospital of Sichuan University
2019
China Information Technology Security Evaluation Center
2012-2015
Beijing University of Technology
2008
Network vulnerability can be analyzed automatically by attack graph. Attack graph tools generate paths in network and show users the vulnerabilities analyzing process for security risk analysis. There are some problems such as state space explosion, high complexity of algorithms, being difficult to demonstrate graphically, so on, generation visualization techniques. Therefore, we surveyed technology. We summarized open source like MulVAL, TVA. Graph Toolkit, NetSPA commercial tools, example,...
This paper begins with a discussion of the role and value industrial control system (ICS) test bed which apply universal, controllable, realistic, repeatable experimental platform to SCADA cyber security research. According ICS layered architecture, based on emulation, physical, simulation (EPS-ICS Test bed) is designed implemented. EPS-ICS enables experimenters create experiments varying levels fidelity widely used in vulnerability digging, comprehensive training, facilitate development...
More standardized, networked and intelligentized nature of industry 4.0 has intensified critical infrastructures cyberthreats. According to cyber-physical systems (CPS) layered architecture security requirements in 4.0, a testbed based on cloud computing software defined network (SDN), or CPSTCS is proposed. The uses SDN recreate the cyber elements real-world physical devices for components. helps assess cyberthreats against dimensions infrastructures.
With the rapid development of information and automatic control technology, more industrial system(ICS) like SCADA, is interconnected with Ethernet directly connected to internet, which greatly improve efficiency data sharing introduced in security threats at same time. As important components critical infrastructure, if attacked, will behave abnormal result disasters society countries national economy. one most import protocols applied widely industry field, OPC responsible provide...
The Linear Parameter Varying Dynamical System (LPV-DS) is an effective approach that learns stable, time-invariant motion policies using statistical modeling and semi-definite optimization to encode complex motions for reactive robot control. Despite its strengths, the LPV-DS learning faces challenges in achieving high model accuracy without compromising computational efficiency. To address this, we introduce Directionality-Aware Mixture Model (DAMM), a novel applies Riemannian metric on...
The complex etiopathology of retained placenta (RP) and hazards associated with it has made crucial for researchers clinical veterinarians to study pathogenesis, early-warning diagnosis, treatment. This aimed screen the potential prognostic markers RP in dairy cows using plasma metabolomics coupled laboratory indicators. Blood samples were collected from 260 at 21, 14, 7, 0 days before parturition 21 after parturition. Consequently, 10 healthy similar parity, body condition score, age...
This paper introduces the gray clustering theory as a method to conduct an information security risk assessment for power substation communication systems using with combination of AHP and Delphi method, improves system model based on theory. Analysis albino by constructing weight function determine level quantification membership functions targets. Use examples prove that this can effectively evaluate risks system, provide theoretical guidance both management establishment protection system.
Stuxnet event in 2010 causes the intense attention all over world about information security problems of industrial control systems, how to assure systems has become a hot topic both industry sectors and academic community. In this paper, we focus on testing devices. We first review existing certifications area analyze features these certifications. Then, describe standards area. Furthermore, compare tools used for Following work, can begin further study emerging field.
Based on Dempster-Shafer (D-S) evidence theory of data fusion technology, a new intrusion detection system (IDS) model with C-SVM classifier is proposed. This consisted three SVM classifiers, which sorted out Normal, DoS, U2R, R2L and Probing behaviors from network connections according to basic TCP features, content features traffic features. Those classified results were obtained through Dempter-Shafer's rule combination, consequently recognitions implemented. The experimental result...
Steganalysis is the opposite art to steganography, whose goal detect whether or not seemly innocent objects like image hiding message. With explosive growth of Internet information. Making real time steganalysis online malicious use multimedia documents for covert communication has become more and difficult. Traditional research on mainly focus how improve accuracy Steganalysis, few them pay much attention efficiency Image technology architecture optimizing service providing. Regarding this...
This paper begins with a discussion of the role and value network testbed which apply universal experimental platform to test new theories, technologies, vulnerabilities for cyber security research networked systems. Several common aspects NCR, Emulab, Testbed@TWISC, DETERlab, PlanetLab, SATURN, StarBED GENI are introduced, mainly including: background, techniques, architecture. Finally, we propose trends testbed, on one hand integration cloud computing, software defined (SDN) kits in...
This paper begins with a discussion of the deficiency current algorithms which use number changing points frame-difference as threshold to determine moving object. Based on human morphology, feature body in video surveillance is analyzed. Secondly, "the head and shoulder projection curve"," proportion hair "and "height-width ratio "are extracted three key parameters by mathematical methods. Finally, two are used detect target, replacing existing threshold. DSP-based experimental results show...
Dynamic tracing and trace replay are two main functions in vehicle monitoring system of GIS. Based on the idea line-to-point set, "point-to-point" road matching algorithm "Trace interpolation" designed implemented. The "Point-to-point" is that will be separated into a series discrete set points, then got path matched accordingly. At same time, prediction principle used to solve problems such as miscarriage justice at crossroads; First all, premise applying studied, process introduced. It...
Power production control system is very important in the power system. In paper, a new method of risk assessment for based on rough set theory, fuzzy mathematics and Bayesian network(BN) presented. Though cluster influencing factors by using compatibles set, making minimum feature class as BN node, which can effectively reduce complexity structure, At same time, carry probabilistic reasoning BN, achieve rapid risk, then through Anti-fuzzification, obtain exact value risks. Finally, examples...
Designated verifier signature, was proposed by Jakobsson, Sako and Impagliazzo, is an important cryptographic primitive which can be used to convince a single third party, i.e. the designated verifier, only who convinced fact that always construct signature intended for himself indistinguishable from original signature. Since notion of introduced, lot schemes were in literature. In this paper, we propose first scheme circulant matrices. We show secure under computational Diffie-Hellman...
This study was conducted to determine the antimicrobial resistance and virulence traits of 32 Enterococcus faecium isolates from clinical bovine mastitis cases in Ningxia Province, China. In total, E. were taken subclinical on basis morphological characterization biochemical testing, screened for susceptibility. The genes studied using polymerase chain reaction (PCR). disc diffusion assay revealed a high occurrence against tetracycline (78.1%) erythromycin (68.8%) isolates. However, all...
The Linear Parameter Varying Dynamical System (LPV-DS) is an effective approach that learns stable, time-invariant motion policies using statistical modeling and semi-definite optimization to encode complex motions for reactive robot control. Despite its strengths, the LPV-DS learning faces challenges in achieving a high model accuracy without compromising computational efficiency. To address this, we introduce Directionality-Aware Mixture Model (DAMM), novel applies Riemannian metric on...
The intelligent mobile video supervising system based on DSP are introduced in this paper. Based TMS320DM642 embedded platform, capture and processing functions designed. streaming media technology communication technology, relay distribution windows mobile, monitoring control With features, the proves to meet design expectations. Embedded makes enjoy advantage of compact size, high stability, strong mobility application suitability a variety environment. Similarly, Detection algorithm...