- Cryptography and Data Security
- Embedded Systems Design Techniques
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- Brain Tumor Detection and Classification
- Real-Time Systems Scheduling
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Parallel Computing and Optimization Techniques
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
University of South China
2024
Hunan University
2024
Linköping University
2004
Distributed embedded systems implemented with mixed, event-triggered and time-triggered task sets, which communicate over bus protocols consisting of both static dynamic phases, are emerging as the new standard in application areas such automotive electronics. In a previous paper, we have developed holistic timing analysis scheduling approach for this category systems. Based on result, present design problems solved, identified characteristic hybrid systems: partitioning system functionality...
Federated learning (FL) supports multiple participants to collaborate train a global model in computing power networks, while the sensitive training data of all is kept locally for privacy protection. Although it widely used intelligent applications, there are often potentially considerable risks performing aggregation. In FL malicious will use mislabeled samples or upload poisoning models damage joint model's performance. This paper devises compromise attacks performed by against an system....