- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Access Control and Trust
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Caching and Content Delivery
- Genomic variations and chromosomal abnormalities
- Advanced Database Systems and Queries
- Network Security and Intrusion Detection
- Service-Oriented Architecture and Web Services
- Software-Defined Networks and 5G
- Mobile Agent-Based Network Management
- AI in cancer detection
- Data Management and Algorithms
- Speech and Audio Processing
- Advanced Authentication Protocols Security
- Radiomics and Machine Learning in Medical Imaging
- Advanced Data Storage Technologies
- Recommender Systems and Techniques
- EEG and Brain-Computer Interfaces
- Gene expression and cancer classification
South China Normal University
2016-2025
Key Laboratory of Guangdong Province
2021-2024
Guangdong University of Foreign Studies
2019
Institute of Seismology
2018
Guizhou Normal University
2016
China West Normal University
2014
Sun Yat-sen University
2008-2013
Queensland University of Technology
2012
Tsinghua University
2012
Beihang University
2012
With the increasing maturity of NoSQL databases as well situation reading more than writing on large volumes data, many applications turn to and pick it data storage system. Migrating from SQL database providing efficient query become growing imperative. However, join operation is not supported in read separately for multiple times which brings poor performance unavoidable. This paper proposes a schema conversion model transforming can provide high with nesting relevant tables, graph...
Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. Smart handle and transfer assets values, offering strong incentives for malicious attacks. Intrusion attacks popular type In this article, we propose ContractGuard, the first intrusion detection system (IDS) to defend against such Like IDSs conventional programs, ContractGuard detects attempts as abnormal control flow. However, existing IDS techniques/tools inapplicable due...
Cloud computing has been acknowledged as one of the prevaling models for providing IT capacities. The off-premises paradigm that comes with cloud incurred great concerns on security data, especially integrity and confidentiality service providers may have complete control infrastructure underpins services. This makes it difficult to share data via where should be confidential only authorized users allowed access data. work aims construct a system trusted sharing through untrusted providers,...
Cloud computing is an emerging paradigm in which IT resources and capacities are provided as services over the Internet. Promising it is, this also brings forth new challenges for data security access control when users outsource sensitive sharing on cloud servers, likely outside of same trust domain owners. To maintain confidentiality of, user against untrusted existing work usually apply cryptographic methods by disclosing decryption keys only to authorized users. However, doing so, these...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Background:</i> In medicine, karyotyping chromosomes is important for medical diagnostics, drug development, and biomedical research. Unfortunately, chromosome usually done by skilled cytologists manually, which requires experience, domain expertise, considerable manual efforts. Therefore, automating the process a significant meaningful task....
Relational databases have been prevailing for the last two decades, with features of clear semantics and ease use SQL supported by underlying theory, relational algebra. provide good support structural data management. However, recent development in IT brings forward big data, featuring extreme large volume variety type structures, are difficult to handle such due strict constraints on structure relations, so on. On other hand, NoSQL databases, including HBase, MongoDB, Cassandra, etc.,...
Because of its efficiency, word embedding has been widely used in many natural language processing and text modeling tasks. It aims to represent each by a vector so such that the geometry between these vectors can capture semantic correlations words. An ambiguous often have diverse meanings different contexts, quality which is called polysemy. The bulk studies aimed generate only one single for word, whereas few made small number embeddings present word. However, it hard determine exact...
This study evaluated a novel approach for diagnosis and classification of obstructive sleep apnea (OSA), called Obstructive Sleep Apnea Smart System (OSASS), using residual networks single-channel nasal pressure airflow signals.Data were collected from the center First Affiliated Hospital, Sun Yat-sen University, Integrative Department Guangdong Province Traditional Chinese Medical Hospital. We developed new model multi-resolution network (Mr-ResNet) based on to detect signals recorded by...
Abstract Background Major depressive disorder (MDD) is a common mental illness, characterized by persistent depression, sadness, despair, etc., troubling people’s daily life and work seriously. Methods In this work, we present novel automatic MDD detection framework based on EEG signals. First of all, derive highly MDD-correlated features, calculating the ratio extracted features from signals at frequency bands between $$\beta$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">...
Abstract Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according the allocated users. This paper describes PERMIS role‐based authorization infrastructure along with its conceptual authorization, control, trust models. has novel concept of a credential validation service, which verifies user's credentials prior decision‐making enables distributed management credentials. also supports delegation authority;...
The widespread recognition of the blockchain technology that decoupled from cryptocurrency has raised interest industry. As apparent drawbacks Proof Work (PoW) protocol hinder large deployment PoW for many distributed applications, consensus mechanism evolved quickly to satisfy business requirements. Since is core technology, it imperative ensure performs correctly. Authority, a novel Byzantine fault-tolerant algorithm, an appealing alternative algorithm its high throughput rate and...
The financial property of Ethereum makes smart contract attacks frequently bring about tremendous economic loss. Method for effective detection vulnerabilities in contracts imperative. Existing efforts security analysis heavily rely on rigid rules defined by experts, which are labor-intensive and non-scalable. There is still a lack effort that considers combining expert-defined patterns with deep learning. This paper proposes EtherGIS, vulnerability framework utilizes graph neural networks...
The Unmanned Aerial Vehicles (UAVs) delivery service is being increasingly used in logistics. However, it challenging for a UAV to precisely identify the position parcel delivering if only aided by GPS, especially some complex environments with weak signals and high interference. For this issue, we present knowledge distillation empowered edge intelligence architecture, KeepEdge, achieve visual information-assisted positioning services. Specifically, integrate deep neural networks (DNN) into...
Cloud computing has become a popular choice as an alternative to investing new IT systems. When making decisions on adopting cloud related solutions, security always been major concern. This article summarizes concerns in and proposes five service deployment models ease these concerns. The proposed provide different features address requirements scenarios can serve reference for deployment.
Sleep stage classification is of great importance in human health monitoring and disease diagnosing. Clinically, visual-inspected classifying sleep into different stages quite time consuming highly relies on the expertise specialists. Many automated models for have been proposed previous studies but their performances still exist a gap to real clinical application. In this work, we propose novel multi-view fusion network named MVF-SleepNet based multi-modal physiological signals...
The stone recognition and analysis in CT images are significant for automatic kidney diagnosis. Although certain contributions have been made, existing methods overlook the promoting effect of clinical knowledge on model performance interpretation. Thus, it is attractive to establish detecting evaluating stones originating from practical diagnostic process. Inspired by this, a novel clinical-inspired framework proposed involve process urologists better analysis. contains three main steps,...