Gansen Zhao

ORCID: 0009-0007-1526-5326
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Caching and Content Delivery
  • Genomic variations and chromosomal abnormalities
  • Advanced Database Systems and Queries
  • Network Security and Intrusion Detection
  • Service-Oriented Architecture and Web Services
  • Software-Defined Networks and 5G
  • Mobile Agent-Based Network Management
  • AI in cancer detection
  • Data Management and Algorithms
  • Speech and Audio Processing
  • Advanced Authentication Protocols Security
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Data Storage Technologies
  • Recommender Systems and Techniques
  • EEG and Brain-Computer Interfaces
  • Gene expression and cancer classification

South China Normal University
2016-2025

Key Laboratory of Guangdong Province
2021-2024

Guangdong University of Foreign Studies
2019

Institute of Seismology
2018

Guizhou Normal University
2016

China West Normal University
2014

Sun Yat-sen University
2008-2013

Queensland University of Technology
2012

Tsinghua University
2012

Beihang University
2012

With the increasing maturity of NoSQL databases as well situation reading more than writing on large volumes data, many applications turn to and pick it data storage system. Migrating from SQL database providing efficient query become growing imperative. However, join operation is not supported in read separately for multiple times which brings poor performance unavoidable. This paper proposes a schema conversion model transforming can provide high with nesting relevant tables, graph...

10.1109/3pgcic.2014.137 article EN 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2014-11-01

Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. Smart handle and transfer assets values, offering strong incentives for malicious attacks. Intrusion attacks popular type In this article, we propose ContractGuard, the first intrusion detection system (IDS) to defend against such Like IDSs conventional programs, ContractGuard detects attempts as abnormal control flow. However, existing IDS techniques/tools inapplicable due...

10.1109/tsc.2019.2949561 article EN IEEE Transactions on Services Computing 2019-01-01

Cloud computing has been acknowledged as one of the prevaling models for providing IT capacities. The off-premises paradigm that comes with cloud incurred great concerns on security data, especially integrity and confidentiality service providers may have complete control infrastructure underpins services. This makes it difficult to share data via where should be confidential only authorized users allowed access data. work aims construct a system trusted sharing through untrusted providers,...

10.1109/cloudcom.2010.36 article EN 2010-11-01

Cloud computing is an emerging paradigm in which IT resources and capacities are provided as services over the Internet. Promising it is, this also brings forth new challenges for data security access control when users outsource sensitive sharing on cloud servers, likely outside of same trust domain owners. To maintain confidentiality of, user against untrusted existing work usually apply cryptographic methods by disclosing decryption keys only to authorized users. However, doing so, these...

10.1109/cloudcom.2010.44 article EN 2010-11-01

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Background:</i> In medicine, karyotyping chromosomes is important for medical diagnostics, drug development, and biomedical research. Unfortunately, chromosome usually done by skilled cytologists manually, which requires experience, domain expertise, considerable manual efforts. Therefore, automating the process a significant meaningful task....

10.1109/tcbb.2020.3003445 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2020-06-18

10.1109/icassp49660.2025.10889553 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Relational databases have been prevailing for the last two decades, with features of clear semantics and ease use SQL supported by underlying theory, relational algebra. provide good support structural data management. However, recent development in IT brings forward big data, featuring extreme large volume variety type structures, are difficult to handle such due strict constraints on structure relations, so on. On other hand, NoSQL databases, including HBase, MongoDB, Cassandra, etc.,...

10.1109/eidwt.2013.25 article EN 2013-09-01

Because of its efficiency, word embedding has been widely used in many natural language processing and text modeling tasks. It aims to represent each by a vector so such that the geometry between these vectors can capture semantic correlations words. An ambiguous often have diverse meanings different contexts, quality which is called polysemy. The bulk studies aimed generate only one single for word, whereas few made small number embeddings present word. However, it hard determine exact...

10.1016/j.knosys.2021.106827 article EN cc-by-nc-nd Knowledge-Based Systems 2021-02-21

This study evaluated a novel approach for diagnosis and classification of obstructive sleep apnea (OSA), called Obstructive Sleep Apnea Smart System (OSASS), using residual networks single-channel nasal pressure airflow signals.Data were collected from the center First Affiliated Hospital, Sun Yat-sen University, Integrative Department Guangdong Province Traditional Chinese Medical Hospital. We developed new model multi-resolution network (Mr-ResNet) based on to detect signals recorded by...

10.2147/nss.s297856 article EN cc-by-nc Nature and Science of Sleep 2021-03-01

Abstract Background Major depressive disorder (MDD) is a common mental illness, characterized by persistent depression, sadness, despair, etc., troubling people’s daily life and work seriously. Methods In this work, we present novel automatic MDD detection framework based on EEG signals. First of all, derive highly MDD-correlated features, calculating the ratio extracted features from signals at frequency bands between $$\beta$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">...

10.1186/s12911-022-01956-w article EN cc-by BMC Medical Informatics and Decision Making 2022-08-06

Abstract Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according the allocated users. This paper describes PERMIS role‐based authorization infrastructure along with its conceptual authorization, control, trust models. has novel concept of a credential validation service, which verifies user's credentials prior decision‐making enables distributed management credentials. also supports delegation authority;...

10.1002/cpe.1313 article EN Concurrency and Computation Practice and Experience 2008-06-06

The widespread recognition of the blockchain technology that decoupled from cryptocurrency has raised interest industry. As apparent drawbacks Proof Work (PoW) protocol hinder large deployment PoW for many distributed applications, consensus mechanism evolved quickly to satisfy business requirements. Since is core technology, it imperative ensure performs correctly. Authority, a novel Byzantine fault-tolerant algorithm, an appealing alternative algorithm its high throughput rate and...

10.1109/cyberc.2019.00046 article EN 2019-10-01

The financial property of Ethereum makes smart contract attacks frequently bring about tremendous economic loss. Method for effective detection vulnerabilities in contracts imperative. Existing efforts security analysis heavily rely on rigid rules defined by experts, which are labor-intensive and non-scalable. There is still a lack effort that considers combining expert-defined patterns with deep learning. This paper proposes EtherGIS, vulnerability framework utilizes graph neural networks...

10.1109/compsac54236.2022.00277 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022-06-01

The Unmanned Aerial Vehicles (UAVs) delivery service is being increasingly used in logistics. However, it challenging for a UAV to precisely identify the position parcel delivering if only aided by GPS, especially some complex environments with weak signals and high interference. For this issue, we present knowledge distillation empowered edge intelligence architecture, KeepEdge, achieve visual information-assisted positioning services. Specifically, integrate deep neural networks (DNN) into...

10.1109/tmc.2022.3157957 article EN cc-by IEEE Transactions on Mobile Computing 2022-03-09

Cloud computing has become a popular choice as an alternative to investing new IT systems. When making decisions on adopting cloud related solutions, security always been major concern. This article summarizes concerns in and proposes five service deployment models ease these concerns. The proposed provide different features address requirements scenarios can serve reference for deployment.

10.1109/hpcs.2010.5547137 article EN 2010-06-01

Sleep stage classification is of great importance in human health monitoring and disease diagnosing. Clinically, visual-inspected classifying sleep into different stages quite time consuming highly relies on the expertise specialists. Many automated models for have been proposed previous studies but their performances still exist a gap to real clinical application. In this work, we propose novel multi-view fusion network named MVF-SleepNet based multi-modal physiological signals...

10.1109/jbhi.2022.3208314 article EN IEEE Journal of Biomedical and Health Informatics 2022-09-21

The stone recognition and analysis in CT images are significant for automatic kidney diagnosis. Although certain contributions have been made, existing methods overlook the promoting effect of clinical knowledge on model performance interpretation. Thus, it is attractive to establish detecting evaluating stones originating from practical diagnostic process. Inspired by this, a novel clinical-inspired framework proposed involve process urologists better analysis. contains three main steps,...

10.1109/jbhi.2024.3411801 article EN IEEE Journal of Biomedical and Health Informatics 2024-06-11
Coming Soon ...