- Advanced Computational Techniques and Applications
- Image and Video Quality Assessment
- Recommender Systems and Techniques
- Cloud Data Security Solutions
- Security and Verification in Computing
- Video Analysis and Summarization
- Advanced Malware Detection Techniques
- Software Engineering Techniques and Practices
- Cloud Computing and Resource Management
- Educational Technology and Assessment
- Peer-to-Peer Network Technologies
- Caching and Content Delivery
- Software Engineering Research
- Internet Traffic Analysis and Secure E-voting
- Complex Network Analysis Techniques
- Cryptography and Data Security
- Service-Oriented Architecture and Web Services
- Privacy-Preserving Technologies in Data
- Software Testing and Debugging Techniques
- Real-Time Systems Scheduling
- Cryptographic Implementations and Security
- Engineering and Information Technology
- Wireless Networks and Protocols
- Safety Warnings and Signage
- Distributed and Parallel Computing Systems
Nanjing University
2023
Emissions Reduction Alberta
2023
Florida State University
2014-2021
Tsinghua–Berkeley Shenzhen Institute
2020
University Town of Shenzhen
2014-2018
Tsinghua University
2012-2018
Northeastern University
2016-2018
Shandong University
2011-2013
Zhejiang University
2011
State Key Laboratory of Industrial Control Technology
2011
With the proliferation of social media, which is largely fostered by boom Internet and mobile ecosystems, a huge amount multimedia data has been generated, forming big data. However, because unstructured multimodal in nature, with real-time Quality ExperieInternetnce requirements, computing not only created unprecedented opportunities but also imposed fundamental challenges storage, processing, analysis. Here, authors introduce principal concepts for computing, discuss what scientific...
Protecting kernel control data (e.g., function pointers and return addresses) has been a serious issue plaguing rootkit defenders. In particular, authors only need to compromise one piece of launch their attacks, while defenders protect thousands such values widely scattered across memory space. Worse, some this is volatile can be dynamically generated at run time. Existing solutions, however, offer either incomplete protection or excessive performance overhead. To overcome these...
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous solutions have mostly focused on postmortem detection of repackaged apps by measuring similarity among apps. In this paper, we propose DIVILAR, virtualization-based protection scheme enable self-defense Android against repackaging. Specifically, it re-encodes an in diversified virtual instruction set and uses specialized execute engine for these instructions run protected app. However, extra layer...
Online video sharing and social networking are cross-pollinating rapidly in today's Internet: network users more media contents among each other, while online sites leveraging connections to promote their videos. An intriguing development as it is, the operational challenge previous systems persists, em i.e., large server cost demanded for scaling of systems. Peer-to-peer could be a rescue, only if viewers' mutual resource contribution has been fully incentivized efficiently scheduled....
Dynamic analysis based on the full-system emulator QEMU is widely used for various purposes.However, it challenging to run firmware images of embedded devices in QEMU, especially process boot Linux kernel (we call this rehosting paper). That's because usually use different system-on-chips (SoCs) from multiple vendors and only a limited number SoCs are currently supported QEMU.
As a fundamental component of software documentation, code comments could help developers comprehend and maintain programs. Several datasets method header have been proposed in previous studies for machine learning-based comment generation. part comments, inline are also crucial understanding activities. However, unlike written standard format describing the whole code, often arbitrary formats by due to timelines pressures different aspects snippets described. Currently, there is no...
Cyber-Physical Networked Systems (CPNS) are systems that integrate a multitude of nodes perform computations for the sake interacting with, or controlling, physical process. The network plays an important role in CPNS supporting interactions among distributed enable collaborative work towards application goals. Some systems, e.g., target tracking require reconciling properties strongly influenced by opposing directions. For example, it is to maintain low energy consumption prolong lifetime...
Recently, data-driven prediction strategies have shown the potential of shepherding optimization for end viewer's Quality-of-Experience in practical streaming applications. The current prediction-based designs largely focused on optimizing last-mile, i.e., viewer-side, which 1) need real-time feedback from viewers to improve accuracy; and 2) quick responses guarantee effectiveness future. Thanks emerged crowdsourced livecast services, e.g., Twitch.tv, we first time exploit opportunity...
Virtual machine(VM) scheduling algorithms optimize the energy consumption without performance degradation, where cloud providers profited greatly. However, not any performs same. To evaluate power efficiency of such algorithms, various scale clusters have to be maintained, which is costly and difficult. In this paper, we present a emulation software CloudEval evalute migration VMs. Comparing previous simulation environment, addresses evaluation dynamic VMs in cloud, by simpler non-intrusive...
Glass published the first report on assessment of systems and software engineering scholars institutions two decades ago. The ongoing, annual survey publications in this field provides fund managers, young scholars, graduate students, etc. with useful information for different purposes. However, studies have been questioned by some critics because a few shortcomings evaluation method. It is actually very hard to reach widely recognized consensus such an institutions. This paper presents...
Mobile devices adopt probe requests to discover nearby Wi- Fi access points (APs) and set up fast Wi-Fi connections. Preferred Network Lists (PNLs) are used store the lists of connected APs in past. Previous studies have shown that such mechanism can lead serious privacy leakage, for example, attackers infer users' identity information movement histories. In this paper, we investigate issue propose a data-driven protection strategy. First, conduct extensive measurement based on 27 million...