- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Artificial Immune Systems Applications
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Advanced Multi-Objective Optimization Algorithms
- Security and Verification in Computing
- Complex Network Analysis Techniques
- Web Application Security Vulnerabilities
- Evolutionary Algorithms and Applications
- Human Mobility and Location-Based Analysis
- Age of Information Optimization
- vaccines and immunoinformatics approaches
- IoT Networks and Protocols
- Face and Expression Recognition
- Metaheuristic Optimization Algorithms Research
- Advanced Steganography and Watermarking Techniques
- Software Testing and Debugging Techniques
- Adversarial Robustness in Machine Learning
- Elevator Systems and Control
- Advanced MIMO Systems Optimization
- Wireless Communication Security Techniques
- Software-Defined Networks and 5G
- Advanced Decision-Making Techniques
- Cancer-related molecular mechanisms research
Sichuan University
2019-2025
Southwest Petroleum University
2017
Android malware and its variants are a major challenge for mobile platforms. However, there two main problems in the existing detection methods: <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">a</i> ) The method lacks evolution ability malware, which leads to low rate of model variants. xmlns:xlink="http://www.w3.org/1999/xlink">b</i> Traditional methods require centralized data training, however, aggregation training samples is limited due...
Intrusion detection systems are crucial in fighting against various network attacks. By monitoring the behavior real time, possible attack attempts can be detected and acted upon. However, with development of openness flexibility networks, artificial immunity-based anomaly methods lack continuous adaptability hence have poor performance. Thus, a novel framework for adaptive regulation is built this paper. First, heuristic dimensionality reduction algorithm based on unsupervised clustering...
Single-cell RNA sequencing (scRNA-seq) technologies have provided unprecedented insights into gene expression at the cellular level. Drop-seq is one of most widely used scRNA-seq protocols, and rapid development analytical tools for data has followed. These methods are typically evaluated using spike-in experiments or simulated datasets, as real-world differential often unknown. However, can be both costly time-consuming, making datasets a more practical alternative. Despite this, existing...
The multiobjective immune optimization algorithms (MOIAs) utilize the principle of clonal selection, iteratively evolving by replicating a small number superior solutions to optimize decision vectors. However, this method often leads lack diversity and is particularly ineffective when facing large‐scale problems. Moreover, an overemphasis on elite may result in large redundant offspring, reducing evolutionary efficiency. By delving into causes these issues, we find that key factor existing...
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to examination of detection techniques, which progressed from traditional signature-based methods machine- deep-learning-based models. These techniques demonstrated promising results on existing datasets; however, most studies overlooked impact adversarial particularly...
In this article, we focus on a wireless multiuser uplink network consisting of single antenna access point (AP) and multiple users, in which each user transmits time-sensitive confidential message to the AP time-division (TDMA) manner. When is scheduled transmit, other users will be regarded as potential eavesdroppers. practical Internet Things (IoT) applications, different may have requirements for throughput, timeliness information needs guaranteed. order effectively adapt these...
A wireless multi-user uplink heterogeneous network is investigated in this paper, which comprises an access point and two distinct user groups including throughput-oriented users age of information (AoI)-oriented users, prioritize achieving as high throughput possible, while AoI-oriented emphasize timely transmission information. It assumed that the transmitted needs to be kept strictly confidential unintended time-division multiple (TDMA) approach adopted transmit each user. For such a...
Supervisory Control and Data Acquisition (SCADA) systems are the core of industrial control an important part critical infrastructure. With deployment 5G networks around world, SCADA no longer a relatively secure physically isolated system like in past, but facing huge network virus threats. In order to solve problem that existing models ignore communication between nodes system, we propose transmission model SELBR based on immune knowledge by simulating function T cells system. By...
Unmanned aerial vehicles (UAVs) have experienced rapid development, permeating diverse domains. However, addressing security challenges in UAV networks remains daunting due to resource limitations and the high autonomy of terminals. The current research on network intrusion detection lacks an efficient process covering each terminal a lightweight collaborative response mechanism between UAVs ground stations, which affects performance detection. In this article, inspired by vaccine...
Host-based intrusion detection systems (HIDS) have been widely acknowledged as an effective approach for detecting and mitigating malicious activities. Among various data sources utilized in HIDS, system call traces gained significant popularity due to their inherent advantage of providing fine-grained information. Nevertheless, conventional feature extraction techniques relying on calls tend overlook the issue high-dimensional sparse space. In this paper, we conduct a theoretical analysis...