- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Smart Agriculture and AI
- Physical Unclonable Functions (PUFs) and Hardware Security
- DNA and Biological Computing
- Animal Behavior and Welfare Studies
- Date Palm Research Studies
- Advanced Chemical Sensor Technologies
- Modular Robots and Swarm Intelligence
- Air Quality Monitoring and Forecasting
- Primate Behavior and Ecology
- IoT Networks and Protocols
- Wildlife Ecology and Conservation
- Vehicle emissions and performance
- Neural Networks and Applications
- Spectroscopy and Chemometric Analyses
- Advanced biosensing and bioanalysis techniques
- Advanced Malware Detection Techniques
- Insect and Arachnid Ecology and Behavior
- Error Correcting Code Techniques
- Interconnection Networks and Systems
- Air Quality and Health Impacts
Guilin University of Electronic Technology
2024-2025
Jilin Agricultural University
2023-2024
Hengyang Normal University
2020-2023
The advancement of the Internet Things (IoT) has promoted rapid development low-power and multifunctional sensors. However, it is seriously significant to ensure security data transmission these nodes. Meanwhile, sensor nodes have characteristics converting analog signals into digital for operation processing in wireless networks (WSNs). Given particularity Addition or AND, Rotation, XOR (ARX) operations, its round function can only be based on Feistel structure generalized structure,...
The purpose of this paper is to effectively and accurately identify weed species in crop fields complex environments. There are many kinds weeds the detection area, which densely distributed.The proposes use local variance pre-processing method for background segmentation data enhancement, removes redundant information from data, prevents experiment overfitting, can improve accuracy rate significantly. Then, based on optimization improvement DenseNet network, Efficient Channel Attention...
Lightweight block ciphers are proposed for Internet of Things (IoT) edge devices to ensure secure data transmission with limited resources. However, past research has been designed on ideal channel models, disregarding the possibility ciphertext errors caused by interference during actual transmission. This omission poses difficulties in ensuring reliability ciphertext, especially Medical (IoMT) where resources and accuracy requirements high. Designing a highly reliable lightweight cipher...
Abstract Lightweight block ciphers can effectively ensure communication security between devices in the Internet of Things (IoT). Differential cryptanalysis is a classical method for evaluating their security. Recently, application deep learning has increased significantly. To this end, we construct differential neural distinguishers with higher accuracy and stronger generalization ability classic cryptographic algorithms PRESENT SKINNY. First, combine convolutional networks (CNN) multilayer...
This paper uses an enhanced sparrow search algorithm (SSA) to optimise the support vector machine (SVM) by considering emission of air pollution sources as independent variable. Consequently, it establishes a PM2.5 concentration prediction model improve accuracy fine particulate matter concentration. First, principal component analysis is applied extract key variables affecting quality from high-dimensional data train while removing unnecessary redundant variables. Adaptive dynamic weight...
As the sika deer breeding industry flourishes on a large scale, accurately assessing health of these animals is paramount importance. Implementing posture recognition through target detection serves as vital method for monitoring well-being deer. This approach allows more nuanced understanding their physical condition, ensuring can maintain high standards animal welfare and productivity. In order to achieve remote without interfering with natural behavior animals, enhance welfare, this paper...
In agriculture and forestry, pest detection is critical for increasing crop yields reducing economic losses. However, traditional deep learning models face challenges in resource-constrained environments, such as insufficient accuracy, slow inference speed, large model sizes, which hinder their practical application. To address these issues, this study proposes an improved YOLOv7-tiny designed to deliver efficient, accurate, lightweight solutions. The main improvements are follows: 1....
The number of industrial Internet Things (IoT) users is increasing rapidly.Lightweight block ciphers have started to be used protect the privacy users.Hardware-oriented security design should fully consider use fewer hardware devices when function realized.Thus, this paper designs a lightweight cipher IIoTBC for IoT security.IIoTBC system structure variable and flexibly adapts nodes with different requirements.This proposes 4×4 S-box that achieves good balance between area overhead...
ABSTRACT Shadow is a lightweight AND‐RX block cipher adapted for resource‐constrained devices. In this paper, software and hardware optimizations are proposed respectively to enhance its implementation performance. For optimization, paper first proposes data pre‐processing scheme based on the structural characteristics of round function. It further improves optimization effect barrel shifter instruction while simplifying process Note that strategy also applicable other ciphers. Secondly, new...
Abstract With the rapid growth of Internet Things (IoT), designing lightweight block ciphers has become essential for securing resource-constrained devices. This necessitates a balance among low-cost implementation, diffusion, and security. To address this challenge, we propose novel cipher named LIBC, which 64-bit size supporting 128-bit keys. In nonlinear layer, develop four-round structure to design optimal 4-bit S-boxes, generating 8,832 S-boxes that provide excellent security compact...
The ARX-based lightweight block cipher is widely used in resource-constrained IoT devices due to fast and simple operation of software hardware platforms.However, there are three weaknesses ciphers.Firstly, only half the data can be changed one round.Secondly, traditional ciphers static structures, which provide limited security.Thirdly, it has poor diffusion when initial plaintext key all 0 or 1.This paper proposes a new dynamic overcome these weaknesses, called DABC.DABC change round,...