- Business Process Modeling and Analysis
- Petri Nets in System Modeling
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Fault Detection and Control Systems
- Access Control and Trust
- Software Testing and Debugging Techniques
- Complex Network Analysis Techniques
- Cognitive Computing and Networks
- Vehicular Ad Hoc Networks (VANETs)
- Data Stream Mining Techniques
- Machine Learning and ELM
- Financial Distress and Bankruptcy Prediction
- Software Engineering Techniques and Practices
- Smart Agriculture and AI
- Advanced Queuing Theory Analysis
- Network Security and Intrusion Detection
- Digital Imaging for Blood Diseases
- Personal Information Management and User Behavior
- Traffic control and management
- Formal Methods in Verification
- Opinion Dynamics and Social Influence
- Software Reliability and Analysis Research
- Traffic Prediction and Management Techniques
- Radar Systems and Signal Processing
Shaanxi Normal University
2015-2025
Anhui University of Science and Technology
2023-2024
China Tourism Academy
2022-2023
Ministry of Education of the People's Republic of China
2018-2023
Fiberhome Technology Group (China)
2022-2023
East China Normal University
2020
Shaanxi Science and Technology Department
2018
Tongji University
2013-2016
Shandong University of Science and Technology
2009
University of Hong Kong
1994-1995
E-commerce and online shopping with a third-party payment platform have rapidly developed recently, encountered many fault tolerance security problems concerned by users. The causes of these include malicious behavior imperfect business processes. latter lead to the emergence vulnerabilities loss user funds which become more serious years. We focus on process e-commerce, propose formal model for constructing an e-commerce called Business Process Net. It integrates both data control flows...
Recently, online shopping integrating third-party payment platforms (TPPs) introduces new security challenges due to complex interactions between Application Programming Interfaces (APIs) of Merchants and TPPs. Malicious clients may exploit vulnerabilities by calling APIs in an arbitrary order or playing various roles. To deal with the issue early stages system development, this paper presents a formal method for modeling verification business processes malicious behavior patterns considered...
Detection and prevention of fraudulent transactions in e-commerce platforms have always been the focus transaction security systems. However, due to concealment e-commerce, it is not easy capture attackers solely based on historic order information. Many works try develop technologies prevent frauds, which considered dynamic behaviors users from multiple perspectives. This leads an inefficient detection behaviors. To this end, article proposes a novel fraud method that integrates machine...
E-commerce business process nets (EBPNs) are a novel formal model for describing and validating e-commerce systems including interactive parties such as shopper, merchant, third-party payment platform. Data errors nondeterminacy of the data states during trading can be depicted with help EBPNs. However, problem about how to analyze EBPNs remains largely open. To their data-liveness, data-boundedness, reachability, this paper presents two analysis methods. For EBPNs, reachability is proposed...
Cross-project defect prediction (CPDP) refers to identifying defect-prone software modules in one project (target) using historical data collected from other projects (source), which can help developers find bugs and prioritize their testing efforts. Recently, CPDP has attracted great research interest. However, the source target usually exist redundancy nonlinearity characteristics. Besides, most methods do not exploit label information uncover underlying knowledge for propagation. These...
Conceptual modeling, which includes both control-flow and data-flow has posed great challenges for conventional business process management systems. To support systematic modeling analysis, in this paper, we propose a novel effective Petri net-based approach. We first introduce new type of net, called WFIO-net, the firing rule is formally defined by extending classical net with read write semantics, to model information. Then, discuss about three possible errors over i.e., missing, redundant...
Many Next-Generation consumer electronic devices would be distributed hybrid systems, such as UAVs (Unmanned Aerial Vehicles) and smart cars. The safety risk control are the key issues for sustainability of systems. modeling systems is difficult to abstracted by traditional Petri Nets. This also makes reachable marking graph unable applied nets paper proposes a novel Net model analyze We name it Semi-continuous Colored (SCPN) that inherits excellent capabilities analysis methods Nets, can...
Malaria is an important and worldwide fatal disease that has been widely reported by the World Health Organization (WHO), it about 219 million cases worldwide, with 435,000 of those mortal. The common malaria diagnosis approach heavily reliant on highly trained experts, who use a microscope to examine samples. Therefore, there need create automated solution for malaria. One main objectives this work design tool could be used diagnose from image blood sample. In paper, we firstly developed...
With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects life. Abnormal transaction detection is important in since abnormal transactions can result large losses. Additionally, integrating data flow control research process modeling analysis it plays an role correctness security business processes. This paper proposes a novel method detecting via integration model flows. Our model, called Extended Data Petri net (DPNE), integrates...
The e-commerce business process net (EBPN) is a novel formal model for describing an system and its interactive parts, such as shoppers, merchants, the third-party payment platforms. Vulnerability analysis has great impact on trustworthiness of EBPN, which issue stemming from data inconsistency problems. Data problems affect consistency EBPN transaction analysis. underlying causes inconsistent are closely related to concurrent operations, control flow flow. However, most existing detection...
Energy is at the center of human society and drives technologies overall well-being. Today, artificial intelligence (AI) are widely used for system modeling, prediction, control, optimization in energy sector. The internet things (IoT) core third wave information industry revolution AI. In sector, tens billions IoT appliances linked to Internet, these generate massive amounts data every day. Extracting useful from amount will be a very meaningful thing. Complex event processing (CEP)...
Gait analysis plays an important role in the fields of healthcare and sports sciences. Conventional gait relies on costly equipment such as optical motion capture cameras wearable sensors, some which require trained assessors for data collection processing. With recent developments computer vision deep neural networks, using monocular RGB 3D human pose estimation has shown tremendous promise a cost-effective efficient solution clinical analysis. In this paper, markerless technique is...
Abstract Petri net models are frequently complex and difficult to understand modify. Slicing technology is very useful in analyzing programs, has been widely used specification level for model reduction. So it necessary explore slicing methods nets. This paper proposes a dynamic technique nets based on the structural dependency graph (SDG). Firstly, SDG constructed from criterion by backtracking algorithm. Secondly, given marking, slice can be acquired. As case study, proposed method applied...
In online social networks, information diffusion presents a complicated dynamic process that accompanies users' lives, in which the link between multi-information symbiosis and conflict is frequently overlooked. We investigate two aspects influence of by examining phenomena dissemination individuals general environment networks. To characterize process, an effective model positive negative based on evolutionary game theory developed. reduce impact network ecosystem as much possible while...
Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most existing researches focused behavior patterns group users are used personal recommendation, website structure optimization or web prediction. In order ensure validity user and security e-commerce, we construct personalized model ARM (Association Rule Mining) from Web usage log. We compare real-time behaviors...