- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Software Engineering Research
- Spam and Phishing Detection
- Software Testing and Debugging Techniques
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Security and Verification in Computing
- IoT and Edge/Fog Computing
- Adversarial Robustness in Machine Learning
- Digital and Cyber Forensics
- Cybercrime and Law Enforcement Studies
- Software System Performance and Reliability
- Anomaly Detection Techniques and Applications
- Caching and Content Delivery
- Software Reliability and Analysis Research
- Distributed and Parallel Computing Systems
- Privacy, Security, and Data Protection
- Digital Rights Management and Security
- Advanced Data Storage Technologies
- Topic Modeling
- Photonic and Optical Devices
- Mobile and Web Applications
- Rock Mechanics and Modeling
- Internet Traffic Analysis and Secure E-voting
Huazhong University of Science and Technology
2017-2025
Qingdao University
2023-2025
Zhejiang University
2025
Chinese Academy of Medical Sciences & Peking Union Medical College
2025
State Key Laboratory of Cardiovascular Disease
2025
National Clinical Research Center for Digestive Diseases
2025
Dalian University of Technology
2024-2025
Northwestern Polytechnical University
2024-2025
Dalian Municipal Central Hospital
2024-2025
Chinese Academy of Sciences
2023-2025
As a widely used IT service, more and companies shift their services to cloud datacenters. It is important for service providers (CSPs) provide resources with high elasticity cost-effectiveness then achieve good quality of (QoS) clients. However, meeting QoS cost-effective resource challenging problem CSPs because the workloads Virtual Machines (VMs) experience variation over time. highly necessary an accurate VMs workload prediction method provisioning efficiently manage resources. In this...
The size and energy consumption of datacenters have been increasing significantly over the past years. As a result, datacenters' electricity monetary cost, harmful gas emissions become severe problem. Renewable supply is widely seen as promising solution. However, instability renewable brings about new challenge since insufficient may lead to job running interruptions or failures. Though previous works attempt more accurately predict amount produced energy, due its influencing factors (e.g.,...
Repackaged Android applications (app clones) have been found in many third-party markets, which not only compromise the copyright of original authors, but also pose threats to security and privacy mobile users. Both fine-grained coarse-grained approaches proposed detect app clones. However, techniques employing complicated clone detection algorithms are difficult scale hundreds thousands apps, while based on simple features scalable less accurate. This paper proposes WuKong, a two-phase...
Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., leaks, buffer overflows, and null dereference. However, modern software systems have a wide variety of vulnerabilities. These vulnerabilities are extremely complicated with sophisticated programming logic, these bugs often caused by different bad practices, challenging existing solutions. It is hard labor-intensive to develop precise efficient static analysis solutions for types vulnerabilities,...
We present LibRadar, a tool that is able to detect third-party libraries used in an Android app accurately and instantly. As are widely apps, program analysis on apps typically needs or remove first order function correctly provide accurate results. However, most previous studies employ whitelist of package names known libraries, which incomplete unable deal with obfuscation. In contrast, LibRadar detects based stable API features obfuscation resilient cases. After analyzing one million free...
Large Language Models (LLMs) have significantly impacted numerous domains, including Software Engineering (SE). Many recent publications explored LLMs applied to various SE tasks. Nevertheless, a comprehensive understanding of the application, effects, and possible limitations on is still in its early stages. To bridge this gap, we conducted systematic literature review (SLR) LLM4SE, with particular focus how can be exploited optimize processes outcomes. We selected analyzed 395 research...
Large Language Models (LLMs) have significantly impacted numerous domains, including Software Engineering (SE). Many recent publications explored LLMs applied to various SE tasks. Nevertheless, a comprehensive understanding of the application, effects, and possible limitations on is still in its early stages. To bridge this gap, we conducted systematic literature review LLM4SE, with particular focus how can be exploited optimize processes outcomes. We collect analyze 229 research papers from...
Our study aimed to distinguish the ability of anthropometric indices assess risk metabolic syndrome (MetS).Prospective cohort study.Shenyang, China.A total 379 residents aged between 40 and 65 were enrolled. 253 them free MetS had been followed up for 4.5 years.At baseline, all participants underwent a thorough medical examination. A variety parameters measured calculated, including waist circumference (WC), body mass index (BMI), shape (ABSI), abdominal volume (AVI), adiposity index,...
The Android Application Programming Interface provides the necessary building blocks for app developers to harness functionalities of devices, including interacting with services and accessing hardware. This API thus evolves rapidly meet new requirements security, performance advanced features, creating a race update apps. Unfortunately, given extent lack automated alerts on important changes, apps are suffered from API-related compatibility issues. These issues can manifest themselves as...
China is one of the largest Android markets in world. As Chinese users cannot access Google Play to buy and install apps, a number independent app stores have emerged compete market. Some are pre-installed vendor-specific (e.g., Huawei, Xiaomi OPPO), whereas others maintained by large tech companies Baidu, Qihoo 360 Tencent). The nature these content available through them vary greatly, including their trustworthiness security guarantees.
Deep learning (DL) becomes increasingly pervasive, being used in a wide range of software applications. These applications, named as DL based (in short software), integrate models trained using large data corpus with programs written on frameworks such TensorFlow and Keras. A program encodes the network structure desirable model process by which is training data. To help developers meet new challenges posed DL, enormous research efforts engineering have been devoted. Existing studies focus...
Blockchain interoperability, which allows state transitions across different blockchain networks, is critical functionality to facilitate major adoption. Existing interoperability protocols mostly focus on atomic token exchanges between blockchains. However, as blockchains have been upgraded from passive distributed ledgers into programmable machines (thanks smart contracts), the scope of goes beyond just exchanges. In this paper, we present HyperService, first platform that delivers and...
The provenance (tracing) system of agricultural products is important for ensuring food safety. However, the stakeholders (growers, farmers, sellers etc.) are numerous and physically dispersed, making it difficult to manage data information with a centralized approach. As result, production procedure remains non-transparent trust hard build. In this paper, we propose an based on techniques blockchain, which featured by decentralization, collective maintenance, consensus reliable data, in...
Code embedding, as an emerging paradigm for source code analysis, has attracted much attention over the past few years. It aims to represent semantics through distributed vector representations, which can be used support a variety of program analysis tasks (e.g., summarization and semantic labeling). However, existing embedding approaches are intraprocedural, alias-unaware ignoring asymmetric transitivity directed graphs abstracted from code, thus they still ineffective in preserving...
<inline-formula><tex-math notation="LaTeX">${\mathsf Web3.0}$</tex-math></inline-formula> , often cited to drastically shape our lives, is ubiquitous. However, few literatures have discussed the crucial differentiators that separate from era we are currently living in. Via a thorough analysis of recent blockchain infrastructure evolution, capture key invariant featuring based on which provide first academic definition for . Our not only way understanding yet, it captures fundamental and...
Machine learning and its promising branch deep have shown success in a wide range of application domains. Recently, much effort has been expended on applying techniques (e.g., graph neural networks) to static vulnerability detection as an alternative conventional bug methods. To obtain the structural information code, current approaches typically abstract program form graphs data-flow graphs, syntax trees), then train underlying classification model based (sub)graphs safe vulnerable code...
Serverless computing is a popular cloud paradigm that frees developers from server management. Function-as-a-Service (FaaS) the most implementation of serverless computing, representing applications as event-driven and stateless functions. However, existing studies report functions FaaS severely suffer cold-start latency. In this article, we propose an approach, namely, FaaSLight , to accelerating cold start for through application-level optimization. We first conduct measurement study...
Ovarian cancer (OC) is one of the major diseases threatening women's health and life. Estimating burden trends risk factors OC can help develop effective management prevention measures. However, there a lack comprehensive analysis concerning in China. In this study, we aimed to assess predict China from 1990 2030, make comparison with global level.We extracted prevalence, incidence, mortality, disability-adjusted life years (DALYs), lost (YLLs), lived disability (YLDs) data Global Burden...