- Metaheuristic Optimization Algorithms Research
- Advanced Multi-Objective Optimization Algorithms
- Evolutionary Algorithms and Applications
- Advanced Algorithms and Applications
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Recommender Systems and Techniques
- Artificial Immune Systems Applications
- Indoor and Outdoor Localization Technologies
- Distributed and Parallel Computing Systems
- Software Reliability and Analysis Research
- Optimal Experimental Design Methods
- Advanced Graph Neural Networks
- Underwater Vehicles and Communication Systems
- Software Engineering Research
- Water Quality Monitoring Technologies
- Blockchain Technology Applications and Security
- Software Testing and Debugging Techniques
- Advanced Malware Detection Techniques
- Topology Optimization in Engineering
- Advanced Control Systems Optimization
- Water resources management and optimization
- Sparse and Compressive Sensing Techniques
- Scheduling and Optimization Algorithms
Taiyuan University of Science and Technology
2015-2024
Nanjing University
2023-2024
Chinese Academy of Medical Sciences & Peking Union Medical College
2023
Xiyuan Hospital
2023
Shandong Institute of Automation
2019
Chinese Academy of Sciences
2019
Tongji University
2012-2015
System Simulation (United Kingdom)
2007
With the development of Internet, malicious code attacks have increased exponentially, with variants ranking as a key threat to Internet security. The ability detect is critical for protection against security breaches, data theft, and other dangers. Current methods recognizing demonstrated poor detection accuracy low speeds. This paper proposed novel method that used deep learning improve malware variants. In prior research, excellent performance in image recognition. To implement our...
Recommendation technology is an important part of the Internet Things (IoT) services, which can provide better service for users and help get information anytime, anywhere. However, traditional recommendation algorithms cannot meet user's fast accurate recommended requirements in IoT environment. In face a large-volume data, method finding neighborhood by comparing whole user will result low efficiency. addition, system ignores inherent connection between preference time. reality, interest...
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been widely concerned issue. Node identity authentication an important means to ensure security. Traditional IoT protocols rely on trusted third parties. However, many environments do not allow such conditions, are prone single point failure. Blockchain technology with decentralization features provides new solution for distributed system. In this paper, blockchain based multi-WSN scheme...
Summary Both the problem of class imbalance in datasets and parameter selection Support Vector Machine (SVM) are crucial to predict software defects. However, there is no one working solve these problems synchronously at present. To tackle this problem, a hybrid multi‐objective cuckoo search under‐sampled defect prediction model based on SVM (HMOCS‐US‐SVM) proposed above two problems. Firstly, with dynamical local (HMOCS) utilized select non‐defective sampling optimize parameters SVM. Then,...
Internet of Things (IoT) is a huge network and establishes ubiquitous connections between smart devices objects. The flourishing IoT leads to an unprecedented data explosion, traditional storing or processing techniques have the problem low efficiency, if are used maliciously, security loss may be further caused. Multicloud high-performance secure computing platform, which combines multiple cloud providers for processing, distributed multicloud platform ensures some extent. Based on task...
Cyber-physical social systems (CPSS) is an emerging complicated topic which a combination of cyberspace, physical space, and space. Many problems in CPSS can be mathematically modelled as optimization problems, some them are multi-objective (MOO) (MOPs). In general, the MOPs difficult to solve by traditional mathematical programming methods. High performance computing with much faster speed required address these issues. this paper, kind high approaches, evolutionary (EMO) algorithms, used...
While the industrial Internet of Things (IIoT) can support efficient control physical world through large amounts data, data security has been a challenge due to various interconnections and accesses. Blockchain technology privacy preservation in IIoT with its trusted reliable mechanism. Sharding help improve overall throughput scalability blockchain networks. However, effectiveness sharding is still challenging uneven distribution malicious nodes. By aiming performance networks reduce...
The fifth generation (5G) mobile communication technology brings people a higher perceived rate experience, the high-quality service of high-density user connection, and other commercial applications. As an important means data processing in 5G heterogeneous networks (HetNets), fusion is faced with large number malicious code attacks. Thus, it particularly to find efficient detection method. However, traditional research, due dataset imbalance, complexity deep learning network model, use...
Bat algorithm is a novel bio-inspired stochastic optimisation algorithm. However, due to the limited exploration and exploitation capabilities, performance not well when dealing with some multi-modal numerical problems. In this paper, optimal forage strategy designed guide search direction for each bat random disturbance also employed extend global pattern. To test performance, CEC2013 benchmark suit four other evolutionary algorithms are compare, simulation results show our modification effective.
Location information is generally considered to be indispensable in wireless sensor networks, but existing algorithms have notable limitations their positioning accuracy 3-dimensional (3D) spaces. To improve the of nodes a 3D scenario, this paper proposes new method called N2-3DDV-Hop (non-dominated sorting genetic algorithm II with distance-vector hop) that builds on 3D-DV-Hop by adding multi-objective model and NSGA-II. In paper, it analyzed traditional single-objective showed relationship...
A bat algorithm (BA) is a heuristic that operates by imitating the echolocation behavior of bats to perform global optimization. The BA widely used in various optimization problems because its excellent performance. In algorithm, search capability determined parameter loudness and frequency. However, experiments show each operator can only improve performance at certain time. this paper, novel with multiple strategies coupling (mixBA) proposed solve problem. To prove effectiveness we...
Abstract Recommendation system is a technology that can mine user's preference for items. Explainable recommendation to produce recommendations target users and give reasons at the same time reveal recommendations. The explainability of improve transparency probability choosing recommended merits about are obvious, but it not enough focus solely on in field explainable Therefore, essential construct an framework items while maintaining accuracy diversity. An based knowledge graph...