- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptographic Implementations and Security
- Luminescence Properties of Advanced Materials
- Topic Modeling
- Security and Verification in Computing
- Chaos-based Image/Signal Encryption
- Advanced Graph Neural Networks
- Recommender Systems and Techniques
- Coding theory and cryptography
- Multimodal Machine Learning Applications
- Solid State Laser Technologies
- High-pressure geophysics and materials
- Advanced Malware Detection Techniques
- Human Mobility and Location-Based Analysis
- Complex Network Analysis Techniques
- Advanced Condensed Matter Physics
- Domain Adaptation and Few-Shot Learning
- Crystal Structures and Properties
- Perovskite Materials and Applications
- Video Analysis and Summarization
- Enzyme Structure and Function
- Inorganic Fluorides and Related Compounds
- X-ray Diffraction in Crystallography
- User Authentication and Security Systems
- Advanced Fiber Laser Technologies
Institute of Information Engineering
2015-2024
Chinese Academy of Sciences
2010-2024
Shanghai Electric (China)
2024
Zhejiang University
2021
State Key Laboratory of Information Security
2020
Data Assurance and Communication Security
2016-2019
Zhejiang Sci-Tech University
2018
Fujian Institute of Research on the Structure of Matter
1991-2017
University of Chinese Academy of Sciences
2016
Ca' Foscari University of Venice
2014
The electronic band-structure and band-gap dependence on the $d$ character of ${A}^{2+}$ cation in $A$WO${}_{4}$ wolframite-type oxides is investigated for different compounds ($A$ $=$ Mg, Zn, Cd, Mn) by means optical-absorption spectroscopy first-principles density-functional calculations. High pressure used to tune their properties up 10 GPa changing bonding distances establishing structural correlations. effect unfilled levels found produce changes nature band gap as well its without...
The room-temperature Raman scattering was measured in ${\text{ZnWO}}_{4}$ up to 45 GPa. We report the pressure dependence of all Raman-active phonons low-pressure wolframite phase. As increases additional peaks appear at 30.6 GPa due onset a reversible structural phase transition distorted monoclinic $\ensuremath{\beta}$-fergusonite-type and high-pressure phases coexist from 36.5 In addition measurements we also ab initio total-energy lattice-dynamics calculations for two phases. These...
We study the effects of pressure on structural, vibrational, and magnetic behavior cuproscheelite. performed powder x-ray diffraction Raman spectroscopy experiments up to 27 GPa as well ab initio total-energy lattice-dynamics calculations. Experiments provide evidence that a structural phase transition takes place at 10 from low-pressure triclinic $(P\overline{1})$ monoclinic wolframite-type structure $(P2/c)$. Calculations confirmed this finding indicate transformation involves change in...
Abstract Copper tungstate (CuWO4) crystals grown by the top-seeded solution growth method were characterized X-ray diffraction, Raman scattering, and optical measurements. CuWO4 has a triclinic structure (P 1¯) with = 4.709 Å, b 5.845 c 4.884 α 88.3°, β 92.5°, γ 97.2°. It consists of corner-linked CuO6 WO6 octahedra, former having pseudo-tetragonally elongated geometry caused Cu2+ Jahn–Teller effect. Fifteen out eighteen modes are reported, discussed, compared those other tungstates. We also...
In this work, we have investigated the structural behavior of cuproscheelite up to 33.9 GPa by means high-pressure single-crystal X-ray diffraction (SXRD) and extended absorption fine structure (EXAFS). According EXAFS, beyond 9 a phase transition takes place. On basis SXRD, is from triclinic (P1̅) monoclinic (P2/c) isotypic wolframite. The implies abrupt changes CuO6 WO6 octahedra, but no coordination change. Further, report role played Jahn–Teller distortion octahedra on mechanism as well...
While Retrieval-Augmented Generation (RAG) systems enhance Large Language Models (LLMs) by incorporating external knowledge, they still face persistent challenges in retrieval inefficiency and the inability of LLMs to filter out irrelevant information. We present ParetoRAG, an unsupervised framework that optimizes RAG through sentence-level refinement guided Pareto principle. By decomposing paragraphs into sentences dynamically re-weighting core content while preserving contextual coherence,...
Since gait is hard to imitate and can be easily collected by smartphone inertial sensors, it applied user authentication. Traditional neural network based methods tend train feature extractor classifier together for each in These are difficult guarantee that the designed specific users suitable other users. The accuracy low when sample size of a legitimate small, time overhead heavy total amount large. Besides, there often strong constraints on sensor position, walking route, speed external...
Traditional recommendation methods aim to recom-mend personalized items by analyzing user's history interaction data. They ignore the fact that data follows a long-tail distribution, which means small number of popular account for most records. This phenomenon causes model recommend more items, resulting in severe popularity bias. In order pay attention and debias bias, we propose Bilateral-Branch Graph Neural Network(BiGNN). long- tail branch, construct separate sub graph eliminating with...
We have achieved a dual-frequency passively Q-switched Yb3+:GdAl3(BO3)4 solid-state laser at 1042.6 and 1045.0 nm, in which suppressing wavelength time-jittering building pulses both took advantage of the nonlinear loss black phosphorus prepared by liquid phase exfoliation. It shows good frequency stabilization effect (BP) saturable absorber. A 355 ns pulse with energy 0.889 µJ was achieved. This work validates capability BP to convert nonstable multi-wavelength emission into certain stable...
In the face of rising dangers to internal network due remote cooperation, VPN gateways are an important tool for organisational administrators, and appropriate execution gateway functions is a vital component in safeguarding network. The confronts security risks from underlying cryptographic algorithm library, current operating system, central processor as number attackers grows attack methods evolve. this paper, we propose pure hardware logic address threats CPU by independently...
Since the master key length becomes longer and in ciphers, an adversary often needs to preform multi-round side channel analysis (SCA) order recover by enough round keys. Traditional SCA is launched adaptive manner practice, which means that input of each calculated on-the-fly way based on all keys anterior rounds. However, compared classical single-round SCA, severely limited several practical scenarios, because rounds must be properly recovered before attack against next round. In this...
With the popularity of smart devices such as mobile phones and tablets, security problem widely used ARMv8-A processor has received more attention. Flush+Reload Flush+Flush cache attacks have become two most important threats due to their low noise high resolution. In order resist attacks, researchers proposed many defense methods. However, these existing methods various shortcomings. The runtime using hardware performance counters cannot detect fast enough, effectively or avoid a false...