- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Robotic Path Planning Algorithms
- Industrial Automation and Control Systems
- Robotics and Sensor-Based Localization
- Coding theory and cryptography
- Neural Networks and Applications
- Semantic Web and Ontologies
- Web Data Mining and Analysis
- Advanced Graph Neural Networks
- Advanced Authentication Protocols Security
- Digital Transformation in Industry
- Traffic Prediction and Management Techniques
- Fault Detection and Control Systems
- Software System Performance and Reliability
- Data Quality and Management
- IPv6, Mobility, Handover, Networks, Security
- Traffic control and management
- RFID technology advancements
- Advanced Image and Video Retrieval Techniques
- Advanced Vision and Imaging
- Recommender Systems and Techniques
- Advanced Decision-Making Techniques
Guangzhou University
2020-2024
Nanjing University of Aeronautics and Astronautics
2024
China Communications Construction Company (China)
2024
Dalian Neusoft University of Information
2020-2022
Huazhong Agricultural University
2022
Jiangxi University of Traditional Chinese Medicine
2021
Peng Cheng Laboratory
2020
Xilinx (United States)
2019
Guangxi University of Science and Technology
2011
Hanyang University
2009
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, lack security practice raises risk privacy-sensitive user data leakage. Securing transmission among IoT devices is therefore a critical capability environments such as Intelligent Connected Vehicles, Smart Home, City and so forth. However, cryptographic communication scheme challenged by limited resource low-cost devices, even negligible extra CPU usage battery-powered sensors would result in...
Domain Name System (DNS) plays an infrastructure role in providing the directory service for mapping domains to IPs on Internet. Considering foundation and openness of DNS, it is not surprising that adversaries register massive enable multiple malicious activities, such as spam, command control (C&C), malware distribution, click fraud, etc. Therefore, detecting a significant topic security research. Although substantial quantity research has been conducted, previous work failed fuse...
Cyber-attacks have become more frequent, targeted, and complex as the exponential growth in computer networks development of Internet Things (IoT). Network intrusion detection system (NIDS) is an important essential tool to protect network environments. However, low performance a NIDS against small malicious samples has seriously threatened security networks, thus directly leading loss personal property national interests. Given this, we propose auto encoder-based hybrid model, abbreviated...
For 56G, as well 112G, PAM4 systems, it is no longer feasible to rely on SerDes equalization alone achieve the desired BER performance. FEC (forward error correction) becomes mandatory enhance post-FEC target (e.g., 1E-15). The key takeaway from this paper that optimized settings, particularly TX i.e., FIR and swing, could be rather different with without FEC. It shown lower pre-FEC does not necessarily imply BER.
Aiming at the problems of information and exchange data between different devices based on manufacturers' communication protocol in current marine engine room equipment system, a design gateway model OPC is proposed. The transformation bottom collected by protocols into unified data, transferred to management layer are accomplished; uncoordinated among software systems which use nonstandard interface cabin experimental; conversion underlying from Modbus UDP implemented. experimental results...
Most recent applications of the radio frequency identification (RFID) system require a stable and efficient performance. In particular, baseband decoder in RFID receiver plays significant role determines most practice, existence unpredictable distortion variation return link leads to an important challenge design. this paper, structure which employs matched filter is proposed reduce signal AWGN environment. The maximum-likelihood (ML) symbol synchronization algorithm also presented eliminate...
This paper delves into the realm of cryptographic analysis by employing mixed-integer linear programming (MILP), a powerful tool for automated cryptanalysis. Building on this foundation, we apply division property method alongside MILP to conduct comprehensive cryptanalysis IIoTBC (industrial Internet Things block cipher) algorithm, critical cipher in security landscape industrial IoT systems. Our investigation System A has led identifying 14-round integral distinguisher, further extended...
Air-ground collaborative robots have shown great potential in the field of fire and rescue, which can quickly respond to rescue needs improve efficiency task execution. Mapping navigation, as key foundation for air-ground achieve efficient execution, attracted a deal attention. This growing interest robot mapping navigation is conducive improving intelligence but there has been no comprehensive investigation this highlight their strengths. In paper, we present systematic review...
Steering rubber buffer seat of loader is one important methods to enhance the operating comfort machine. This article detailed identified design variables, constraint functions and objective function seat's optimal model. It combined with project experience based on analysis bearing features in right, established correct mathematical model theory. Then, ANSYS software's optimized module "Design Opt", completed set all calculated parameters by operations alternate interface, thus created a...
Image processing is widely used in intelligent robots, significantly improving the surveillance capabilities of smart buildings, industrial parks, and border ports. However, relying on camera installed a single robot not enough since it only provides narrow field view as well limited performance. Specially, target person such suspect may appear anywhere tracking large-scale scene requires cooperation between fixed cameras patrol robots. This induces significant surge demand for data,...
At present, most UAV devices with short endurance and heavy load are only suitable for low medium speed flight. The problem is that the path planning efficiency low. This paper aims to improve effect of planning. A method based on binocular camera IMU fusion mileage calculation designed verified. simulation results show this can achieve in a time unfamiliar environment. With high advancement, stability robustness, it be widely used operating equipment..
With the increasing types and functions of smart home devices, due to lack experience users, they may cause unexpected errors risks when configuring a large number device linkage rules.In response above problems, in this paper, we propose an efficient conflict detection method avoid situations.First, reduce complexity subsequent rule detection, divide each into five categories according its characteristics. At same time, configure priority, user rights, execution area for rule. Second,...
Aiming at the problems of existing in large-scale organizations, such as disunity message sending and receiving management, complexity low efficiency interconnection between departments healthcare systems, this paper proposes design intelligent collaboration system integrating multiple interaction modes questionnaire publishing. It realizes push mechanism which integrates SMS, email instant communication, feedback statistics based on questionnaire, performance stability are tested by...
Addressing the issue of excessive manpower and time consumption when annotating vast amounts log data in process computing trust values based on modeling, as well problem reduced accuracy computed due to lack attention contextual features, this paper proposes a dual-layer Recurrent Neural Network (LSTM) mechanism. This model is trained identify feature activities each user network assess whether behavior normal or anomalous. serves foundation for calculating ensuring value computation. When...
In order to study the food safety problems contained in inspection information, this paper crawls data recent years from website of national quality supervision and center, extracts knowledge various data, stores them graph database construct data. On basis graph, a visual analysis system based on web is built. Through interactive interface, possible can be visually displayed analyzed according requirement users. The play guiding role effectively sorting out discovering related knowledge.
Multimodal discourse analysis of Chinese medicine documentary based on the Elan and face feature extraction algorithm is conducted in this paper. The so-called intelligent video surveillance system digital networked surveillance. But different from general surveillance, it a higher-end application. With idea, analytic model combined for core systematic analysis. Therefore, research work proposes theoretical framework inter-symbolic complementarity to explain complementary relationship...
DNS open resolvers represent key components of Internet networks, providing recursive resolution services for all users across the Internet. Monitoring operational profiles is crucial in analyzing cyber security threats. However, due to lack authentication or authorization between and servers, malicious attackers can exploit these vulnerabilities potentially. In this paper, we design an efficient long-term scanning scheme entire IPv4 address space, approximately 1.8 million on network come...