- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- Access Control and Trust
- Cryptography and Data Security
- Complex Network Analysis Techniques
- Cloud Data Security Solutions
- Recommender Systems and Techniques
- Caching and Content Delivery
- Muscle activation and electromyography studies
- Prosthetics and Rehabilitation Robotics
- Mobile Crowdsensing and Crowdsourcing
- Advanced Text Analysis Techniques
- Advanced Database Systems and Queries
- Opinion Dynamics and Social Influence
- Topic Modeling
- Advanced Software Engineering Methodologies
- Privacy-Preserving Technologies in Data
- Petri Nets in System Modeling
- Web Data Mining and Analysis
- Data Stream Mining Techniques
- Spam and Phishing Detection
- Geophysical Methods and Applications
- Advanced Sensor and Energy Harvesting Materials
- Digital Marketing and Social Media
- Blockchain Technology Applications and Security
Huazhong University of Science and Technology
2025
Next Generation Technology (United States)
2025
Macquarie University
2012-2023
Donghua University
2019-2023
University of Science and Technology Beijing
2021
University of Shanghai for Science and Technology
2017-2019
University of Wollongong
2012-2014
Western Sydney University
2003-2011
Chongqing University of Posts and Telecommunications
2011
Information Technology University
2005
Industrial Control Systems (ICSs) are the lifeline of a country Therefore, anomaly detection ICS traffic is an important endeavor. This paper proposes model based on deep residual Convolution Neural Network (CNN) to prevent gradient explosion or disappearance and guarantee accuracy. The developed methodology addresses two limitations: most traditional machine learning methods can only detect known network attacks algorithms require long time train. utilization transfer under modification...
Trust and reputation for web services emerges as an important research issue in service selection. Current trust models either do not integrate different sources of (subjective objective example), or focus on satisfying user's requirements about quality (QoS) attributes such performance, availability etc. In this paper, we propose a Bayesian network model that can overcome limitations by considering several factors when assessing services' trust: direct opinion from the truster, user rating...
LEACH protocol is one of the clustering routing protocols in wireless sensor networks. The advantage that each node has equal probability to be a cluster head, which makes energy dissipation relatively balanced. In protocol, time divided into many rounds, round, all nodes contend head according predefined criterion. This paper focuses on how set length prolong lifetime network and increase throughput, denoted as amount data packs sent sink node. functions throughput related round are...
Quality of service (QoS) is a major concern in the design and management composite service. In this paper, systematic approach proposed to calculate QoS for services with complex structures, taking into consideration probability conditions each execution path. Four types basic composition patterns are discussed: sequential, parallel, loop, conditional patterns. particular, solutions provided unstructured loop We also show how QoS-based selection can be conducted based on calculation....
The increasing processing power, storage and support of multiple network interfaces are promising the mobile devices to host services participate in service discovery network. A few efforts have been taken facilitate provisioning Web services. However they not addressed issue about how heavy-duty on with limited computing resources terms power memory. In this paper, we propose a framework which partitions workload complex distributed environment keeps devices. device is integration point...
In this article, we propose a comprehensive approach for Quality of Service (QoS) calculation in service composition. Differing from the existing work on QoS aggregations that represent as single values, discrete values with frequencies, or standard statistical distributions, proposed has capability to handle any type probability distribution. A set formulae and algorithms are developed calculate composite according four identified basic patterns sequential, parallel, conditional, loop. We...
In an airborne maritime radar, inverse synthetic aperture radar (ISAR) is used to image and classify non-cooperative targets. Traditional classification approaches rely on geometric features extracted from images of known targets form a training dataset that later observed recent years, deep learning-based techniques have been applied number problems with demonstrated improvements over conventional processing schemes. The application ISAR difficult due the availability small datasets...
Chronic respiratory diseases (CRDs) are the leading causes of death worldwide. Monitoring both inhalation and exhalation is crucial for lung function assessment patient outcomes. However, current sensors lack sufficient stability also ability to differentiate between exhalation, limiting clinical effectiveness. Inspired by bat-wing hair structures, we report an all-optical fiber sensilla bidirectional airflow detection. Optical Merkel cells microhairs integrated at tip through femtosecond...
We proposed a twist-compensation and self-calibration method for high accuracy DFBG-based shape sensing. The reduces the maximum reconstruction error of 2D 3D shapes from 1.20% 5.78% to 0.29% 2.87%, respectively.
The quality of service (QoS) is a major concern in the design and management Web composition. Existing methods for QoS calculation either do not take probability path execution into consideration when QoSs are provided different paths, or paths single integrated whole In this paper, comprehensive analysis approach proposed that calculates distribution by considering both conditions each Four types basic composition patterns discussed: sequential, parallel, loop conditional. particular,...
Breast cancer has become one of the most common malignant tumors in women worldwide, and it seriously threatens women's physical mental health. In recent years, with development Artificial Intelligence(AI) accumulation medical data, AI begun to be deeply integrated mammography, MRI, ultrasound, etc. assist physicians disease diagnosis. However, existing breast diagnosis model based on Computer Vision(CV) is greatly affected by image quality; other hand, Natural Language Processing(NLP)...
A composite service can be constructed with the arbitrary combination of sequential, parallel, loop, and conditional structures. In this paper, we propose a general solution to calculate QoS for services complex We also show QoS-based selection conducted based on proposed calculation method. An application example is given effectiveness
Change management is critical and challenging in the development maintenance of service-based applications information systems due to distributed dynamic nature services. This paper proposes an approach for facilitating change impact analysis a service oriented environment. research focuses on typical scenario that multiple services are supported by single business process. The analyzed based study dependency between processes. Types changes patterns identified foundation process model....
Influence diffusion has been widely studied in social networks for applications such as service promotion and marketing. There are two challenging issues here: (1) how we measure people's influence on others; (2) predict whom would be influenced by a particular person when people influenced. Existing works have not captured the temporal structural characteristics of Twitter. In this paper, firstly develop model to learn probabilities between users Twitter from their action history; secondly,...
Trust prediction provides valuable support for decision making, information dissemination, and product promotion in online social networks. As a complex concept the network community, trust relationships among people can be established virtually based on: 1) their interaction behaviors, e.g., ratings comments that they provided; 2) contextual associated with interactions, location culture; 3) relative temporal features of interactions time periods when hold. Most existing works only focus on...
In this paper, we propose a comprehensive trust management approach for Web services that covers the analysis/modelling of relationships and development layer in consistent manner. The specific characteristics are discussed. We introduce separated can hold computing components tasks. A architecture is proposed building up layer. deals with requirements, evaluation, consumption under unified umbrella it provides solid foundation upon which may evolve services.
In this paper, we propose an approach to model the probability density function (PDF) of QoS a web service (QoWS) based on non-parametric statistical method. Mathematical formulas are designed calculate distributions for compositions (QoCS). Experiment has been done show that proposed QoWS distribution modeling is much more accurate than exiting methods. An PDF estimation can be obtained QoCS if component QoWSs modeled by
When Influence Maximization (IM) is applied to social network maximise the coverage, it becomes an effective mechanism for marketing applications. In this paper, we focus on a specific influence maximization problem, i.e., selecting set of seeds twitter information propagation, which can be used reaching out in campaigns. The proposed approach taking into consideration ties, user interactions, and propagation Twitter. probability calculated according users' action history including tweet,...
Prosthetic knee is the most important component of lower limb prosthesis. Speed adaptive for prosthetic during swing flexion key method to realize physiological gait.This study aims discuss target gait, propose a speed control and research damping adjustment law intelligent hydraulic knee.According gait trials healthy people, defined. A new with fuzzy logical designed automatically. The function simulation evaluation system prosthesis provided. test in different velocities are researched.The...