Libo Chen

ORCID: 0000-0003-3236-4805
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Advanced Malware Detection Techniques
  • Quantum Mechanics and Applications
  • Quantum optics and atomic interactions
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Quantum Computing Algorithms and Architecture
  • Spam and Phishing Detection
  • Digital and Cyber Forensics
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Cold Atom Physics and Bose-Einstein Condensates
  • Semantic Web and Ontologies
  • Natural Language Processing Techniques
  • Advanced Text Analysis Techniques
  • Anomaly Detection Techniques and Applications
  • Web Application Security Vulnerabilities
  • Lightning and Electromagnetic Phenomena
  • Time Series Analysis and Forecasting
  • Wikis in Education and Collaboration
  • Generative Adversarial Networks and Image Synthesis
  • Power Transformer Diagnostics and Insulation
  • Laser-induced spectroscopy and plasma
  • Data Management and Algorithms
  • Random lasers and scattering media

Shanghai Jiao Tong University
2021-2025

Shandong University of Science and Technology
2023

China Astronaut Research and Training Center
2023

Changsha University of Science and Technology
2022

Shandong University
2022

Anshan Hospital
2016-2019

Guangdong Medical College
2016-2019

Qingdao University of Technology
2013-2019

Qingdao University of Science and Technology
2019

Wuhan University of Science and Technology
2018

We propose several robust schemes to prepare entangled states among spatially separated $\ensuremath{\Lambda}$-type atoms via stimulated Raman adiabatic passage and fractional techniques. The atomic spontaneous radiation, the cavity decay, fiber loss are efficiently suppressed by engineering controlling appropriately atom-field couplings. can be extended generate $n$-cavity mode $W$ state.

10.1103/physreva.76.062304 article EN Physical Review A 2007-12-11

The pervasive deployment of the Internet Things (IoT) has significantly facilitated manufacturing and living. diversity continual updates IoT systems make their security a crucial challenge, among which detection malicious network traffic turns out to be most common yet destructive threat. Despite efforts on feature engineering classification backend designing, established intrusion sometimes lack robustness are inflexible against shift distribution. To deal with these disadvantages, we...

10.1109/tfuzz.2022.3165390 article EN IEEE Transactions on Fuzzy Systems 2022-04-06

Abstract In recent years, new malicious email attacks have emerged. We summarize two major challenges in the current field of detection using machine learning algorithms. (1) Current works on use different datasets and lack a unified comprehensive open source dataset standard for evaluating performance. addition, outdated data makes it difficult to detect types attacks. (2) There are limitations feature selection extraction. Relying only static features or body textual cannot satisfy both...

10.1186/s42400-024-00309-6 article EN cc-by Cybersecurity 2025-02-24

We propose a scheme to generate singlet state with three atoms in cavity QED via Raman transitions. The present does not involve cavity-photon population during the operation and thus is insensitive decay. method can be extended maximally entangled of three-level atoms.

10.1103/physreva.76.014308 article EN Physical Review A 2007-07-27

Identifying anonymity services from network traffic is a crucial task for management and security. Currently, some works based on deep learning have achieved excellent performance analysis, especially those flow sequence (FS), which utilizes information features of the flow. However, these models still face serious challenge because lacking mechanism to take into account relationships between flows, resulting in mistakenly recognizing irrelevant flows FS as clues identifying traffic. In this...

10.1109/iwqos54832.2022.9812882 article EN 2022-06-10

Real-Time Operating System (RTOS) has become the main category of embedded systems. It is widely used to support tasks requiring real-time response such as printers and switches. The security RTOS been long overlooked it was running in special environments isolated from attackers. However, with rapid development IoT devices, tremendous devices are connected public network. Due lack mechanisms, these extremely vulnerable a wide spectrum attacks. Even worse, monolithic design combines various...

10.1145/3548606.3559367 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

Container technology has become a popular development that can conveniently accelerate building, running, and sharing applications. However, container image packaging collection of software usually lurks various defects threatening consumer safety, such as embedded malware, vulnerability, privacy leakage, etc. Moreover, developers users share images through centralized, public, massive repository (e.g., Docker Hub), which magnify the impact these security in fast-spreading way....

10.1016/j.jisa.2022.103351 article EN cc-by-nc-nd Journal of Information Security and Applications 2022-10-28

At present, there is less research on the detection of broken access control vulnerabilities in IoT systems, mostly using state machines to analyze abnormal transitions, and no systematic tools have been developed. The main challenges include inaccessibility communication messages, a lack effective for vulnerabilities, excessive manual involvement. Moreover, due existence encryption, signatures, other fields, it challenging directly port web-based IoT. In response these challenges, we...

10.1109/jiot.2024.3400858 article EN IEEE Internet of Things Journal 2024-05-14

Although text-based captcha, which is used to differentiate between human users and bots, has faced many attack methods, it remains a widely security mechanism employed by some websites. Some deep learning-based text captcha solvers have shown excellent results, but the labor-intensive time-consuming labeling process severely limits their viability. Previous works attempted create easy-to-use using limited collection of labeled data. However, they are hampered inefficient preprocessing...

10.1109/sp46215.2023.10179379 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

SPF and DMARC are two important email authen-tication protocols that can effectively reduce the risk of spoofing attacks improve security. In this paper, we provide an empirical measurement study how well deployed managed. We perform active on Alexa Top Million Domains their subdomains. For first time, present a subdomain configuration. adoption is growing, but still more than 70% domains do not have proper configurations. More 90% all lack Through experiments, show in absence effective...

10.1109/srds60354.2023.00023 article EN 2023-09-25

This paper proposes schemes for generating multiple-photon and multiple-atom cluster states, respectively. The are based on the cavity input-output process atomic or photonic states measurement, successful probabilities approach unity in ideal case. numerical simulations show that produced multiple-particle have high fidelity even if Lamb–Dicke condition is not satisfied. Some practical imperfections, such as spontaneous emission output coupling inefficiency, only decrease success...

10.1088/1674-1056/17/1/012 article EN Chinese Physics B 2008-01-01

This paper presents a direct implementation scheme of the non-local multi-qubit controlled phase gate by using optical fibres and adiabatic passage. The smaller operation number for implementing needlessness addressing individually save physical resource lower difficulties experiment. Meanwhile, is immune from some decoherence effects such as atomic spontaneous emission fibre loss. In principle, it scalable.

10.1088/1674-1056/17/12/010 article EN Chinese Physics B 2008-12-01

Quantum-enhanced parameter estimation has widespread applications in many fields. An important issue is to protect the precision against noise-induced decoherence. Here we develop a general theoretical framework for improving estimating an arbitrary by monitoring quantum trajectories (MQT) and establish its connections purification-based approach estimation. Monitoring trajectory can be achieved two ways: (i) Any monitored directly environment, which experimentally challenging realistic...

10.1103/physreva.99.032347 article EN Physical review. A/Physical review, A 2019-03-28

Memes are spreading on social networking. Most created to be humorous, while some become hateful with the combination of images and words, conveying negative information people. The memes detection poses an interesting multimodal fusion problem, unlike traditional multi-modal tasks, majority memos have text that only weakly consistent or even uncorrelated, so various modalities contained in data play important role predicting its results. In this paper, we attempt work Facebook Meme...

10.1109/ijcnn55064.2022.9892164 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2022-07-18

We propose a scheme to generate three-quhit three-level singlet state in cavity QED, by placing three A-type SQUIDs single mode cavity. In this scheme, we make use of the interaction between and filed, classical pulses. The fields are vacuum during whole operation processes creating entanglement, there is no quantum information transformation fields. Because advantage SQUID-cavity system, quality factor greatly relaxed.

10.1088/0253-6102/54/6/09 article EN Communications in Theoretical Physics 2010-12-01

This paper proposes a scheme to teleport an arbitrary mixture of diagonal states multiqutrit via classical correlation and communication. To N qutrits, classically correlated pairs two qutrits are used as channel. The sender (Alice) makes Fourier transform conditional gate (i.e., XOR(3) gate) on her does measurement in appropriate computation bases. Then she sends ctrits the receiver (Bob). Based received information, Bob performs corresponding unitary transformation his obtains teleported...

10.1088/1674-1056/17/3/012 article EN Chinese Physics B 2008-03-01

Virtualization has been widely used in various scenarios, such as cloud computing. As its core technology, virtualization hypervisor brings up the efficiency of sharing physical machine's resources via virtual devices. However, also introduces significant security risks due to defective design or implementation schemes on Although several methods have proposed detect vulnerabilities devices, they still cannot effectively discover them because missing critical information related MMIO/PIO and...

10.1109/ase56229.2023.00051 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2023-09-11
Coming Soon ...