- Archaeology and ancient environmental studies
- Privacy-Preserving Technologies in Data
- Pacific and Southeast Asian Studies
- Privacy, Security, and Data Protection
- Mobile Crowdsensing and Crowdsourcing
- Pleistocene-Era Hominins and Archaeology
- Cultural Heritage Materials Analysis
- Cryptography and Data Security
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Metallurgy and Cultural Artifacts
- Vehicular Ad Hoc Networks (VANETs)
- Software-Defined Networks and 5G
- Blockchain Technology Applications and Security
- Human Mobility and Location-Based Analysis
- Chinese history and philosophy
- Network Security and Intrusion Detection
- Adversarial Robustness in Machine Learning
- Forensic Anthropology and Bioarchaeology Studies
- Internet Traffic Analysis and Secure E-voting
- Nuclear reactor physics and engineering
- Fusion materials and technologies
- Anomaly Detection Techniques and Applications
- Nuclear Materials and Properties
- Data-Driven Disease Surveillance
Longhua Hospital Shanghai University of Traditional Chinese Medicine
2025
Shanghai University of Traditional Chinese Medicine
2025
Renmin University of China
2023-2024
Hangzhou Normal University
2024
University of Science and Technology of China
2017-2024
Nanjing Normal University
2020-2023
China Agricultural University
2023
Nanjing University
2013-2023
Shandong Shierming Eye Hospital
2022
Northeast Forestry University
2020
The world of industrial automation technology is at the outset a new era innovation with hype Industry 4.0. Global modern system converges power machines, computing, analytics, connectivity, cyber-physical systems, Internet things, automation, cloud and data exchange. 4.0 revolution towards digital factories smart products. Big an integration multi-disciplinary technologies facilitates customer by bringing incredible services to click. things connected machines adding communication...
Digital-twin-enabled cloud-centric architecture is a promising evolution trend of sixth generation (6G) network, which brings new opportunities and challenges for mobile video streaming-related services requiring the exponentially increasing traffic demands. Device-to-Device (D2D) communication paradigm an attractive technique to alleviate problem. However, previous research work on D2D built individuals' random mobility or position snapshot cannot guarantee stable flow. In this paper, we...
Privacy preservation is one of the greatest concerns in big data. As extensive applications data, privacy preserving data publication (PPDP) has been an important research field. One fundamental challenges PPDP trade-off problem between and utility single independent set. However, recent shown that advanced mechanism, i.e., differential privacy, vulnerable when multiple sets are correlated. In this case, evolved into a game problem, which payoff each player dependent on his neighbors'...
Background Prostate cancer (PCa) is a major cause of cancer-related mortality in men, characterized by significant heterogeneity clinical behavior and treatment response. Histone modifications play key roles tumor progression resistance, but their regulatory effects PCa remain poorly understood. Methods We utilized integrative multi-omics analysis machine learning to explore histone modification-driven PCa. The Comprehensive Machine Learning Modification Score (CMLHMS) was developed classify...
Abstract The combinations of nano-ZnO with wood through simple and efficient physical methods to prepare environmentally friendly versatile Nano-ZnO-coated Wood have important research practical implications. In this paper, an nano-ZnO-coated was prepared by magnetron sputtering using Pinus sylvestris L. var. mongholica Litv. micro-characteristics, structure, wettability colour change the ZnO-coated were characterized studied. For samples a time more than 3 min, surface water contact angle...
Abstract A large number of Yue style bronzes with regional cultural characteristics were unearthed in Hunan, which is great significance for studying the cross-regional circulation bronze technology and metal resources south Yangtze River during Late Bronze Age (8 ~ 5 C. BCE) China. In this study, 30 3 Chu from five regions Hunan Province analyzed chemical composition, metallography lead isotopes. The results show that alloy materials ware are diverse. containers mainly leaded tin bronze,...
As an emerging concept, the metaverse incorporates a range of advanced technologies and offers great opportunity to enhance experiences healthcare in clinical practice human health. However, many cyber security issues often occur analytics such as DDoS attack, probe port scanning attack. Fortunately, 6G-enabled intrusion detection can detect anomalous activities with help anomaly algorithm for analytics. Nevertheless, different from static data, data streams have intrinsic characteristics...
Privacy preserving on data publication has been an important research field over the past few decades. One of fundamental challenges in privacy is trade-off problem between and utility single independent set. However, recent works have shown that advanced mechanism, i.e., differential privacy, vulnerable when multiple sets are correlated. In this case, evolved into a game problem, which payoff each player dependent not only his parameter, but also neighbors' parameters. paper, we firstly...
The provenance of the highly radiogenic lead (HRL) contained in Chinese Shang bronzes has attracted great scholarly attention recent years. A new study Hanzhong put forward a hypothesis that HRL metal may come from adjacent Qinling Mountains. This article reanalyses isotope ratios and alloy compositions bronzes. Combining analytical results, modern ore data slags Guanzhong area, we propose there is no direct evidence to identify as (especially lead). Whilst over 80% contain HRL, indigenous...
As an emerging computing paradigm, the Internet of Vehicles (IoV) brings a lot benefits for drivers and consumers, such as route recommendation, reducing traffic congestion, parking difficulty. However, participants in IoV are inevitably exposed to privacy threats because their data outsourced third party. This article presents comprehensive analysis root causes risks potential solutions. We begin by introducing concrete challenges, which tied structural properties IoV. Then, we present...