- Mobile and Web Applications
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Embedded Systems Design Techniques
- Anomaly Detection Techniques and Applications
- Web Applications and Data Management
- Smart Grid Security and Resilience
- Algorithms and Data Compression
- Network Security and Intrusion Detection
- Age of Information Optimization
- Service-Oriented Architecture and Web Services
Shanghai University of Engineering Science
2019-2023
Shanghai University
2019
With the development of communication, Internet Things (IoT) has been widely deployed and used in industrial manufacturing, intelligent transportation, healthcare systems. The time-series feature IoT increases data density dimension, where anomaly detection is important to ensure hardware software security. However, for general methods, may be well-reconstructed with tiny differences that are hard discover. Measuring model complexity dataset space a long inefficient process. In this paper,...
Consumer electronics such as mobile phones, wearable devices, and vehicle use many intelligent applications voice commands, machine translation, face recognition. These require large inference workloads to perform tasks, which are often completed using deep neural network (DNN) models. Traditional approaches rely on pure cloud computing, with consumer devices collecting data computing platforms completing tasks. In real life, the of these not fixed likely exhibit fluctuations or unexpected...
In the development of mobile applications based on location information, system for multisegment path planning and distant monitoring sites is complex. Developers are required to manually write inbound outbound trigger functions each site after multiple integrations results a single route. addition, time that route changed, developer needs re-plan re-bind function. This paper proposes an auxiliary code generation method thrift application. Based this method, automatically generating through...
In the development of mobile applications based on location information, system for multisegment path planning and distant monitoring sites is complex.Developers are required to manually write inbound outbound trigger functions each site after multiple integrations results a single route.In addition, time that route changed, developer needs re-plan re-bind function.This paper proposes an auxiliary code generation method thrift application.Based this method, automatically generating through...