- Cryptography and Data Security
- Cloud Data Security Solutions
- Security and Verification in Computing
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- 3D Shape Modeling and Analysis
- 3D Surveying and Cultural Heritage
- Evacuation and Crowd Dynamics
- Autonomous Vehicle Technology and Safety
- Cellular transport and secretion
- Spanish Linguistics and Language Studies
- Internet Traffic Analysis and Secure E-voting
- Mobile Crowdsensing and Crowdsourcing
- Tryptophan and brain disorders
- Remote Sensing and LiDAR Applications
- Human-Automation Interaction and Safety
- Engineering and Information Technology
- Robotics and Sensor-Based Localization
- Signaling Pathways in Disease
- Vehicle emissions and performance
- Garlic and Onion Studies
- Stochastic Gradient Optimization Techniques
- Human Mobility and Location-Based Analysis
Northwestern Polytechnical University
2022-2025
Sichuan University
2020-2025
State Key Laboratory of Biotherapy
2023-2024
West China Hospital of Sichuan University
2024
Kazan Federal University
2023
Wuhan University of Science and Technology
2022
Xi'an Jiaotong University
2018-2021
The key to building a 3D point cloud map is ensure the consistency and accuracy of data. However, hardware limitations LiDAR lead sparse uneven distribution data in edge region, which brings many challenges construction, such as low registration high construction errors regions. To solve these problems, this paper proposes I-PAttnGAN network generate clouds with image-assisted approaches, aims improve density uniformity regions enhance representation ability for distant objects. uses...
As an important application of the Internet Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In patient case, various resource-constrained devices are used to measure health conditions target in distant non-clinical environment and collected data sent cloud backend authorized care service for processing decision making. measurements involve private information, access control trustworthy confidential become very important. Software-based solutions that...
Container placement (CP) is a nontrivial problem in as Service (CaaS). Many works the literature solve it by using linear server energy-consumption models. However, solutions of model makes different CPs indistinguishable with regard to energy consumption homogeneous host environment that has same amount active hosts. As such, these are inefficient. In this paper, we demonstrate an energy-saving gain can be achieved optimizing containers under nonlinear model. Specifically, leverage strategy...
Leucine zipper protein 1 (LUZP1) functions in the maintenance and dynamics of cytoskeleton by interacting with actin microtubules. Deficiency or mutation LUZP1 is associated brain developmental disorders, however, its precise role function remains unclear. We showed that localizes to highly expressed CaMKIIα-expressing neurons within mouse hippocampal dentate gyrus. Depletion impedes dendritic spine maturation, which characterized excess immature filopodia loss mature mushroom spines both...
The Bin/Amphiphysin/Rvs (BAR) domain protein FAM92A1 is a multifunctional engaged in regulating mitochondrial ultrastructure and ciliogenesis, but its physiological role the brain remains unclear. Here, we show that expressed neurons starting from embryonic development. knockout mice results altered morphology age-associated cognitive deficits, potentially due to neuronal degeneration disrupted synaptic plasticity. Specifically, deficiency impairs diverse membrane morphology, including inner...
Due to the concern on cloud security, digital encryption is applied before outsourcing data for utilization. This introduces a challenge about how efficiently perform queries over ciphertexts. Crypto-based solutions currently suffer from limited operation support, high computational complexity, weak generality, and poor verifiability. An alternative method that utilizes hardware-assisted Trusted Execution Environment (TEE), i.e., Intel SGX, has emerged offer efficiency, generality...
Many cloud providers benefit from fine-grained resource management in Container as a Service (CaaS), e.g., energy savings. However, while optimizing power consumption, also need to consider service performance. Few studies the literature performed balanced optimization of two objectives initial container placement (ICP). As such, obtained solutions are often locally optimal. In this work, we model ICP bi-objective problem. Unfortunately, directly applying conventional performance modeling...
Neuronal activation is required for the formation of drug-associated memory, which critical development, persistence, and relapse drug addiction. Nevertheless, metabolic mechanisms underlying energy production neuronal remain poorly understood. In study, a large-scale proteomics analysis lysine crotonylation (Kcr), type protein posttranslational modification (PTM), reveals that cocaine promoted Kcr in hippocampal dorsal dentate gyrus (dDG). We find predominantly discovered few enzymes...
Traditional data access control schemes only prevent unauthorized to private with a single owner. They are not suitable for application in Multi-Level Data Processing (MLDP) scenario, where processed by series of parties who also insert new data. Hence, the accumulated dataset should be protected through handled hierarchically-structured at least partial owners MLDP. Existing multi-owner mainly focus on controlling co-owned multiple entities equal ownership, but seldom investigates how apply...
Energy efficiency is the key requirement to maximize lifetime of ubiquitous sensors, such as mobile phones, wearable devices and resource-constrained sensors. Such sensors offer new possibilities for providing AI-based applications services in low-power, low-cost local processing with real-time feedback. However, they have difficulty handling computationally intensive feature extraction deep learning because are typically powered by batteries a finite lifetime. To address this challenge, we...
Ensuring the consistency and accuracy of point cloud data is crucial for building 3D scenes. However, obtaining dense uniformly distributed features challenging due to limitations in LiDAR hardware. The presence sparse regions increases workload redundancy subsequent tasks. To address this issue, we propose I-PAttnGAN, a network that generates clouds based on images with aim improving density uniformity areas. By integrating image data, I-PAttnGAN dynamically extracts attention weights...
After the outbreak of Covid-19 epidemic, Huoshenshan Hospital, as main place for patient isolation, is characterized by large floor space and high staff density, its evacuation time directly related to safety patients medical care. In this article, we use BIM Pathfinder software establish an emergency simulation model, setting 2400 different ages degrees participate in simulation, carry out Steering behavior mode study influence mode, exit size initial distribution personnel on distance...
Accurate assessment of the surrounding traffic dynamics is crucial for autonomous driven vehicles (AVs). Specifically, in hybrid driving scenario, behaviors human (HVs) have a significant impact on AVs, due to that HVs usually don't share data with other vehicles. Thereby, it high importance AVs understand intentions and predict their trajectories. In this paper, we propose trajectory prediction framework scenario based collaboration multiple AVs. first represent interactions among different...
Surface inspection of industrial equipment defection plays a vital role in real production. Traditional routines require large number workers, which not only affects production efficiency but also leads to unreliable results. Computer vision-based detection approaches, e.g., using the deep learning method, have shown great potential this trend. Specifically, semantic segmentation algorithm based on Convolutional Neural Network (CNN) can extract relatively complete feature information. And...