- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Advanced Neural Network Applications
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Caching and Content Delivery
- Video Surveillance and Tracking Methods
- Industrial Vision Systems and Defect Detection
- Cloud Data Security Solutions
- Physiological and biochemical adaptations
- Liver Disease Diagnosis and Treatment
- Indoor and Outdoor Localization Technologies
- Identification and Quantification in Food
- Anomaly Detection Techniques and Applications
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Spam and Phishing Detection
- Hand Gesture Recognition Systems
- Crime, Illicit Activities, and Governance
- Emotion and Mood Recognition
- Machine Learning and Data Classification
- Image and Video Quality Assessment
- Access Control and Trust
- Visual Attention and Saliency Detection
China-Japan Friendship Hospital
2024-2025
Hong Kong Polytechnic University
2018-2024
Zhejiang Ocean University
2020-2024
Zhejiang University
2020-2024
Southeast University
2016-2024
Tianjin Medical University
2024
Tianjin Medical University Eye Hospital
2024
Beijing Information Science & Technology University
2022-2023
Qufu Normal University
2023
Chung-Ang University
2023
SDN has enabled extensive network programmability and speedy innovations by decoupling the control plane from data plane. However, separation of two planes could also be a potential threat to whole network. Previous approaches pointed out that attackers can launch various attacks against SDN, such as DoS attacks, topology poisoning side-channel attacks. To address security issues, we present comprehensive study in propose FlowKeeper, common framework build robust different FlowKeeper...
Information about vehicle safety, such as the driving safety status and road index, is of great importance to protect humans support safe route planning. Despite some research on analysis, accuracy granularity assessment are both very limited. Also, problem precisely dynamically predicting throughout a city has not been sufficiently studied remains open. With proliferation sensor-equipped vehicles smart devices, huge amount mobile sensing data provides an opportunity conduct analysis. In...
Mining attacks allow attackers to gain an unfair share of the mining reward by deviating from honest strategy in Bitcoin system. Among most well-known are block withholding (BWH), fork after (FAW), and selfish mining. In this paper, we propose two new strategies: power adjusting bribery racing, introduce novel attacks, Power Adjusting Withholding (PAW) Bribery Selfish (BSM) adopting strategies. Both can increase attackers. Furthermore, show PAW avoid "miner's dilemma" BWH attacks. BSM...
Abnormal traffic detection is the core component of network intrusion system. Although semisupervised methods can detect zero-day attack traffic, previous work suffers from high false alarms because trained model simply based on normal traffic. In this article, we propose an accurate abnormal method using pseudoanomaly, consisting efficient feature extraction framework and a novel denoise autoencoder-generative adversarial (DAE-GAN) model. The adopts innovative packet window scheme to...
The Domain Name System (DNS) plays a crucial role in the Internet. However, it is vulnerable to many attacks such as cache poisoning attack and DDoS attack. Though some countermeasures have been proposed, they still limitations. In this paper, we propose B-DNS, blockchain-based domain name system, which can provide secure efficient DNS service. B-DNS fills up two shortcomings of current DNS, namely computation-heavy Proof-of-Work (PoW) protocol inefficient query, by building Proof-of-Stake...
The dark sleeper (Odontobutis potamophila) is an important commercial fish species which shows a sexually dimorphic growth pattern. However, the lack of sex transcriptomic data hindering further research and genetically selective breeding sleeper. In this study, integrated analysis mRNA miRNA was performed on gonad tissue to elucidate molecular mechanisms determination differentiation in A total 143 differentially expressed miRNAs 16,540 genes were identified. Of these, 8103 mRNAs 75...
Background and Aims: Increased intestinal permeability exacerbates the development of metabolic dysfunction associated steatohepatitis (MASH), but underlying mechanisms remain unclear. Autophagy is important for maintaining normal permeability. Here, we investigated impact transcription factor EB (TFEB), a key regulator autophagy, in MASH progression. Methods: TFEB expression was analyzed proximal colon 45 individuals with steatotic liver disease 23 healthy controls. We utilized...
Smart contract technologies can be used to implement almost arbitrary business logic. They revolutionize many businesses such as payments, insurance, and crowdfunding. The resulting birth of decentralized finance (DeFi) has gained significant momentum. contracts DeFi are now attractive targets for attacks. An important research question is how protect deployed smart DeFi. cannot modified once deployed, namely vulnerabilities fixed by patching. In this case, in might cause devastating...
Mounting clinical evidence suggests that a comprised intestinal barrier contributes to the progression of nonalcoholic steatohepatitis (NASH); nevertheless, precise mechanism remains elusive. This study unveils significant upregulation nuclear receptor-binding SET domain protein 2 (NSD2) in intestines obese humans and mice subjected high-fat cholesterol diet (HFCD). Intestine-specific NSD2 knockout attenuated impairment NASH, whereas overexpression exacerbated this progression....
Abstract IGF‐1R plays a critical role in many physiological activities, such as development, growth, metabolism, and reproduction. Identification of genetic markers the gene significantly associated with important growth traits Odontobutis potamophila may accelerate improvement. In this study, we characterized cDNA sequence O. , our data revealed that contained an open reading frame 1650 bp, encoding polypeptide 549 amino acids (aa). Quantitative real‐time polymerase chain reaction...
The security of HTTPS fundamentally relies on SSL/TLS certificates issued by Certificate Authorities (CAs), which, however, are vulnerable to be compromised issue unauthorized (i.e., without domains' permission). Current countermeasures such as Transparency (CT) can only detect rather than preventing them. In this article, we present <sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Pistis</small> , a framework for issuing authorized and trusted...
A smart contract cannot be modified once deployed. Bugs in deployed contracts may cause devastating consequences. For example, the infamous reentrancy bug DAO allows attackers to arbitrarily withdraw ethers, which caused millions of dollars loss. Currently, main countermeasure against bugs is thoroughly detect and verify before deployment, which, however, defend unknown bugs. These detection methods also suffer from possible false negative results.
Prior research has introduced a new scenario of blockchain-assisted clouds where the data owner outsources original to cloud servers and stores some metadata on blockchain. Despite key-value query range in this hybrid-storage scenario, other more complicated types are not yet supported. In article, we conduct pioneering authenticated queries for graph data, which is popular type such as knowledge cloud. The primary challenge how design an structure (ADS) that supports can be easily...
In the field of mobile crowd sensing (MCS), traditional client–cloud architecture faces increasing challenges in communication and computation overhead. To address these issues, this paper introduces edge computing into MCS system proposes a two-stage task allocation optimization method under constraint limited resources. The utilizes deep reinforcement learning for selection optimal servers deployment, followed by greedy self-adaptive stochastic algorithm recruitment participants....
Weakly supervised instance segmentation (WSIS) using only image-level labels is a challenging task due to the difficulty of aligning coarse annotations with finer task. However, advancement deep neural networks (DNNs), WSIS has garnered significant attention. Following proposal-based paradigm, we encounter redundant problem resulting from single being represented by multiple proposals. For example, feed picture dog and proposals into network expect output one proposal containing dog, but...
Network-based malware has posed serious threats to the security of host machines. When adopts a private TCP/IP stack for communications, personal and network firewalls may fail identify malicious traffic. Current firewall policies do not have convenient update mechanism, which makes traffic detection difficult.