- Spam and Phishing Detection
- Land Use and Ecosystem Services
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Forest Management and Policy
- Distributed Sensor Networks and Detection Algorithms
- Network Security and Intrusion Detection
- Web Application Security Vulnerabilities
- Blockchain Technology Applications and Security
- Museums and Cultural Heritage
- Random Matrices and Applications
- Gut microbiota and health
- Essential Oils and Antimicrobial Activity
- Advanced Data Storage Technologies
- Robotic Path Planning Algorithms
- Topic Modeling
- Probability and Risk Models
- Listeria monocytogenes in Food Safety
- Mycotoxins in Agriculture and Food
- Biochemical and biochemical processes
- Software Engineering Research
- Mobile Crowdsensing and Crowdsourcing
- Clostridium difficile and Clostridium perfringens research
- Advanced Authentication Protocols Security
- Natural Language Processing Techniques
Shaanxi Normal University
2025
Ollscoil na Gaillimhe – University of Galway
2024
Northwest A&F University
2024
Tsinghua University
2023-2024
Dalian University of Technology
2024
Sanya University
2024
Beijing Jiaotong University
2024
Sun Yat-sen University
2024
Guangdong University of Technology
2024
Xi'an Technological University
2023
Email spoofing attacks pose a severe threat to email systems by forging the sender's address deceive recipients.Sender Policy Framework (SPF), an authentication protocol that verifies senders their IP addresses, is critical for preventing attacks.However, attackers can bypass SPF validation and launch convincing evade authentication.This paper proposes BreakSPF, novel attack framework bypasses enable spoofing.Attackers actively target domains with permissive configurations utilizing cloud...
With the development of science and technology, Internet TV (OTT TV) has gradually entered public view. The article starts from analysis current situation traditional OTT TV, extends to thinking domestic policy. At same time, summarize several advantages introduce value-added business, fragmented marketing other key points promote as well expansion field, finally combined with professional -- digital media objectively view TV.
ABSTRACT Globally, the importance of soil conservation (SC) has been increasingly recognized, with a growing demand for use more accurate erosion models to assess and investigate its driving mechanisms. This is essential meet requirements land management ecological restoration. study developed framework calibrating sediment module K, C, P factors SWAT model using sampling data remote sensing measurements. Taking Jinghe River Basin as an example, optimized was utilized spatiotemporal...
5G messaging services, based on Global System for Mobile Communications Association (GSMA) Rich Communication Service (RCS) and 3rd Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS), have been deployed globally by more than 90 mobile operators serving over 421 million monthly active users via 1.2 billion devices. Despite the widespread use, security research of remains sparse. In this paper, we present a comprehensive analysis measurement assisted semi-automated testing...
Cryptocurrency mining is a crucial operation in blockchains, and miners often join pools to increase their chances of earning rewards. However, the energy-intensive nature PoW cryptocurrency has led its ban New York State United States, China, India. As result, pools, serving as central hub for activities, have become prime targets regulatory enforcement. Furthermore, cryptojacking malware refers self-owned stealthy evade detection techniques conceal profit wallet addresses. no systematic...
Data-intensive technologies require reliable and efficient storage solutions to ensure the integrity availability of vast amounts generated data. Redundant Arrays Independent Disks (RAID) technology has emerged as a popular choice, offering fault tolerance improved performance. Among RAID configurations, RAID-6 stands out for its ability tolerate up two disk failures. This is achieved through algorithms like Row-Diagonal Parity (RDP) coding, which introduces redundancy enables data recovery....
Content Delivery Networks (CDNs) are ubiquitous middleboxes designed to enhance the performance of hosted websites and shield them from various attacks.Numerous notable studies show that CDNs modify a client's request when forwarding it original server.Multiple inconsistencies in this operation have been found potentially result security vulnerabilities like DoS attacks.Nonetheless, existing research lacks systematic approach studying CDN inconsistencies.In work, we present REQSMINER, an...
Mobile crowd sensing campaigns usually require spatial-temporal coverage. However, there are numerous circumstances where human participants unable or unwilling to reach the target regions, such as traffic jams accidents. Furthermore, may not prefer be interrupted frequently leak private information too much. All of these salient challenges that affect task achievement. To solve problems, we propose in this paper a method employs and UAVs sense data together. For participants, proposed takes...
To address the problem that artificial potential field method (APF) is easy to fall into local minima in path planning of dual robotic arms, a combining improved APF and advanced Rapidly expanding random trees (RRT) algorithm proposed. method. First, sewing machine device used as research object model arm well analyze its positive kinematics; second, workspace double analyzed, enclosing box simplify obstacles, collision detection linkage performed; then, plan main dynamic obstacles...
Background/Objectives:Clostridium perfringens is a common opportunistic pathogen that causes gastrointestinal diseases in livestock and poultry. Our preliminary research has demonstrated administering oral yeast-cell microcapsule (YCM)-mediated DNA vaccines can effectively stimulate mucosal immunity, thereby preventing the occurrence of diseases. Methods: In this study, C. α-toxin gene was first cloned H126G C-terminal (C247–370) mutations were created. The corresponding vaccine cassettes...
Email attachments have become a favored delivery vector for malware campaigns. In response, email attachment detectors are widely deployed to safeguard security. However, an emerging threat arises when adversaries exploit parsing discrepancies between and clients evade detection. Currently, uncovering these vulnerabilities still depends on manual, ad hoc methods. this paper, we perform the first systematic evaluation of detection against ambiguity vulnerabilities. We propose novel testing...
For distributed computing with Byzantine machines under Privacy Protection (PP) constraints, this paper develops a robust PP quasi-Newton estimation, which only requires the node to transmit five vectors central processor high asymptotic relative efficiency. Compared gradient descent strategy more rounds of transmission and Newton iteration entire Hessian matrix be transmitted, novel has advantages in reducing privacy budgeting cost. Moreover, our algorithm does not depend on boundedness...
This paper proposes a Robust One-Step Estimator(ROSE) to solve the Byzantine failure problem in distributed M-estimation when moderate fraction of node machines experience failures. To define ROSE, algorithms use robust Variance Reduced Median Of Local(VRMOL) estimator determine initial parameter value for iteration, and communicate between central processor Newton-Raphson iteration procedure derive VRMOL gradient, Hessian matrix so as obtain final estimator. ROSE has higher asymptotic...