- Pulsars and Gravitational Waves Research
- Gamma-ray bursts and supernovae
- ECG Monitoring and Analysis
- Non-Invasive Vital Sign Monitoring
- Internet Traffic Analysis and Secure E-voting
- EEG and Brain-Computer Interfaces
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- earthquake and tectonic studies
China Information Technology Security Evaluation Center
2023
Qufu Normal University
2020
Guizhou University
2020
Chinese PLA General Hospital
2007
Abstract Owing to the narrow energy band of Swift Burst Alert Telescope (BAT), several urgent issues remain unsolved. We systematically study properties a refined sample 283 Swift/BAT gamma-ray bursts (GRBs) with well-measured spectral peak ( E p ) at high confidence level greater than 3 σ . find that duration T 90 distribution still exhibits an evident bimodality more reliable boundary ≃ 1.06 s instead 2 as found for previously contaminated samples, including without well-peaked spectra,...
Using a large sample of fast radio bursts (FRBs) from the first CHIME/FRB catalog, we apply Lynden-Bell's c$^-$ method to study their energy function and formation rate evolutions with redshift. It is found non-parametric Kendell's $\tau$ statistics that FRB strongly evolves cosmological redshift as $E(z)\propto(1 + z)^{5.23}$. After removing dependence, local distribution can be described by broken power-law form $\Psi(E_{0})\propto E_{0}^{-0.38}$ for low-energy segment E_{0}^{-2.01}$...
Leveraging DNS for covert communications is appealing since most networks allow traffic, especially the ones directed toward renowned hosting services. Unfortunately, services overlook domain ownership verification, enabling miscreants to host undelegated records of a they do not own. Consequently, can conduct communication through such whitelisted domains on reputable providers. In this paper, we shed light emerging threat posed by and demonstrate their exploitation in wild. To best our...