- Distributed and Parallel Computing Systems
- Autonomous Vehicle Technology and Safety
- Adversarial Robustness in Machine Learning
- Scientific Computing and Data Management
- IoT and Edge/Fog Computing
- Advanced Data Storage Technologies
- Metaheuristic Optimization Algorithms Research
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Transportation and Mobility Innovations
- Mobile Crowdsensing and Crowdsourcing
- Robotics and Automated Systems
- Advanced Statistical Process Monitoring
- Advanced Multi-Objective Optimization Algorithms
- Advanced Malware Detection Techniques
- Vehicle License Plate Recognition
- Image Processing and 3D Reconstruction
- Simulation Techniques and Applications
- Energy Efficient Wireless Sensor Networks
- Fault Detection and Control Systems
- Mineral Processing and Grinding
- Evolutionary Algorithms and Applications
- Security and Verification in Computing
- Human-Automation Interaction and Safety
- Privacy-Preserving Technologies in Data
Shandong Academy of Sciences
2005-2024
Qilu University of Technology
2023-2024
Shandong Institute of Automation
2023-2024
Southeast University
2024
Beijing University of Technology
2012
Shanghai University of Electric Power
2009
Shanghai Jiao Tong University
2009
Beihang University
2005
Qingdao Institute of Marine Geology
2004
Mobile edge computing (MEC) provides a new solution to meet the latency-sensitive and computation-intensive application requirements of vehicle networks. Different from existing work, novel multi-leader single-follower game model is designed, in which each leader can both compete cooperate with other. In case leader, profit maximization optimization problem proposed. Since convex function, there Nash equilibrium game. Each sets optimal unit price by amount computational resources required...
Developing a high-quality scenario library is crucial for evaluating more reliable autonomous driving systems. A fundamental prerequisite constructing such the generation of safety-critical scenarios. In this paper, we propose nested game algorithm to assign trajectories and their time series multiple background vehicles. This method aimed generate scenarios with varying degrees interference tested vehicle. To ensure realism generated scenarios, extracted natural from an existing dataset as...
Grid workflow description language is the basis of establishment and execution grid workflow. We propose a called GPEL based on BPEL4WS. can be easily used in environment more concise effective than In this paper, we analyze structural characteristics expressive power GPEL.
Evolutionary algorithms have been widely used to solve stochastic optimization problems (SOP) in recent studies and their performances are largely determined by the reliabilty of evaluations as well exploration exploitation behaviors. However, due black-box features physical limitations research objects, evaluating most modern systems real world may be expensive or even suffer from large numbers infeasible solutions high proportions uncertain search regions (ISR), which arouses expectations...
Web rootkits Trojan, which can download virus from remote control server and hide in BIOS, is very harmful to web security. Reverse assembly analysis on rootkit Trojan help analyzer trace malicious code find some immunization methods. The paper presents deeply reverse methods of according codes. MASM instructions are compared with turbo ASM the difference. Some famous such as downloader machine dog BIOS analyzed. Finally, proposed detection using language.
This paper discusses the monitoring of large-scale processes that exhibit non-stationary and/or time-varying behavior. The work considers statistically-based techniques relate to multivariate statistical process control (MSPC) framework. Particular focus receives partial least squares (PLS), as it allows distinguishing between cause and effect variables. To demonstrate difficulties show behavior, use conventional PLS is contrasted with its recursive moving-window counterparts. An application...