- Advanced Malware Detection Techniques
- Topological and Geometric Data Analysis
- IoT and Edge/Fog Computing
- Complex Network Analysis Techniques
- Advanced Sensor and Energy Harvesting Materials
- Blockchain Technology Applications and Security
- Smart Cities and Technologies
- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Security and Verification in Computing
- Software-Defined Networks and 5G
- Video Surveillance and Tracking Methods
- Network Time Synchronization Technologies
- Tactile and Sensory Interactions
- Polydiacetylene-based materials and applications
- Cybercrime and Law Enforcement Studies
- Hand Gesture Recognition Systems
- Electric Vehicles and Infrastructure
- Radiomics and Machine Learning in Medical Imaging
- Graph theory and applications
- Wireless Body Area Networks
- Geometric and Algebraic Topology
- Educational Technology and Pedagogy
- Software Testing and Debugging Techniques
East China University of Science and Technology
2024
Chongqing University
2024
Xi’an Jiaotong-Liverpool University
2024
Hubei Normal University
2024
Beihang University
2023-2024
University of Newcastle Australia
2023
Newcastle University
2023
China Electric Power Research Institute
2023
Beijing Forestry University
2022
Beijing Jiaotong University
2021
Automatic exploit generation is an open challenge. Existing solutions usually explore in depth the crashing paths, i.e., paths taken by proof-of-concept (POC) inputs triggering vulnerabilities, and generate exploits when exploitable states are found along paths. However, do not always exist Moreover, existing heavily rely on symbolic execution scalable path exploration generation. In addition, few could heap-based vulnerabilities. this paper, we propose a new solution revery to search for...
A PAM/gelatin/TA-CNT hydrogel with skin temperature-triggered adhesion and excellent sensing properties.
The Fermat problem is a crucial topological issue corresponding to fractal networks. In this paper, we discuss the average distance (AFD) of Vicsek polygon network and analyze structural properties. We construct based on in an iterative way. Given structure network, present elaborate analysis point under various situations. special allows way calculate AFD geodesic (AGD). Moreover, introduce its AGD AFD. Its relationship with enables us deduce above two indices directly. results show that...
In a multi-camera system, matching the same pedestrian across different camera views is challenging problem. Pedestrian detection and ReIDentification (ReID) plays an important role in preventing traffic accidents involving pedestrians, for both conventional autonomous vehicles. To best of our knowledge, there no existing work which addresses problem ReID typical vehicle setting, where equipped with 360° surround-view fisheye cameras. this paper, we propose deep learning Seeing Pedestrians...
With the continuous further development of education informatization in our country, present way and spreading knowledge have changed gradually, which has caused innovation teaching mode, method learning method. In information environment, as an important resource implementation process, digital resources become focus basic schools gradually. Schools begun to explore construction high-quality with their own characteristics, so promote reform schools. order effective measures effects...
As Large Language Models (LLMs) of Prompt Jailbreaking are getting more and attention, it is great significance to raise a generalized research paradigm evaluate attack strengths basic model conduct subtler experiments. In this paper, we propose novel approach by focusing on set target questions that inherently sensitive jailbreak prompts, aiming circumvent the limitations posed enhanced LLM security. Through designing analyzing these questions, paper reveals effective method identifying...
In this paper, we investigate the average geodesic distance on Sierpiński torus networks. We construct networks based classic carpet in an iterative way. By applying finite patterns integrals, deduce exact value of torus. Furthermore, asymptotic formula for corresponding can be obtained.
K-means and Gaussian mixture model (GMM) clustering, as dictionary learning procedures, lie at the heart of BoW (BoW) framework. With data scale increasing, it urgently requires efficient ways to realize these processes. In this paper, we present some new approaches calculate k-means, GMM MAP algorithms, which can be effectively accelerated by GPU, multicore CPU. The speed-up is empowered matrix-based operations, show that three procedures concisely reformulated into matrix multiplications,...
The traditional Internet uses the best-effort method to deliver, so there are problems with high packet loss rate, low throughput and large jitter. emergence of Deterministic Networking has brought new ideas alleviate these problems. This paper proposes a service protection mechanism based on p4 platform jitter in communication process. transmits packets through different paths, receiver will judge eliminate duplicate after receiving packets, thereby realizing rapid fault switching. Packets...
Some Internet applications require the network to provide necessary low-latency performance. However, in traditional IP networks, protocols such as RIP and OSPF cannot flexible services.Currently, there are mainly two methods achieve services.The first is reserve resources for target traffic, which fully use resources. The second gating mechanism. schedule complicated calculate requires clock synchronization with high precision, so it used specific scenarios. To improve latency performance...
Cascading event detection is essential for situational awareness and the secure operation of distribution networks. In this paper, based on high-dimensional factor models (HDFMs), an approach proposed decomposition spatial localization cascading events. The HDFM divides raw online monitoring data into factors (spikes, indicating signals) residuals (a bulk, noises or normal fluctuations). estimated number employed as indicator to detect occurrence subevents. addition, autoregressive rate...
Internet of things is a new generation information technology and an important part the industry.It another leap-forward development.The most direct application Things wireless sensor network.The communication network needs support basic protocol.This paper analyzes summarizes advantages disadvantages transmission based on analysis current protocols.
Multi-round dialogue is one of the most practical techniques in natural language processing. The current multi-round systems generally suffer from contextual information loss and lack diversity generated answers. Therefore, we propose a model based on Sequicity. We use gate recurrent unit (GRU) to encode question, response previous sentence semantic slot information. Then, encoding results are fed into context encoder generate During training procedure, two encoders input recognition...