- Software Reliability and Analysis Research
- Neural Networks and Applications
- Face and Expression Recognition
- Network Traffic and Congestion Control
- Software Testing and Debugging Techniques
- Computer Graphics and Visualization Techniques
- Advanced Authentication Protocols Security
- Cloud Computing and Resource Management
- Advanced Computational Techniques and Applications
- Cryptography and Data Security
- Advanced Algorithms and Applications
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Reliability and Maintenance Optimization
- 3D Shape Modeling and Analysis
- Robotics and Sensor-Based Localization
- Software System Performance and Reliability
- Statistical Methods and Inference
- Vehicular Ad Hoc Networks (VANETs)
- Video Surveillance and Tracking Methods
- Time Series Analysis and Forecasting
- Software Engineering Research
- Power Systems and Technologies
- Modular Robots and Swarm Intelligence
Nanjing Tech University
2024
Zhengzhou University
2023-2024
City University of Hong Kong
2015
Tsinghua University
2014
Ministry of Education of the People's Republic of China
2013
University of Electronic Science and Technology of China
2011
Zhejiang University of Science and Technology
2008
With the rapid development of information and communication technology, vehicular AD hoc networks (VANETs) has attracted more attention. In order to provide traffic safety services, vehicles frequently share related road traffic, such as vehicle motion data flow data. Reliable key generation is basis VANET security system construction. Presently, most schemes rely on a trusted third party, so there are risks. Traditional agreement protocols have high overhead, not suitable for...
Complete coverage path planning is a key problem for autonomous cleaning robots, which concerns not only the efficiency but also adaptability to unstructured environments. But diversity of environments and limited perception ability robot make still unsolved. In this paper, novel strategy combined proposed, combines random local complete planning. The lets run straight until an obstacle encountered. After turning angle, continues run. This mode easy implement can provide with flexibility And...
Vehicle Ad-hoc Network (VANET) plays an important role in improving traffic management and driving safety. Data sharing VANET can be achieved using such communications as Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Cloud (V2C). However, due to the openness of VANET, if adversary access shared data without authorization, it will seriously threaten vehicle safety user privacy, bring great challenges sharing. Therefore, is necessary establish efficient control scheme...
Abstract We propose an altitude‐adaptive vehicle counting method with attention mechanism and multiscale receptive fields that optimizes the measurement accuracy inference latency of unmanned aerial (UAV) images. An is used to aggregate horizontal vertical feature weights enhance spatial information suppress background noise. The UAV flight altitude shooting depression angle are considered for scale division image segmentation avoid acquiring distance measurements. Based on dilation rate, we...
Software reliability growth modeling plays an important role in software evaluation. To incorporate more information and provide accurate analysis, fault detection correction processes has attracted widespread research attention recently. However, the assumption of stochastic time delay brings difficulties estimating parameters. In practice, other than grouped data, test records often include some detailed information, such as rough when one is detected or corrected. Such semi-grouped...
Network virtualization, as a fundamental technology of Future Internet Architecture, has been used to overcome the ossification current Internet. This paper focuses on virtual nodes splitting for aggregating diverse physical resources in issue network embedding (VNE), which is resource allocation virtualization. A mixed integer programming (MIP) problem proposed by taking both path-splitting and node-splitting into considerations. The feasibility node analyzed corresponding formal expression...
In power system, the data synchronization of electronic transformer is precondition and guarantee for protection's correct operation. this paper, origin asynchronization introduced first, common interpolation methods to solve problem are given. Considering most general form sampled signal, error expressions linear, quadratic cubic spline deduced influencing factors discussed. Besides, changing relationships between errors three calculated by simulation, accuracy compared analyzed. The...
Trusted computing technology aims to protect the computer or embedded system from tampering. Based on idea of trust chain establishment, it establishes a for whole process power-on application running in operating system. However, uses static measurement scheme before starting each component, so state information recorded by can only reflect program when is started, but not at run time. In view above problems, analyzing credibility theorem operation defined non-interference model, dynamic...