2025
RFBLS: A robust rough fuzzy broad learning system with local neighborhood structure.
Neurocomputing, 2025
Enhancing diabetes complications prediction through knowledge graphs and convolutional networks.
Eng. Appl. Artif. Intell., 2025
Feature selection through adaptive sparse learning for scene recognition.
Appl. Soft Comput., 2025
2024
SAC-RSM: A High-Performance UAV-Side Road Surveillance Model Based on Super-Resolution Assisted Learning.
IEEE Internet Things J., November, 2024
Improving the transferability of adversarial attacks via self-ensemble.
Appl. Intell., November, 2024
Improving Physical Layer Security for Distributed Antenna Systems With a Friendly Jammer.
IEEE Trans. Commun., August, 2024
Differentially private federated learning with non-IID data.
Computing, July, 2024
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence.
IEEE Internet Things J., June, 2024
Multi-cluster high performance computing method based on multimodal tensor in enterprise resource planning system.
Phys. Commun., February, 2024
Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification.
Neural Networks, 2024
Incremental high average-utility itemset mining: survey and challenges.
CoRR, 2024
Feature-aware transferable adversarial attacks against image classification.
Appl. Soft Comput., 2024
QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor Networks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Secure Transmission for Wireless Communication Systems With Friendly Jammers.
IEEE Trans. Veh. Technol., December, 2023
MapReduce-based distributed tensor clustering algorithm.
Neural Comput. Appl., December, 2023
Privacy protection framework for face recognition in edge-based Internet of Things.
Clust. Comput., October, 2023
Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5.
Remote. Sens., July, 2023
Multi-objective optimisation based fuzzy association rule mining method.
World Wide Web (WWW), May, 2023
RF-Ray: Sensing Objects in the Package via RFID Systems.
IEEE Syst. J., March, 2023
Combining knowledge extension with convolution neural network for diabetes prediction.
Eng. Appl. Artif. Intell., 2023
BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Multi-attention Integration Mechanism for Region Destruction Detection of Remote Sensing Images.
Proceedings of the Advances in Computer Graphics, 2023
2022
Power Splitting and Source-Relay Selection in Energy Harvesting Wireless Network.
Wirel. Pers. Commun., 2022
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration.
IEEE Trans. Intell. Transp. Syst., 2022
Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors.
IEEE Trans. Commun., 2022
Intelligent Jamming Strategies for Secure Spectrum Sharing Systems.
IEEE Trans. Commun., 2022
RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm.
J. Sensors, 2022
A fuzzy spatial description logic for the semantic web.
J. Ambient Intell. Humaniz. Comput., 2022
Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems.
IET Commun., 2022
Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting.
IET Commun., 2022
A Variable Sliding Window Algorithm Based on Concept Drift for Frequent Pattern Mining Over Data Streams<sup>*</sup>.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
2021
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes.
Frontiers Comput. Sci., February, 2021
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems.
Wirel. Commun. Mob. Comput., 2021
Dynamic Virtual Network Embedding of Mobile Cloud System Based on Global Resources in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021
Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.
Secur. Commun. Networks, 2021
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2021
Dynamic spatio-temporal logic based on RCC-8.
Concurr. Comput. Pract. Exp., 2021
Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021
Human behavior recognition model based on improved EfficientNet.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Anomaly detection of diabetes data based on hierarchical clustering and CNN.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Fuzzy Association Rules Mining based on Type-2 Fuzzy Sets over Data Stream.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type - Black Box Testing.
Proceedings of the Big Data and Security - Third International Conference, 2021
State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network.
Proceedings of the Big Data and Security - Third International Conference, 2021
2020
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems.
Sensors, 2020
SKINNY-Based RFID Lightweight Authentication Protocol.
Sensors, 2020
3DLRA: An RFID 3D Indoor Localization Method Based on Deep Learning.
Sensors, 2020
Cluster-based distributed dynamic cuckoo filter system for Redis.
Int. J. Parallel Emergent Distributed Syst., 2020
高性能计算与天文大数据研究综述 (High Performance Computing and Astronomical Data: A Survey).
计算机科学, 2020
Privacy preserving classification on local differential privacy in data centers.
J. Parallel Distributed Comput., 2020
Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data.
Inf. Sci., 2020
Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism.
Inf., 2020
Reconfigurable Fault-tolerance mapping of ternary N-cubes onto chips.
Concurr. Comput. Pract. Exp., 2020
Intelligent Resource Scheduling Based on Locality Principle in Data Center Networks.
IEEE Commun. Mag., 2020
Optimizing Multi-objective Functions in Fuzzy Association Rule Mining.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020
Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor Networks.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Algorithm for Determining Number of Clusters based on Dichotomy.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Anomaly Detection based on Feature Correlation and Influence Degree in SDN.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
RFID-Based WIMEC-LANDMARC Indoor Location Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Prediction of diabetes using Multi-type data.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
A Live Migration Algorithm for Containers Based on Resource Locality.
J. Signal Process. Syst., 2019
A Lightweight RFID Mutual Authentication Protocol with PUF.
Sensors, 2019
ANTspin: Efficient Absolute Localization Method of RFID Tags via Spinning Antenna.
Sensors, 2019
Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019
Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey.
Intell. Data Anal., 2019
PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning.
IEEE Access, 2019
Absorbing Diagonal Algorithm for Enhancing Randomized SVD Algorithms in Collaborative Filtering✱.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019
Application of Data Distribution Technology in Smart Cities.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
Developing a smart healthcare framework with an 'Aboriginal lens'.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure Faults.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Parallel Absorbing Diagonal Algorithm: A Scalable Iterative Parallel Fast Eigen-Solver for Symmetric Matrices.
Proceedings of the Data Science - 6th International Conference, 2019
Multi-core Processor Performance Evaluation Model Based on DPDK Affinity Setting.
Proceedings of the Data Science - 6th International Conference, 2019
A Novel Heat-Proof Clothing Design Algorithm Based on Heat Conduction Theory.
Proceedings of the Data Science - 6th International Conference, 2019
Fuzzy Association Rule Mining Algorithm Based on Load Classifier.
Proceedings of the Data Science - 6th International Conference, 2019
Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Analysis and Design of Group RFID Tag Security Authentication Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Design and Implementation of Cloud Service System Based on Face Recognition.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
An Indoor 3D Positioning Technology Based on NB-IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
Design of Modern Logistics Management System Based on RFID and NB-IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
An RFID Indoor Positioning Algorithm Based on Support Vector Regression.
Sensors, 2018
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018
Spark's operation time predictive in cloud computing environment based on SRC-WSVR.
J. High Speed Networks, 2018
Edge computing-based security authentication algorithm for multiple RFID tags.
Int. J. Intell. Inf. Database Syst., 2018
Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing.
Int. J. High Perform. Syst. Archit., 2018
An improved SMURF scheme for cleaning RFID data.
Int. J. Grid Util. Comput., 2018
Research and Implementation of High Performance Traffic Processing Based on Intel DPDK.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Research on Container Load Strategy Based on Microservices.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Analysis and Research Based on Differential Privacy Protection Related Algorithms.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Glucose Screening Measurements and Noninvasive Glucose Monitor Methods.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018
An Improvement RFID Security Authentication Protocol Based on Hash Function.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Design and Implementation of Cognitive System of Children's Education Based on RFID.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018
Embedding Exchanged Hypercubes into Rings and Ladders.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Analysis of Localization Algorithms in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
A Survey on Computation Offloading for Mobile Edge Computing Information.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
Distributed Dynamic Cuckoo Filter System Based on Redis Cluster.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
Survey of Load Balancing Method Based on DPDK.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
A Summary of Data Analysis Based on Differential Privacy.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
2017
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and <i>K</i>-Nearest Neighbor.
Sensors, 2017
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks.
Secur. Commun. Networks, 2017
VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017
Energy optimization of ant colony algorithm in wireless sensor network.
Int. J. Distributed Sens. Networks, 2017
Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags.
Int. J. Bus. Data Commun. Netw., 2017
A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment.
Int. J. Bus. Data Commun. Netw., 2017
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Performance Prediction of Spark Based on the Multiple Linear Regression Analysis.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Design and implementation of action recognition system based on RFID sensor.
Proceedings of the 13th International Conference on Natural Computation, 2017
A New Middleware Architecture for RFID Data Management.
Proceedings of the Advances in Internetworking, 2017
Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Survey of Big Data Platform Based on Cloud Computing Container Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Design and Implementation of Food Safety Traceability System Based on RFID Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
A Novel Secure Architecture for the Internet of Things.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Review of Virtual Memory Optimization in Cloud Environment.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016
An Efficient RFID Reader Network Planning Strategy Based on P2P Computing.
Proceedings of the Advances on P2P, 2016
A Novel Cloud Computing Architecture Oriented Internet of Vehicles.
Proceedings of the Advances on P2P, 2016
A Review on Data Cleaning Technology for RFID Network.
Proceedings of the Advances on P2P, 2016
Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B.
Proceedings of the Advances on P2P, 2016
2015
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
Int. J. Distributed Sens. Networks, 2015
Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
Wireless Injection Attacks Based on Fake Data Injection in TinyOS.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
2014
The modeling of time series based on fuzzy information granules.
Expert Syst. Appl., 2014
2013
Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things.
Proceedings of the Advances in Wireless Sensor Networks, 2013
2012
Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012