Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Efficient Scheme for Fault-Tolerant Web Page Access in Wireless Mobile Environment Based on Mobile Agents

    Web Page access in mobile wireless environments suffers more challenges for the limited memory of mobile devices and the unreliable wireless network environments. It requires some facilities in the wireless en...

    HaiYang Hu, **an** Tao, JiDong Ge, Jian Lu in High Performance Computing and Communicati… (2005)

  2. No Access

    Chapter and Conference Paper

    SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks

    In recent years, cache attacks against micro architectures have posed a daunting threat to modern processors such as x86 and ARM. Of the attacks, flush-based cache attacks have attracted increasing attention f...

    Churan Tang, Zongbin Liu, Cunqing Ma in Information and Communications Security (2020)

  3. No Access

    Chapter and Conference Paper

    Improve Image Classification by Convolutional Network on Cambricon

    Cambricon provides us with a complete intelligent application system, how to use this system for deep learning algorithms development is a challenging issue. In this paper, we exploit, evaluate and validate th...

    Peng He, Ge Chen, Kai Deng, ** Yao, Li Fu in Benchmarking, Measuring, and Optimizing (2020)

  4. No Access

    Chapter and Conference Paper

    Identification, Extraction and Three-Dimensional Building Model Reconstruction Though Faster R-CNN of Architectural Plans

    High-precision three-dimensional model is a high value information nowadays. Especially the 3D model of inner space of buildings can be used widely. However, it is not quite easy to acquire it. Building Inform...

    Kunyang Ma, Yi Cheng, Wen Ge, Yao Zhao in Geoinformatics in Sustainable Ecosystem an… (2020)

  5. No Access

    Chapter and Conference Paper

    Capturing the Persistence of Facial Expression Features for Deepfake Video Detection

    The security of the Deepfake video has become the focus of social concern. This kind of fake video not only infringes copyright and privacy but also poses potential risks to politics, journalism, social trust,...

    Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang in Information and Communications Security (2020)

  6. No Access

    Chapter and Conference Paper

    Heterogeneous Deniable Authenticated Encryption Protocol

    Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the ...

    Chunhua **, Ge Kan, Guanhua Chen, Changhui Yu, Chengjie Xu in Frontiers in Cyber Security (2020)

  7. No Access

    Chapter and Conference Paper

    The Dimension of Mobile Phone Fluency: A Focus Group Interview

    The user experience of mobile phone products has been widely concerned, while the fluency of mobile phone will also affect the user experience. However, the factors that affect the fluency of mobile phone have...

    **nze Liu, Yan Ge, Cheng Wang, Qian Zhang, Weina Qu in HCI International 2021 - Posters (2021)

  8. No Access

    Chapter and Conference Paper

    Fully Discover the Balance of Lightning Network Payment Channels

    The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...

    Zhixin Zhao, Chunpeng Ge, Lu Zhou in Wireless Algorithms, Systems, and Applicat… (2021)

  9. No Access

    Chapter and Conference Paper

    Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS

    In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...

    Chunmei Li, Lei Shang, Zheng Wei, Jun Ge in Security and Privacy in Social Networks an… (2022)

  10. Article

    Open Access

    Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds

    Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...

    Yu Zhou, Hui Ge, Bowen Ma, Shuhang Zhang, Jiwei Huang in Journal of Cloud Computing (2022)

  11. Article

    Open Access

    Memory sharing for handling memory overload on physical machines in cloud data centers

    Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...

    Yaozhong Ge, Yu-Chu Tian, Zu-Guo Yu, Weizhe Zhang in Journal of Cloud Computing (2023)

  12. Article

    Open Access

    FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings

    With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Min Yang, Chengmin Ge, **aoran Zhao, Huaizhen Kou in Journal of Cloud Computing (2023)

  13. Article

    Open Access

    Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, **gya Xu in Journal of Cloud Computing (2023)