Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Enhancing fault localization in microservices systems through span-level using graph convolutional networks

    In the domain of cloud computing and distributed systems, microservices architecture has become preeminent due to its scalability and flexibility. However, the distributed nature of microservices systems intro...

    He Kong, Tong Li, **gguo Ge, Lei Zhang, Liangxiong Li in Automated Software Engineering (2024)

  2. Article

    Open Access

    Causal effects of inflammatory bowel diseases on the risk of kidney stone disease: a two-sample bidirectional mendelian randomization

    Existing epidemiological observational studies have suggested interesting but inconsistent clinical correlations between inflammatory bowel disease (IBD), including Crohn’s disease (CD) and ulcerative colitis ...

    Huayang Zhang, Yong Huang, Junyong Zhang, Huiyi Su, Chengguo Ge in BMC Urology (2023)

  3. Article

    Open Access

    High risk of non-cancer mortality in bladder cancer patients: evidence from SEER-Medicaid

    The objective of this study was to investigate non-cancer causes of death and associated risk factors after bladder cancer (BC) diagnosis.

    Shunde Wang, Chengguo Ge in Journal of Cancer Research and Clinical Oncology (2023)

  4. Article

    Open Access

    NUF2 is correlated with a poor prognosis and immune infiltration in clear cell renal cell carcinoma

    Clear cell renal cell carcinoma (ccRCC) is one of the most common malignancies. Recently, immunotherapy has been considered a promising treatment for metastatic ccRCC. NUF2 is a crucial component of the Ndc80 ...

    Baishu Zheng, Shunde Wang, **aoyu Yuan, Junyong Zhang, Zhongjie Shen in BMC Urology (2023)

  5. No Access

    Chapter and Conference Paper

    Source Number Enumeration Approach Based on CEEMD

    Empirical mode decomposition (EMD) can be used to decompose complex signals into a limited number of intrinsic mode functions (IMFs), and each decomposed IMF component contains local characteristic signals of ...

    Shengguo Ge, Siti Nurulain Mohd Rum, Hamidah Ibrahim, Erzam Marsilah in Frontier Computing (2023)

  6. Article

    Editorial: Big data technologies and applications

    Yulei Wu, Yi Pan, Payam Barnaghi, Zhiyuan Tan, **gguo Ge, Hao Wang in Wireless Networks (2022)

  7. No Access

    Chapter and Conference Paper

    A Multimodal Deep Fusion Network for Mobile Traffic Classification

    With the explosive growth of mobile traffic and the demand for privacy protection and network security, mainstream mobile applications use encryption protocols (mostly TLS), so identifying mobile encrypted tra...

    Shuai Ding, Yifei Xu, Hao Xu, Haojiang Deng in Wireless Algorithms, Systems, and Applicat… (2022)

  8. No Access

    Chapter and Conference Paper

    SelectAug: A Data Augmentation Method for Distracted Driving Detection

    With distracted driving becoming one of the main causes of traffic accidents, deep learning technology has been widely used in distracted driving detection, which achieves high accuracy when the training and t...

    Yuan Li, Wei Mi, **gguo Ge, **gyuan Hu in Advances in Knowledge Discovery and Data M… (2022)

  9. Article

    Open Access

    Squamous cell carcinoma of the renal parenchyma presenting as hydronephrosis: a case report and review of the recent literature

    Primary squamous cell carcinoma of the renal parenchyma is extremely rare, only 5 cases were reported.

    **rong Zhang, Yuanfeng Zhang, Chengguo Ge, Junyong Zhang, Peihe Liang in BMC Urology (2020)

  10. No Access

    Article

    Exploitation of Information Centric Networking in federated satellite: 5G network

    With the development of technologies and decreasing of costs, the satellite is expected to play a fundamental role in the 5G era. On the other hand, the Information Centric Networking (ICN) is considered as a ...

    Jiadi Chen, Wei Mi, Zongzhen Liu, Yuepeng E, **gguo Ge in Wireless Networks (2020)

  11. No Access

    Book

  12. No Access

    Chapter

    A Comprehensive Survey

    This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  13. No Access

    Chapter

    Summary

    Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  14. No Access

    Chapter

    Introduction

    This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  15. No Access

    Chapter

    Encrypted Traffic Classification

    With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  16. No Access

    Chapter

    An Information-Centric Networking Based Architecture

    Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  17. No Access

    Chapter and Conference Paper

    A New Bitcoin Address Association Method Using a Two-Level Learner Model

    Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitc...

    Tengyu Liu, **gguo Ge, Yulei Wu, Bowei Dai in Algorithms and Architectures for Parallel … (2020)

  18. No Access

    Chapter

    A Content-Based Architecture

    This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  19. No Access

    Chapter

    A Service-Based Architecture

    This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  20. No Access

    Chapter

    A Flow-Based Architecture

    This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

previous disabled Page of 2