-
Article
Enhancing fault localization in microservices systems through span-level using graph convolutional networks
In the domain of cloud computing and distributed systems, microservices architecture has become preeminent due to its scalability and flexibility. However, the distributed nature of microservices systems intro...
-
Article
Open AccessCausal effects of inflammatory bowel diseases on the risk of kidney stone disease: a two-sample bidirectional mendelian randomization
Existing epidemiological observational studies have suggested interesting but inconsistent clinical correlations between inflammatory bowel disease (IBD), including Crohn’s disease (CD) and ulcerative colitis ...
-
Article
Open AccessHigh risk of non-cancer mortality in bladder cancer patients: evidence from SEER-Medicaid
The objective of this study was to investigate non-cancer causes of death and associated risk factors after bladder cancer (BC) diagnosis.
-
Article
Open AccessNUF2 is correlated with a poor prognosis and immune infiltration in clear cell renal cell carcinoma
Clear cell renal cell carcinoma (ccRCC) is one of the most common malignancies. Recently, immunotherapy has been considered a promising treatment for metastatic ccRCC. NUF2 is a crucial component of the Ndc80 ...
-
Chapter and Conference Paper
Source Number Enumeration Approach Based on CEEMD
Empirical mode decomposition (EMD) can be used to decompose complex signals into a limited number of intrinsic mode functions (IMFs), and each decomposed IMF component contains local characteristic signals of ...
-
Article
Editorial: Big data technologies and applications
-
Chapter and Conference Paper
A Multimodal Deep Fusion Network for Mobile Traffic Classification
With the explosive growth of mobile traffic and the demand for privacy protection and network security, mainstream mobile applications use encryption protocols (mostly TLS), so identifying mobile encrypted tra...
-
Chapter and Conference Paper
SelectAug: A Data Augmentation Method for Distracted Driving Detection
With distracted driving becoming one of the main causes of traffic accidents, deep learning technology has been widely used in distracted driving detection, which achieves high accuracy when the training and t...
-
Article
Open AccessSquamous cell carcinoma of the renal parenchyma presenting as hydronephrosis: a case report and review of the recent literature
Primary squamous cell carcinoma of the renal parenchyma is extremely rare, only 5 cases were reported.
-
Article
Exploitation of Information Centric Networking in federated satellite: 5G network
With the development of technologies and decreasing of costs, the satellite is expected to play a fundamental role in the 5G era. On the other hand, the Information Centric Networking (ICN) is considered as a ...
-
Book
-
Chapter
A Comprehensive Survey
This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...
-
Chapter
Summary
Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...
-
Chapter
Introduction
This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...
-
Chapter
Encrypted Traffic Classification
With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...
-
Chapter
An Information-Centric Networking Based Architecture
Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...
-
Chapter and Conference Paper
A New Bitcoin Address Association Method Using a Two-Level Learner Model
Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitc...
-
Chapter
A Content-Based Architecture
This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...
-
Chapter
A Service-Based Architecture
This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...
-
Chapter
A Flow-Based Architecture
This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...