-
Chapter and Conference Paper
Muscle Fatigue Classification Based on GA Optimization of BP Neural Network
The application of medical big data and artificial intelligence algorithms are majorly popular in biomedical field. In this paper, BP neural network optimized by genetic algorithm was used to study the classif...
-
Chapter and Conference Paper
When the Attacker Knows a Lot: The GAGA Graph Anonymizer
When releasing graph data (e.g., social network) to public or third parties, data privacy becomes a major concern. It has been shown that state-of-the-art graph anonymization techniques suffer from a lack of s...
-
Chapter and Conference Paper
RARE: A Systematic Augmented Router Emulation for Malware Analysis
How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has rec...
-
Chapter and Conference Paper
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts
As we move into the mobile era, many functionalities in standard web services are being re-implemented in mobile apps and services, including many security-related functionalities. However, it has been observe...
-
Chapter and Conference Paper
Kinematic Simulation for Series-Parallel Combination Laser Machine Tool
A laser cutting machine based on a three-degree-of-freedom (DOF) series-parallel structure is proposed in this paper, in which the composition is introduced and the DOF is solved. By analyzing the position, th...
-
Chapter and Conference Paper
Curriculum System for Postgraduates Focused on Emerging Communication Technologies
The curriculum system is a core of framework systems of talent cultivation for postgraduates. Therefore, exploring and establishing a high-level postgraduate curriculum system is a very important aspect of pro...
-
Chapter and Conference Paper
M/I Adaptation Layer Network Protocol for IoT Based on 6LoWPAN
The four-layer network protocol architecture for Internet of Things is proposed based on 6LoWPAN, and the M/I adaptation layer, as the key of the protocol architecture, achieve the integration between underlyi...
-
Chapter and Conference Paper
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks
Managing numerous security vulnerabilities has long been a difficult and daunting task especially due to the complexity, heterogeneity, and various operational constraints of the network. In this paper, we foc...
-
Chapter and Conference Paper
GML Data Management: Framework and Prototype
Geography Markup Language (GML) with the feature of XML-encoding and full-formed specification has been widely used in various application systems as internal representation of geo-spatial data for its efficie...
-
Chapter and Conference Paper
Importing MB-OFDM Synchronization Approach into Core Curriculums for Postgraduates Education
Postgraduate education is currently engaged in curriculum reform in China. With the on-going reform, many potential problems are exposed gradually. In this paper, the ideas and methods of reforming the postgra...
-
Chapter and Conference Paper
Ensemble: Community-Based Anomaly Detection for Popular Applications
A major challenge in securing end-user systems is the risk of popular applications being hijacked at run-time. Traditional measures do not prevent such threats because the code itself is unmodified and local a...