Skip to main content

previous disabled Page of 4
and
  1. Article

    Open Access

    F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android

    Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security. Machine learning and deep learning have become mainstream methods to analyze traffic, and ...

    Keya Xu, Guang Cheng in Cybersecurity (2024)

  2. No Access

    Chapter

    Decoding Culture-Embedded Urban Forms: A Hierarchical Analysis of Dongguan Street Area in Dalian, China

    Dalian is one of the most important cities in north-eastern China, integrating commerce, transportation, tourism and other industrial modes. Over its long history, the city has been shaped by diverse economic ...

    Han Wang, Guang Cheng in Identity, Space, and Everyday Life in Contemporary Northeast China (2024)

  3. No Access

    Chapter and Conference Paper

    Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack

    The video platforms that users watch leak the privacy of their preferences. More and more video streaming is being encrypted to protect users’ privacy. In addition, many users use VPN to enhance their privacy ...

    Anting Lu, Hua Wu, Hao Luo, Guang Cheng in ICT Systems Security and Privacy Protection (2024)

  4. No Access

    Chapter and Conference Paper

    An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network

    Slow HTTP DoS (SHD) is a type of DoS attack based on HTTP/HTTPS. SHD traffic at the application layer may be encrypted. Besides, the interval between packets can reach tens of seconds or more due to its slow s...

    **feng Chen, Hua Wu, Suyue Wang in ICT Systems Security and Privacy Protection (2024)

  5. No Access

    Article

    Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs

    With high efficiency, low overhead, and high scalability, consortium blockchains have been gradually and deeply applied in various fields of society. Privacy preservation and information verifiability are esse...

    **aoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng in Peer-to-Peer Networking and Applications (2023)

  6. Article

    Open Access

    Expression of IL-13Rα2 and FUS in glioma: clinicopathological and prognostic correlation

    IL-13Rα2 is one of the most widely studied tumor-associated antigens in glioma research. Fused in sarcoma (FUS) is a DNA/RNA binding protein that is dysfunctional in various malignant tumors. However, the expr...

    Guang Cheng, Meng Wang, **yue Zhang, Yun Zhang in BMC Neurology (2023)

  7. No Access

    Article

    Union-net: lightweight deep neural network model suitable for small data sets

    Traditional deep learning models prefer large data sets, and in reality small data sets are easier to obtain. It is more practical to build models suitable for small data sets. Based on CNN, this paper propose...

    **gyi Zhou, Qingfang He, Guang Cheng, Zhiying Lin in The Journal of Supercomputing (2023)

  8. No Access

    Chapter and Conference Paper

    Position Optimization Simulation of High Voltage Bushing Outlet Stress Cone Based on Simdroid Software

    At present, high voltage bushing manufacturers mostly rely on historical experience in product design, which leads to unknown physical field quantification distribution of local insulation structure and lack o...

    **aofeng Lu, Quanmin Dai, Yu Wang, Li Wang in The proceedings of the 10th Frontier Acade… (2023)

  9. No Access

    Chapter and Conference Paper

    Multi-objective Optimal Planning for Park-Level Integrated Energy System Coupling with Electric Vehicle Charging Stations

    The research on the source-demand coordination of electric vehicle charging stations (EVCSs) connected to the park-level integrated energy system (PLIES) is of great significance for the development of optimal...

    Meng Wang, J. H. Zheng, Yiqian Sun in Proceedings of the 7th PURPLE MOUNTAIN FOR… (2023)

  10. Article

    Open Access

    Monitored anesthesia care and asleep-awake-asleep techniques combined with multiple monitoring for resection of gliomas in eloquent brain areas: a retrospective analysis of 225 patients

    Awake craniotomy (AC) has become gold standard in surgical resection of gliomas located in eloquent areas. The conscious sedation techniques in AC include both monitored anesthesia care (MAC) and asleep-awake-...

    San-Zhong Li, Ning Su, Shuang Wu, **ao-Wei Fei, **n He in Chinese Neurosurgical Journal (2022)

  11. Article

    Variance reduction on general adaptive stochastic mirror descent

    In this work, we propose a simple and generalized algorithmic framework for applying variance reduction to adaptive mirror descent algorithms for faster convergence. We introduce the SVRAMD algorithm, and prov...

    Wenjie Li, Zhanyu Wang, Yichen Zhang, Guang Cheng in Machine Learning (2022)

  12. Article

    Simulation and experimental research on extra-squeeze forming method during gradient sand molding

    The flexible extrusion forming process (FEFP) is a sand mold patternless manufacturing technology that enables digital near-net sha** of complex sand molds. But, it is difficult to achieve the gradient sand ...

    Er-biao Jiang, Zhong-de Shan, Guang Cheng, Shao-zong Wang, Zhao-xian Gu in China Foundry (2022)

  13. No Access

    Article

    Hydrogen adsorption in phase and grain boundaries of pearlitic steels and its effects on tensile strength

    Molecular dynamic simulations are invoked to study hydrogen (H) adsorption as well as its effects on the strength of pearlitic steels. In particular, the effects of H on the strength of the cementite (Fe3C)–ferri...

    **aoli Wang, Yonghao Zhao, Guang Cheng, Yang Zhang, T. A. Venkatesh in MRS Advances (2022)

  14. No Access

    Chapter and Conference Paper

    Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification

    Encrypted traffic has become the primary carrier of network transmission, and encrypted traffic classification is essential for advanced network management and security protection. Existing studies mainly focu...

    Zihan Chen, Guang Cheng, Zijun Wei in Wireless Algorithms, Systems, and Applicat… (2022)

  15. No Access

    Chapter and Conference Paper

    NT-RP: A High-Versatility Approach for Network Telemetry Based on FPGA Dynamic Reconfigurable Pipeline

    Network telemetry provides more accurate and reliable services for intelligent network control by pushing fresh status information actively with help of data plane. However, most existing network telemetry met...

    Deyu Zhao, Guang Cheng, Yuyu Zhao in Wireless Algorithms, Systems, and Applicat… (2022)

  16. No Access

    Article

    SFIM: Identify user behavior based on stable features

    The development of smartphones and social networks has brought great convenience to our lives. Due to the increasing requirements of user privacy, user data are protected by encryption protocol. Nevertheless, ...

    Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo in Peer-to-Peer Networking and Applications (2021)

  17. No Access

    Article

    Adaptive Tracking Design of NCS with Time-varying Signals Using Fuzzy Inverse Model

    Tracking control of time-varying signal is a very challenging problem for the network environment applications. An adaptive control strategy based on the inverse of fuzzy singleton model is proposed in the pap...

    Shiwen Tong, Dianwei Qian, Na Huang in International Journal of Control, Automati… (2021)

  18. Article

    Open Access

    Reduction of SCUBE3 by a new marine-derived asterosaponin leads to arrest of glioma cells in G1/S

    Many saponins are characterized as exhibiting a wide spectrum of antitumor activities at low concentrations. Most of the previous studies that aimed to understand the mechanisms underlying anticancer saponins ...

    Peng-Cheng Qiu, Yun-Yang Lu, Shan Zhang, Hua Li, Han Bao, Yu-Qiang Ji in Oncogenesis (2020)

  19. No Access

    Article

    Cu–Sn–Zn nanocomposite coatings prepared by TiO2 sol-enhanced electrodeposition

    Cu–Sn–Zn (CSZ) coatings are widely applied in communication devices due to their excellent performance in electrical/thermal conductivity, solderability, and corrosion resistance. Particularly, a novel TiO2–sol-e...

    Yuxin Wang, Weidong Gao, Zhen He, Yunxue ** in Journal of Applied Electrochemistry (2020)

  20. No Access

    Article

    Bayesian Fusion Estimation via t Shrinkage

    Shrinkage prior has gained great successes in many data analysis, however, its applications mostly focus on the Bayesian modeling of sparse parameters. In this work, we will apply Bayesian shrinkage to model h...

    Qifan Song, Guang Cheng in Sankhya A (2020)

previous disabled Page of 4