scispace - formally typeset
Search or ask a question
Institution

Beijing Wuzi University

EducationBeijing, China
About: Beijing Wuzi University is a education organization based out in Beijing, China. It is known for research contribution in the topics: Supply chain & Cloud computing. The organization has 1210 authors who have published 1092 publications receiving 6370 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A novel method that used deep learning to improve the detection of malware variants using a convolutional neural network that could extract the features of the malware images automatically was proposed.
Abstract: With the development of the Internet, malicious code attacks have increased exponentially, with malicious code variants ranking as a key threat to Internet security. The ability to detect variants of malicious code is critical for protection against security breaches, data theft, and other dangers. Current methods for recognizing malicious code have demonstrated poor detection accuracy and low detection speeds. This paper proposed a novel method that used deep learning to improve the detection of malware variants. In prior research, deep learning demonstrated excellent performance in image recognition. To implement our proposed detection method, we converted the malicious code into grayscale images. Then, the images were identified and classified using a convolutional neural network (CNN) that could extract the features of the malware images automatically. In addition, we utilized a bat algorithm to address the data imbalance among different malware families. To test our approach, we conducted a series of experiments on malware image data from Vision Research Lab. The experimental results demonstrated that our model achieved good accuracy and speed as compared with other malware detection models.

444 citations

Journal ArticleDOI
TL;DR: Both theoretical and numerical results show that optimizing the new criterion not only can resolve detailed modules that existing approaches cannot achieve, but also can correctly identify the number of communities.
Abstract: We propose a quantitative function for community partition---i.e., modularity density or $D$ value. We demonstrate that this quantitative function is superior to the widely used modularity $Q$ and also prove its equivalence with the objective function of the kernel $k$ means. Both theoretical and numerical results show that optimizing the new criterion not only can resolve detailed modules that existing approaches cannot achieve, but also can correctly identify the number of communities.

332 citations

Journal ArticleDOI
TL;DR: A blockchain based multi-WSN authentication scheme for IoT is proposed and the analysis of security and performance shows that the scheme has comprehensive security and better performance.
Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity authentication protocols usually rely on trusted third parties. However, many IoT environments do not allow such conditions, and are prone to single point failure. Blockchain technology with decentralization features provides a new solution for distributed IoT system. In this paper, a blockchain based multi-WSN authentication scheme for IoT is proposed. The nodes of IoT are divided into base stations, cluster head nodes and ordinary nodes according to their capability differences, which are formed to a hierarchical network. A blockchain network is constructed among different types of nodes to form a hybrid blockchain model, including local chain and public chain. In this hybrid model, nodes identity mutual authentication in various communication scenarios is realized, ordinary node identity authentication operation is accomplished by local blockchain, and cluster head node identity authentication are realized in public blockchain. The analysis of security and performance shows that the scheme has comprehensive security and better performance.

328 citations

Journal ArticleDOI
TL;DR: A novel recommendation model based on time correlation coefficient and an improved K-means with cuckoo search (CSK-me means) called TCCF is proposed, which can provide a higher quality recommendation by analyzing the user's behaviors and cluster similar users together for further quick and accurate recommendation.
Abstract: Recommendation technology is an important part of the Internet of Things (IoT) services, which can provide better service for users and help users get information anytime, anywhere. However, the traditional recommendation algorithms cannot meet user's fast and accurate recommended requirements in the IoT environment. In the face of a large-volume data, the method of finding neighborhood by comparing whole user information will result in a low recommendation efficiency. In addition, the traditional recommendation system ignores the inherent connection between user's preference and time. In reality, the interest of the user varies over time. Recommendation system should provide users accurate and fast with the change of time. To address this, we propose a novel recommendation model based on time correlation coefficient and an improved K-means with cuckoo search (CSK-means), called TCCF. The clustering method can cluster similar users together for further quick and accurate recommendation. Moreover, an effective and personalized recommendation model based on preference pattern (PTCCF) is designed to improve the quality of TCCF. It can provide a higher quality recommendation by analyzing the user's behaviors. The extensive experiments are conducted on two real datasets of MovieLens and Douban, and the precision of our model have improved about 5.2 percent compared with the MCoC model. Systematic experimental results have demonstrated our models TCCF and PTCCF are effective for IoT scenarios.

297 citations

Journal ArticleDOI
TL;DR: The breather, rogue wave, and semirational solutions of the HGNLS equation can be converted into the nonpulsating soliton solutions and the novel interactions between the rogue waves and other nonlinear waves are displayed.
Abstract: We study the nonlinear waves on constant backgrounds of the higher-order generalized nonlinear Schrodinger (HGNLS) equation describing the propagation of ultrashort optical pulse in optical fibers. We derive the breather, rogue wave, and semirational solutions of the HGNLS equation. Our results show that these three types of solutions can be converted into the nonpulsating soliton solutions. In particular, we present the explicit conditions for the transitions between breathers and solitons with different structures. Further, we investigate the characteristics of the collisions between the soliton and breathers. Especially, based on the semirational solutions of the HGNLS equation, we display the novel interactions between the rogue waves and other nonlinear waves. In addition, we reveal the explicit relation between the transition and the distribution characteristics of the modulation instability growth rate.

193 citations


Authors

Showing all 1236 results

NameH-indexPapersCitations
Fang-Xiang Wu434027566
Muhammad Hafeez241962280
Fanyong Meng1636711
Feng-Hua Qi1320652
Fanyong Meng1230349
Chunlin Li1246362
Li Shen1111794
Yang Ding1122296
Zhenping Li1015364
Hengliang Tang912182
Jun Liu947366
Fei Xue940771
Yang Cao812873
Li-Ping Tian724156
Liu Bingwu777183
Network Information
Related Institutions (5)
Beijing Jiaotong University
37.9K papers, 376K citations

81% related

Shanghai Maritime University
7.2K papers, 67.8K citations

79% related

Dalian Maritime University
12.3K papers, 109.2K citations

77% related

Chongqing Technology and Business University
3.3K papers, 52K citations

77% related

Beijing University of Technology
31.9K papers, 352.1K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202315
202213
2021100
2020116
201995
201865