Search Results - "Jiangtao Zhai"

Refine Results
  1. 1

    Enhancing fly ash utilization in backfill materials treated with CO2 carbonation under ambient conditions by Ngo, Ichhuy, Ma, Liqiang, Zhai, Jiangtao, Wang, Yangyang

    “…The environmental concerns resulting from coal-fired power generation that produces large amounts of CO2 and fly ash are of great interest. To mitigate, this…”
    Get full text
    Journal Article
  2. 2

    Continuous Extraction and Continuous Backfill Mining Method Using Carbon Dioxide Mineralized Filling Body to Preserve Shallow Water in Northwest China by Xu, Yujun, Ma, Liqiang, NGO, Ichhuy, Zhai, Jiangtao

    Published in Energies (Basel) (01-05-2022)
    “…The exploitation and utilization of coal resources are not only prone to causing water table lowering, but also produce a large amount of CO2 and coal-based…”
    Get full text
    Journal Article
  3. 3

    VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning by Islam, Faiz Ul, Liu, Guangjie, Zhai, Jiangtao, Liu, Weiwei

    Published in IEEE access (2021)
    “…Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number…”
    Get full text
    Journal Article
  4. 4

    Gangue grouting filling in subsequent space of coal green mining: methodology and case study by Yu, Kunpeng, Ma, Liqiang, Ngo, Ichhuy, Zhai, Jiangtao, Xu, Yujun, Zhao, Zhiyang, Wang, Hui, Wang, Dangliang

    Published in Environmental earth sciences (01-04-2024)
    “…Underground backfilling stands out as a crucial technological strategy for the eco-friendly and effective management of solid waste in mining operations…”
    Get full text
    Journal Article
  5. 5

    Quaternion Convolutional Neural Network for Color Image Classification and Forensics by Yin, Qilin, Wang, Jinwei, Luo, Xiangyang, Zhai, Jiangtao, Jha, Sunil Kr, Shi, Yun-Qing

    Published in IEEE access (2019)
    “…The convolutional neural network is widely popular for solving the problems of color image feature extraction. However, in the general network, the…”
    Get full text
    Journal Article
  6. 6

    Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework by Yang, Luhui, Liu, Guangjie, Dai, Yuewei, Wang, Jinwei, Zhai, Jiangtao

    Published in IEEE access (2020)
    “…Distinguishing malicious domain names generated by various domain generation algorithms (DGA) is critical for defending a network against sophisticated network…”
    Get full text
    Journal Article
  7. 7

    Sol–gel-stabilized CO2 foam for enhanced in-situ carbonation in foamed fly ash backfill materials by Ngo, Ichhuy, Ma, Liqiang, Zhao, Zhiyang, Zhai, Jiangtao, Yu, Kunpeng, Wu, Yonghui

    “…A novel highly stable aqueous foam was synthesized using CO 2 , sodium silicate (SS) and anionic surfactant of sodium dodecylbenzene sulfonate. The influence…”
    Get full text
    Journal Article
  8. 8

    A novel method for mobile application recognition in encrypted channels by Zhai, Jiangtao, Wang, Zihao, Duan, Kun, Wang, Tao

    Published in Electronic research archive (01-01-2024)
    “…In the field of mobile application traffic analysis, existing methods for accurately identifying encrypted traffic often encounter challenges due to the…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Study on the fluidity of foamed alkali-activated slag cementitious material (AASCM) by Yu, Kunpeng, Ma, Liqiang, Ngo, Ichhuy, Wang, Yangyang, Zhai, Jiangtao

    Published in Heliyon (01-11-2023)
    “…This study aims to investigate the evolution patterns of fluidity and rheological properties of AASCM under varying dosages of foaming agent and particle sizes…”
    Get full text
    Journal Article
  11. 11

    Study on the fluidity and mechanical properties of multi-source coal-based solid waste (MCSW) filling material by Yu, Kunpeng, Ma, Liqiang, Huo, Binbin, Ngo, Ichhuy, Wu, Yonghui, Zhai, Jiangtao

    “…The backfilling mining technology for multi-source coal-based solid waste (MCSW) aligns with the key challenges and emerging paradigms in the coal industry,…”
    Get full text
    Journal Article
  12. 12

    ODTC: An online darknet traffic classification model based on multimodal self-attention chaotic mapping features by Zhai, Jiangtao, Sun, Haoxiang, Xu, Chengcheng, Sun, Wenqian

    Published in Electronic research archive (01-01-2023)
    “…Darknet traffic classification is significantly important to network management and security. To achieve fast and accurate classification performance, this…”
    Get full text
    Journal Article
  13. 13

    Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation by Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Ghosal, Dipak

    “…In existing model-based timing channels, the requirement for the target model to be shared between the sender and the receiver limits the sender's ability to…”
    Get full text
    Journal Article
  14. 14

    Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid by Tian, Wen, Ji, Xiaopeng, Liu, Weiwei, Liu, Guangjie, Zhai, Jiangtao, Dai, Yuewei, Huang, Shuhua

    Published in IEEE access (2020)
    “…As one of the most critical infrastructure, the power grid has been increasingly threatened by network attacks, especially advanced persistent threats (APTs)…”
    Get full text
    Journal Article
  15. 15

    Prediction of the Adaptability of Using Continuous Extraction and Continuous Backfill Mining Method to Sequestrate CO2-A Case Study by Yujun Xu, Liqiang Ma, Ichhuy Ngo, Yangyang Wang, Jiangtao Zhai, Lixiao Hou

    Published in Minerals (Basel) (01-08-2022)
    “…The consumption of coal resources has caused an increase in CO2 emissions. A scientific concept that can realize CO2 sequestration, the harmless treatment of…”
    Get full text
    Journal Article
  16. 16

    Refined identification of hybrid traffic in DNS tunnels based on regression analysis by Bai, Huiwen, Liu, Guangjie, Zhai, Jiangtao, Liu, Weiwei, Ji, Xiaopeng, Yang, Luhui, Dai, Yuewei

    Published in ETRI journal (01-02-2021)
    “…DNS (Domain Name System) tunnels almost obscure the true network activities of users, which makes it challenging for the gateway or censorship equipment to…”
    Get full text
    Journal Article
  17. 17

    Study on Rock Fragments Penetration of Overlying Strata in Sublevel Caving by Yu, Kunpeng, Ma, Liqiang, Ngo, Ichhuy, Gao, Qiangqiang, Zhai, Jiangtao, Ren, Fengyu, Chitomb, Gideon

    Published in Mining, metallurgy & exploration (01-12-2023)
    “…The penetration of rock fragments of overlying strata causes advanced ore dilution during drawing. The results of numerical and physical experiments showed…”
    Get full text
    Journal Article
  18. 18

    Detection of Triple JPEG Compressed Color Images by Wang, Hao, Wang, Jinwei, Zhai, Jiangtao, Luo, Xiangyang

    Published in IEEE access (2019)
    “…In order to extend the detection of JPEG compressed color images to solve the real-life problem, three-class classification forensics of JPEG compressed color…”
    Get full text
    Journal Article
  19. 19

    Experimental Investigation on Hydrophobic Alteration of Mining Solid Waste Backfill Material by Zhiyang Zhao, Liqiang Ma, Ichhuy Ngo, Kunpeng Yu, Yujun Xu, Jiangtao Zhai, Qiangqiang Gao, Chengkun Peng, Dangliang Wang, Saad S. Alarifi, Mahabub Hasan Sajib

    Published in Minerals (Basel) (01-06-2024)
    “…To address the issues of corrosion weakening of solid-waste-based backfill material caused by mine water, a novel hydrophobic solid waste backfill (HSBF)…”
    Get full text
    Journal Article
  20. 20

    Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis by Yang, Luhui, Zhai, Jiangtao, Liu, Weiwei, Ji, Xiaopeng, Bai, Huiwen, Liu, Guangjie, Dai, Yuewei

    Published in Symmetry (Basel) (01-02-2019)
    “…In highly sophisticated network attacks, command-and-control (C&C) servers always use domain generation algorithms (DGAs) to dynamically produce several…”
    Get full text
    Journal Article