Search Results - "Jiangtao Zhai"
-
1
Enhancing fly ash utilization in backfill materials treated with CO2 carbonation under ambient conditions
Published in International journal of mining science and technology (01-03-2023)“…The environmental concerns resulting from coal-fired power generation that produces large amounts of CO2 and fly ash are of great interest. To mitigate, this…”
Get full text
Journal Article -
2
Continuous Extraction and Continuous Backfill Mining Method Using Carbon Dioxide Mineralized Filling Body to Preserve Shallow Water in Northwest China
Published in Energies (Basel) (01-05-2022)“…The exploitation and utilization of coal resources are not only prone to causing water table lowering, but also produce a large amount of CO2 and coal-based…”
Get full text
Journal Article -
3
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
Published in IEEE access (2021)“…Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number…”
Get full text
Journal Article -
4
Gangue grouting filling in subsequent space of coal green mining: methodology and case study
Published in Environmental earth sciences (01-04-2024)“…Underground backfilling stands out as a crucial technological strategy for the eco-friendly and effective management of solid waste in mining operations…”
Get full text
Journal Article -
5
Quaternion Convolutional Neural Network for Color Image Classification and Forensics
Published in IEEE access (2019)“…The convolutional neural network is widely popular for solving the problems of color image feature extraction. However, in the general network, the…”
Get full text
Journal Article -
6
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework
Published in IEEE access (2020)“…Distinguishing malicious domain names generated by various domain generation algorithms (DGA) is critical for defending a network against sophisticated network…”
Get full text
Journal Article -
7
Sol–gel-stabilized CO2 foam for enhanced in-situ carbonation in foamed fly ash backfill materials
Published in Geomechanics and geophysics for geo-energy and geo-resources. (01-12-2024)“…A novel highly stable aqueous foam was synthesized using CO 2 , sodium silicate (SS) and anionic surfactant of sodium dodecylbenzene sulfonate. The influence…”
Get full text
Journal Article -
8
A novel method for mobile application recognition in encrypted channels
Published in Electronic research archive (01-01-2024)“…In the field of mobile application traffic analysis, existing methods for accurately identifying encrypted traffic often encounter challenges due to the…”
Get full text
Journal Article -
9
Corrigendum to “Study on the fluidity of foamed alkali-activated slag cementitious material (AASCM)” [Heliyon 9(11) November 2023 e22277]
Published in Heliyon (01-09-2024)Get full text
Journal Article -
10
Study on the fluidity of foamed alkali-activated slag cementitious material (AASCM)
Published in Heliyon (01-11-2023)“…This study aims to investigate the evolution patterns of fluidity and rheological properties of AASCM under varying dosages of foaming agent and particle sizes…”
Get full text
Journal Article -
11
Study on the fluidity and mechanical properties of multi-source coal-based solid waste (MCSW) filling material
Published in Journal of materials research and technology (01-01-2024)“…The backfilling mining technology for multi-source coal-based solid waste (MCSW) aligns with the key challenges and emerging paradigms in the coal industry,…”
Get full text
Journal Article -
12
ODTC: An online darknet traffic classification model based on multimodal self-attention chaotic mapping features
Published in Electronic research archive (01-01-2023)“…Darknet traffic classification is significantly important to network management and security. To achieve fast and accurate classification performance, this…”
Get full text
Journal Article -
13
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation
Published in IEEE transactions on information forensics and security (01-04-2016)“…In existing model-based timing channels, the requirement for the target model to be shared between the sender and the receiver limits the sender's ability to…”
Get full text
Journal Article -
14
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid
Published in IEEE access (2020)“…As one of the most critical infrastructure, the power grid has been increasingly threatened by network attacks, especially advanced persistent threats (APTs)…”
Get full text
Journal Article -
15
Prediction of the Adaptability of Using Continuous Extraction and Continuous Backfill Mining Method to Sequestrate CO2-A Case Study
Published in Minerals (Basel) (01-08-2022)“…The consumption of coal resources has caused an increase in CO2 emissions. A scientific concept that can realize CO2 sequestration, the harmless treatment of…”
Get full text
Journal Article -
16
Refined identification of hybrid traffic in DNS tunnels based on regression analysis
Published in ETRI journal (01-02-2021)“…DNS (Domain Name System) tunnels almost obscure the true network activities of users, which makes it challenging for the gateway or censorship equipment to…”
Get full text
Journal Article -
17
Study on Rock Fragments Penetration of Overlying Strata in Sublevel Caving
Published in Mining, metallurgy & exploration (01-12-2023)“…The penetration of rock fragments of overlying strata causes advanced ore dilution during drawing. The results of numerical and physical experiments showed…”
Get full text
Journal Article -
18
Detection of Triple JPEG Compressed Color Images
Published in IEEE access (2019)“…In order to extend the detection of JPEG compressed color images to solve the real-life problem, three-class classification forensics of JPEG compressed color…”
Get full text
Journal Article -
19
Experimental Investigation on Hydrophobic Alteration of Mining Solid Waste Backfill Material
Published in Minerals (Basel) (01-06-2024)“…To address the issues of corrosion weakening of solid-waste-based backfill material caused by mine water, a novel hydrophobic solid waste backfill (HSBF)…”
Get full text
Journal Article -
20
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis
Published in Symmetry (Basel) (01-02-2019)“…In highly sophisticated network attacks, command-and-control (C&C) servers always use domain generation algorithms (DGAs) to dynamically produce several…”
Get full text
Journal Article