Search Results - "Shen, Congqi"
-
1
Distributed low-carbon energy management method for port microgrid based on we-energies under polymorphic network
Published in Frontiers in energy research (22-07-2022)“…In order to reduce port pollution and carbon emissions and improve the utilization rate of clean energy, a port microgrid based on we-energies (WEs) and its…”
Get full text
Journal Article -
2
Intelligent Orchestrating of IoT Microservices Based on Reinforcement Learning
Published in Chinese Journal of Electronics (01-09-2022)“…With the recent increase in the number of Internet of things (IoT) services, an intelligent scheduling strategy is needed to manage these services. In this…”
Get full text
Journal Article -
3
Anoectochilus roxburghii polysaccharide reduces D-GalN/LPS-induced acute liver injury by regulating the activation of multiple inflammasomes
Published in Journal of pharmacy and pharmacology (03-09-2024)“…Abstract Background Acute liver injury (ALI) is a serious syndrome with a high mortality rate due to viral infection, toxic exposure, and autoimmunity, and its…”
Get full text
Journal Article -
4
Research on polymorphic network application technology oriented intelligent manufacturing
Published in Dianxin Kexue (01-06-2023)“…The rise of intelligent manufacturing has induced many new demands on network technology. The polymorphic network separates the network technology from the…”
Get full text
Journal Article -
5
Fast DDoS Traffic Throttling and Normal Traffic Permitting in SDN-IoT: A Deep Reinforcement Learning Approach
Published in ICC 2023 - IEEE International Conference on Communications (28-05-2023)“…Recent Internet of Things (IoT) security incidents indicate that current IoT defense methods are insufficient to defend against DDoS attacks due to a lack of…”
Get full text
Conference Proceeding -
6
SDSSE: A Self-Driven RPC Load Balancing Method in Datacenter
Published in 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys) (17-12-2023)“…Remote Procedure Calls (RPC) load balancing is crucial to maximize server resource utilization and reduce tail latency in data center. Existing load balancing…”
Get full text
Conference Proceeding -
7
DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN
Published in 2022 IEEE International Performance, Computing, and Communications Conference (IPCCC) (11-11-2022)“…The router throttling mechanism provides us a chance to prevent DDoS attack proactively through rate-limiting suspicious traffic before effective detection…”
Get full text
Conference Proceeding -
8
Intelligent DDoS Detection in Botnet Combined with Packet-Level Features under SDN
Published in 2021 International Symposium on Networks, Computers and Communications (ISNCC) (31-10-2021)“…Botnets provide a fundamental infrastructure for various kinds of network attacks, such as DDoS attack, etc. Detecting DDoS attack in botnet is a long-standing…”
Get full text
Conference Proceeding -
9
Continuous-time Value-Iteration-Based Learning for Constrained-Input Nonlinear Nonzero-Sum Game
Published in 2022 4th International Conference on Data-driven Optimization of Complex Systems (DOCS) (28-10-2022)“…A continuous-time value iteration based learning method is proposed for constrained-input nonlinear nonzero-sum game in this paper. Most existing studies were…”
Get full text
Conference Proceeding -
10
An LSTM based Malicious Traffic Attack Detection in Industrial Internet
Published in 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC (18-06-2021)“…Current Industrial Internet faces serious threats where attackers propagate malicious flows, resulting in communication failures in the Industrial Internet. In…”
Get full text
Conference Proceeding -
11
Value Iteration Algorithm for Nonlinear Continuous-time Nonzero-Sum Games
Published in 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC (18-06-2021)“…An adaptive dynamic programming value iteration algorithm is designed to solve nonlinear continuous-time nonzero-sum games in this paper. Since existing…”
Get full text
Conference Proceeding -
12
Research on Energy Optimization of Energy Storage System in Reducing Load Variance of Power Station
Published in 2020 5th International Conference on Power and Renewable Energy (ICPRE) (12-09-2020)“…With the large-scale development of electric vehicles, electric vehicle charging loads will account for an increasing proportion of future electric loads…”
Get full text
Conference Proceeding -
13
A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense
Published in 2019 International Symposium on Networks, Computers and Communications (ISNCC) (01-06-2019)“…Cyberspace Mimicry Defense (CMD) has been widely used to achieve intrusion prevention against unknown system vulnerabilities or backdoors. The multi-ruling…”
Get full text
Conference Proceeding