Search Results - "Shen, Congqi"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Distributed low-carbon energy management method for port microgrid based on we-energies under polymorphic network by Teng, Fei, Wang, Jianyuan, Luo, Hanguang, Zhang, Qing, Shen, Congqi

    Published in Frontiers in energy research (22-07-2022)
    “…In order to reduce port pollution and carbon emissions and improve the utilization rate of clean energy, a port microgrid based on we-energies (WEs) and its…”
    Get full text
    Journal Article
  2. 2

    Intelligent Orchestrating of IoT Microservices Based on Reinforcement Learning by WU, Yuqin, SHEN, Congqi, CHEN, Shuhan, WU, Chunming, LI, Shunbin, WEI, Ruan

    Published in Chinese Journal of Electronics (01-09-2022)
    “…With the recent increase in the number of Internet of things (IoT) services, an intelligent scheduling strategy is needed to manage these services. In this…”
    Get full text
    Journal Article
  3. 3

    Anoectochilus roxburghii polysaccharide reduces D-GalN/LPS-induced acute liver injury by regulating the activation of multiple inflammasomes by Yan, Yulu, Ye, Xiqi, Huang, Chunqing, Wu, Junjun, Liu, Yunbiao, Zheng, Pingping, Shen, Congqi, Bai, Zhaofang, Tingming, Shen

    Published in Journal of pharmacy and pharmacology (03-09-2024)
    “…Abstract Background Acute liver injury (ALI) is a serious syndrome with a high mortality rate due to viral infection, toxic exposure, and autoimmunity, and its…”
    Get full text
    Journal Article
  4. 4

    Research on polymorphic network application technology oriented intelligent manufacturing by Zou, Tao, Zhang, Huifeng, Gao, Wanxin, Xu, Qi, Shen, Congqi, Zhu, Jun, Pan, Zhongxia, Guo, Xingchang

    Published in Dianxin Kexue (01-06-2023)
    “…The rise of intelligent manufacturing has induced many new demands on network technology. The polymorphic network separates the network technology from the…”
    Get full text
    Journal Article
  5. 5

    Fast DDoS Traffic Throttling and Normal Traffic Permitting in SDN-IoT: A Deep Reinforcement Learning Approach by Shen, Congqi, Gao, Wanxin, Xu, Qi, Zou, Tao, Zhu, Jun, Zhang, Ruyun

    “…Recent Internet of Things (IoT) security incidents indicate that current IoT defense methods are insufficient to defend against DDoS attacks due to a lack of…”
    Get full text
    Conference Proceeding
  6. 6

    SDSSE: A Self-Driven RPC Load Balancing Method in Datacenter by Chen, Shuhan, Wu, Chunming, Shen, Congqi

    “…Remote Procedure Calls (RPC) load balancing is crucial to maximize server resource utilization and reduce tail latency in data center. Existing load balancing…”
    Get full text
    Conference Proceeding
  7. 7

    DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN by Chen, Shuhan, Shen, Congqi, Wu, Chunming, Shen, Yi

    “…The router throttling mechanism provides us a chance to prevent DDoS attack proactively through rate-limiting suspicious traffic before effective detection…”
    Get full text
    Conference Proceeding
  8. 8

    Intelligent DDoS Detection in Botnet Combined with Packet-Level Features under SDN by Chen, Shuhan, Shen, Congqi, Yu, Danrui, Wu, Yuqin, Wu, Chunming

    “…Botnets provide a fundamental infrastructure for various kinds of network attacks, such as DDoS attack, etc. Detecting DDoS attack in botnet is a long-standing…”
    Get full text
    Conference Proceeding
  9. 9

    Continuous-time Value-Iteration-Based Learning for Constrained-Input Nonlinear Nonzero-Sum Game by Xiao, Geyang, Liang, Yuan, Yan, Linlin, Yi, Xiaoyu, Shen, Congqi, Zhang, Huifeng

    “…A continuous-time value iteration based learning method is proposed for constrained-input nonlinear nonzero-sum game in this paper. Most existing studies were…”
    Get full text
    Conference Proceeding
  10. 10

    An LSTM based Malicious Traffic Attack Detection in Industrial Internet by Shen, Congqi, Xiao, Geyang, Yao, Shaofeng, Zhou, Boyang, Pan, Zhongxia, Zhang, Hong

    “…Current Industrial Internet faces serious threats where attackers propagate malicious flows, resulting in communication failures in the Industrial Internet. In…”
    Get full text
    Conference Proceeding
  11. 11

    Value Iteration Algorithm for Nonlinear Continuous-time Nonzero-Sum Games by Xiao, Geyang, Zhang, Ruyun, Zou, Tao, Li, Shunbin, Zhou, Boyang, Shen, Congqi

    “…An adaptive dynamic programming value iteration algorithm is designed to solve nonlinear continuous-time nonzero-sum games in this paper. Since existing…”
    Get full text
    Conference Proceeding
  12. 12

    Research on Energy Optimization of Energy Storage System in Reducing Load Variance of Power Station by Peng, Daogang, Hou, Qingran, Wang, Zhixin, Shi, Shanshan, Shao, Yuying, Shen, Congqi, Yao, Jun

    “…With the large-scale development of electric vehicles, electric vehicle charging loads will account for an increasing proportion of future electric loads…”
    Get full text
    Conference Proceeding
  13. 13

    A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense by Shen, Congqi, Chen, Shuang-Xi, Wu, Chun-Ming

    “…Cyberspace Mimicry Defense (CMD) has been widely used to achieve intrusion prevention against unknown system vulnerabilities or backdoors. The multi-ruling…”
    Get full text
    Conference Proceeding