Lei Wu
YOU?
Author Swipe
View article: Design and application of two consistency verification methods for weather radar networks in the South China region
Design and application of two consistency verification methods for weather radar networks in the South China region Open
The observational consistency between ground-based weather radars significantly impacts the quality of mosaic products and severe convection identification products. The real-time monitoring of observational biases between radars can provi…
View article: Bibliometric analysis of surface electromyography trends in stroke rehabilitation research
Bibliometric analysis of surface electromyography trends in stroke rehabilitation research Open
Stroke, as a common clinical disease, has seen its mortality rate rising globally. Muscle dysfunction after stroke seriously affects the limb function of patients. Surface electromyography (sEMG), often referred to as the ECG of muscles, c…
View article: Design and Application of Two Consistency Verification Models for Weather Radar Networks in the South China Region
Design and Application of Two Consistency Verification Models for Weather Radar Networks in the South China Region Open
The observational consistency between ground-based weather radars significantly impacts the quality of mosaic products and severe convection identification products. The real-time monitoring of observational biases between radars can provi…
View article: Weather Radar Long-sequence Product Dataset in China
Weather Radar Long-sequence Product Dataset in China Open
Weather radar plays a crucial role in the monitoring, forecasting, and early warning of severe convective weather. With the widespread application of artificial intelligence technology in the meteorological field, the demand for high-quali…
View article: Simulations on the collision between debris stream and outer dusty torus: a possible channel for forming fast-rise and long-delayed radio outburst in tidal disruption events
Simulations on the collision between debris stream and outer dusty torus: a possible channel for forming fast-rise and long-delayed radio outburst in tidal disruption events Open
The geometrically thick dusty torus structure is believed to exist in the nuclear region of galaxies (especially in active galactic nuclei, AGNs). The debris stream from a tidal disruption event (TDE) will possibly collide with the dusty t…
View article: Privacy-preserving location-based traffic density monitoring
Privacy-preserving location-based traffic density monitoring Open
Traffic density monitoring is an important method to predict road traffic conditions, which can bring some convenience to people's travel in daily life. The common method of traffic density monitoring is to collect and process the location…
View article: Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC
Privacy-Preserving Cancelable Biometric Authentication Based on RDM and ECC Open
Biometric authentication is getting increasingly popular and demands a wide range of solutions to against increasing cybercrimes and digital identity thefts. This paper proposes a new privacy-preserving cancelable biometric authentication …
View article: VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts Open
WebAssemly is an emerging runtime for Web applications and has been supported in almost all browsers. Recently, WebAssembly is further regarded to be a the next-generation environment for blockchain applications, and has been adopted by Et…
View article: Mobile User Location Inference Attacks Fusing with Multiple Background Knowledge in Location-Based Social Networks
Mobile User Location Inference Attacks Fusing with Multiple Background Knowledge in Location-Based Social Networks Open
Location-based social networks have been widely used. However, due to the lack of effective and safe data management, a large number of privacy disclosures commonly occur. Thus, academia and industry have needed to focus more on location p…
View article: Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud Open
Due to the rapid development of new technologies such as cloud computing, Internet of Things (IoT), and mobile Internet, the data volumes are exploding. Particularly, in the industrial field, a large amount of data is generated every day. …
View article: Calibration method of vision measurement system for ceramic billet grinding robot
Calibration method of vision measurement system for ceramic billet grinding robot Open
The accuracy of the grinding robot's vision measurement system directly affects the machining accuracy. This study proposes a calibration method of the visual measurement system installed on the fourth joint of the ceramic billet grinding …
View article: Integrity Audit of Shared Cloud Data with Identity Tracking
Integrity Audit of Shared Cloud Data with Identity Tracking Open
More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud sto…
View article: Accountable Outsourcing Location-Based Services With Privacy Preservation
Accountable Outsourcing Location-Based Services With Privacy Preservation Open
With the enhancement of the positioning function of mobile devices and the upgrade of communication networks, location-based service (LBS) has become an important application of mobile devices. Among the numerous researches on location pri…
View article: Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications
Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications Open
With the continuous development of the Internet of Things (IoT), various IoT devices create an incomprehensible amount of data all the time. However, the IoT devices have limited computing and storage resources and are difficult to process…
View article: Approximate Similarity Measurements on Multi-Attributes Trajectories Data
Approximate Similarity Measurements on Multi-Attributes Trajectories Data Open
With the development of global positioning technology, sensor networks, and smart mobile terminal, a large number of trajectory data are accumulated. Trajectory data contains a wealth of information, including spatiality, time series, and …
View article: Energy-efficient Walking Mechanism for Gait Rehabilitation
Energy-efficient Walking Mechanism for Gait Rehabilitation Open
Human inborn walking system has been evolved well-suited to walk in a manner that conserves energy and fast to adapt to new walking conditions in an energy efficient way. Deviations from the normal walking pattern increase the extra energy…
View article: Research of Multi-service Fulfillment of Rail Train-Ground Communication Based on TD-LTE Technology
Research of Multi-service Fulfillment of Rail Train-Ground Communication Based on TD-LTE Technology Open
In order to study the feasibility of using TD-LTE technology to carry out rail transit integrated service bearer, analyze the bearer demand of vehicle-to-ground communication service and the technical characteristics of TD-LTE, this paper …
View article: The Optimal Collision Avoidance Trajectory Planning of Redundant Manipulators in the Process of Grinding Ceramic Billet Surface
The Optimal Collision Avoidance Trajectory Planning of Redundant Manipulators in the Process of Grinding Ceramic Billet Surface Open
The intelligent manufacturing system (IMS) is widely used in the surface machining of the workpiece. In the process of ceramic surface grinding, the intelligent machine (manipulator) in IMS is required to automatically plan the collision a…