Zhaoquan Gu

ORCID: 0000-0001-7546-852X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Advanced Graph Neural Networks
  • Topic Modeling
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Neural Network Applications
  • Optimization and Search Problems
  • Internet Traffic Analysis and Secure E-voting
  • Data Quality and Management
  • Energy Efficient Wireless Sensor Networks
  • Recommender Systems and Techniques
  • Information and Cyber Security
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Privacy-Preserving Technologies in Data
  • Digital Media Forensic Detection
  • Cooperative Communication and Network Coding
  • Mobile Ad Hoc Networks
  • Natural Language Processing Techniques
  • Bacillus and Francisella bacterial research
  • Domain Adaptation and Few-Shot Learning

Harbin Institute of Technology
2022-2024

Shenzhen Institute of Information Technology
2022-2024

Peng Cheng Laboratory
2020-2024

Guangzhou University
2017-2023

National University of Defense Technology
2022

Tsinghua University
2012-2021

Zhejiang University
2021

University of California, Santa Cruz
2021

Guangzhou Institute of Advanced Technology
2020

University of Hong Kong
2016-2018

Deep Residual Networks have recently been shown to significantly improve the performance of neural networks trained on ImageNet, with results beating all previous methods this dataset by large margins in image classification task. However, meaning these impressive numbers and their implications for future research are not fully understood yet. In survey, we will try explain what are, how they achieve excellent results, why successful implementation practice represents a significant advance...

10.3390/app12188972 article EN cc-by Applied Sciences 2022-09-07

Different from ship detection synthetic aperture radar (SDSAR) and spaceborne optical images (SDSOI), visual image (SDVI) has better accuracy real-time performance, which can be widely used in port management, cross-border detection, autonomous ship, safe navigation, other applications. In this paper, we proposed a new SDVI algorithm, named enhanced YOLO v3 tiny network for detection. The algorithm video surveillance to realize the accurate classification positioning of six types ships...

10.1109/access.2021.3053956 article EN cc-by IEEE Access 2021-01-01

This paper provides an extensive and complete survey on the process of detecting preventing various types IoT-based security attacks. It is designed for software developers, researchers, practitioners in Internet Things field who aim to understand these For each entry identified from list, a brief description provided along with references where more information can be found. However, We surveyed current state-of-the-art IoT solutions focused four main aspects: (1) handpicking representative...

10.1155/2022/8669348 article EN cc-by Wireless Communications and Mobile Computing 2022-08-03

Group recommendation has attracted significant research efforts for its importance in benefiting a group of users. This paper investigates the Recommendation problem from novel aspect, which tries to maximize satisfaction each member while minimizing unfairness between them. In this work, we present several semantics individual utility and propose two concepts social welfare fairness modeling overall utilities balance members. We formulate as multiple objective optimization show that it is...

10.1145/3109859.3109887 article EN 2017-08-24

With the fast development of Internet Things (IoT) technologies, more IoT devices are currently connected with Internet, resulting in exchange information. However, data privacy and security threats have become emerging challenges IoT. In this paper, we concerned about image transmission green Image encryption algorithms for faced two challenges: 1) To save cost, always very low computing power, so they cannot support high-precision 2) The algorithm deployed on device should be efficient to...

10.1109/tgcn.2021.3095707 article EN IEEE Transactions on Green Communications and Networking 2021-07-08

Convolutional neural networks, in which each layer receives features from the previous layer(s) and then aggregates/abstracts higher level them, are widely adopted for image classification. To avoid information loss during feature aggregation/abstraction fully utilize lower features, we propose a novel decision fusion module (DFM) making an intermediate based on current fuse its results with original before passing them to next layers. This is devised determine auxiliary category...

10.1109/tnnls.2022.3196129 article EN IEEE Transactions on Neural Networks and Learning Systems 2022-08-11

Rendezvous is a fundamental process in Cognitive Radio Networks, through which user establishes link to communicate with neighbor on common channel. Most previous solutions use either central controller or Common Control Channel (CCC) simplify the problem, are inflexible and vulnerable faults attacks. Some blind rendezvous algorithms have been proposed that rely no centralization. Hopping (CH) representative technique used rendezvous, each hops among available channels according pre-defined...

10.1109/sahcn.2013.6645007 article EN 2013-06-01

Deep neural networks (DNNs) have been widely adopted but they are vulnerable to intentionally crafted adversarial examples. Various attack methods against DNNs proposed, yet there still lacks theoretical explanation of In this paper, we aim understand examples from the attacking process and assume adding perturbations key/sensitive regions image could fool classification DNNs. We propose gradient shielding verify assumption which ignores insensitive information during generating...

10.1109/tnse.2020.2996738 article EN IEEE Transactions on Network Science and Engineering 2020-05-22

The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it been most important objective. With effective prevention methods, epidemic gradually under some countries is essential ensure safe work resumption future. Although approaches are proposed measure people's healthy conditions, such as filling health information forms or evaluating travel records, they cannot provide a fine-grained assessment of risk. In this paper, we propose novel risk method...

10.1109/tnse.2021.3058762 article EN IEEE Transactions on Network Science and Engineering 2021-02-13

Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances in deep learning have considerably boosted development of speech signal processing techniques. or has been widely adopted such applications as smart locks, vehicle-mounted systems, and financial services. However, neural network-based systems (SRSs) are susceptible to adversarial attacks, which fool system make wrong decisions by small perturbations, this drawn attention researchers security...

10.3390/electronics11142183 article EN Electronics 2022-07-12

Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over last few years. The technology provides a new paradigm design interconnected distributed nodes Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles smart cities. process hierarchy current UAV-assisted is also becoming multifaceted as are connected, requiring accessing exchanging information, performing...

10.3390/drones6120377 article EN cc-by Drones 2022-11-25

Adversarial attacks have been successfully extended to the field of point clouds. Besides applying common perturbation guided by gradient, adversarial on clouds can be conducted directional perturbations, e.g., along normal and tangent plane. In this article, we first investigate whether with these two orthogonal perturbations are more imperceptible than that gradient-aware perturbation. Second, deeper difference between they applicable same scenarios. Third, based verification results above...

10.1109/jiot.2022.3222159 article EN IEEE Internet of Things Journal 2022-11-15

With the rapid development of information technologies, security cyberspace has become increasingly serious. Network intrusion detection is a practical scheme to protect network systems from cyber attacks. However, as new vulnerabilities and unknown attack types are constantly emerging, only few samples such attacks can be captured for analysis, which cannot handled by existing methods deployed in real systems. To handle this problem, we propose few-shot class-incremental learning method...

10.1109/tnsm.2023.3332284 article EN IEEE Transactions on Network and Service Management 2023-11-13

Deep neural networks (DNNs) can improve the image analysis and interpretation of remote sensing technology by extracting valuable information from images, has extensive applications such as military affairs, agriculture, environment, transportation, urban division. The DNNs for object detection identify analyze objects in images through fruitful features which improves efficiency processing enables recognition large-scale images. However, many studies have shown that deep are vulnerable to...

10.3390/rs15040885 article EN cc-by Remote Sensing 2023-02-05

The Controller Area Network (CAN) is a bus protocol widely used in intelligent connected vehicles for communication between electronic and systems. However, the continuous increase inter- intra-vehicle traffic makes CAN vulnerable to cyber-attacks, including unknown attacks that have never been seen before. Previous studies either use closed set scenarios misclassify as known classes with high confidence, or models calculate thresholds identify ignoring relationship feature representation...

10.1109/mnet.2024.3367303 article EN IEEE Network 2024-02-19

Graph Retrieval Augmented Generation (GRAG) is a novel paradigm that takes the naive RAG system step further by integrating graph information, such as knowledge (KGs), into large-scale language models (LLMs) to mitigate hallucination. However, existing GRAG still encounter limitations: 1) simple paradigms usually fail with complex problems due narrow and shallow correlations capture from KGs 2) methods of strong coupling tend be high computation cost time consuming if dense. In this paper,...

10.48550/arxiv.2501.14300 preprint EN arXiv (Cornell University) 2025-01-24

Graph Retrieval Augmented Generation (GRAG) is a novel paradigm that takes the naive RAG system step further by integrating graph information, such as knowledge (KGs), into large-scale language models (LLMs) to mitigate hallucination. However, existing GRAG still encounter limitations: 1) simple paradigms usually fail with complex problems due narrow and shallow correlations capture from KGs 2) methods of strong coupling tend be high computation cost time consuming if dense. In this paper,...

10.1609/aaai.v39i23.34635 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11
Coming Soon ...