Yue Li

ORCID: 0000-0002-0222-9859
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Network Time Synchronization Technologies
  • Geology and Paleoclimatology Research
  • Soil erosion and sediment transport
  • Digital Transformation in Industry
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Aeolian processes and effects
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Video Coding and Compression Technologies
  • Hydrological Forecasting Using AI
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • Cloud Data Security Solutions
  • Flood Risk Assessment and Management
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • Natural Language Processing Techniques
  • Cloud Computing and Resource Management
  • Geochemistry and Geologic Mapping
  • Optical measurement and interference techniques

Xinjiang University
2025

Institute of Earth Environment
2017-2024

Chinese Academy of Sciences
2015-2024

University of Chinese Academy of Sciences
2018-2024

Nanjing University of Posts and Telecommunications
2024

Technical Institute of Physics and Chemistry
2020-2024

Shenyang Institute of Computing Technology (China)
2019-2023

Zhejiang A & F University
2023

Sichuan University of Science and Engineering
2023

Kunming Institute of Botany
2023

The rise of big data age in the Internet has led to explosive growth size. However, trust issue become biggest problem data, leading difficulty safe circulation and industry development. blockchain technology provides a new solution this by combining non-tampering, traceable features with smart contracts that automatically execute default instructions. In paper, we present credible sharing model based on contract ensure resources.

10.1109/bigcom.2017.31 article EN 2017-08-01

With the widespread use of industrial Internet technology in intelligent production lines, number task requests generated by smart terminals is growing exponentially. Achieving rapid response to these massive tasks becomes crucial. In this paper we focus on multi-objective scheduling problem lines and propose a strategy based priority. First, set up cloud-fog computing architecture for built function scheduling, which minimizes service delay energy consumption tasks. addition, improved...

10.3390/s22041555 article EN cc-by Sensors 2022-02-17

Predicting land susceptibility to wind erosion is necessary mitigate the negative impacts of on soil fertility, ecosystems, and human health. This study first attempt model hazards through application a novel approach, graph convolutional networks (GCNs), as deep learning models with Monte Carlo dropout. approach applied Semnan Province in arid central Iran, an area vulnerable dust storms climate change. We mapped 15 potential factors controlling erosion, including climatic variables,...

10.3389/fenvs.2023.1187658 article EN cc-by Frontiers in Environmental Science 2023-05-09

Spatial accurate mapping of land susceptibility to wind erosion is necessary mitigate its destructive consequences. In this research, for the first time, we developed a novel methodology based on deep learning (DL) and active (AL) models, their combination (e.g., recurrent neural network (RNN), RNN-AL, gated units (GRU), GRU-AL) three interpretation techniques synergy matrix, SHapley Additive exPlanations (SHAP) decision plot, accumulated local effects (ALE) plot) map global erosion....

10.1038/s41598-024-70125-y article EN cc-by-nc-nd Scientific Reports 2024-08-15

Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention both academia industry due to the sensitiveness system. In past decade, extensive research has been carried out on these security issues, but no single study exists that addresses them adequately, especially for some important properties, such as user anonymity forward secrecy. As a step towards this direction, paper, authors propose lightweight three-factor anonymous authentication...

10.4018/joeuc.20210501.oa1 article EN Journal of Organizational and End User Computing 2021-04-05

10.1109/icassp49660.2025.10890136 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Large language models (LLMs) introduce new security risks, but there are few comprehensive evaluation suites to measure and reduce these risks. We present BenchmarkName, a novel benchmark quantify LLM risks capabilities. two areas for testing: prompt injection code interpreter abuse. evaluated multiple state-of-the-art (SOTA) LLMs, including GPT-4, Mistral, Meta Llama 3 70B-Instruct, Code Llama. Our results show that conditioning away risk of attack remains an unsolved problem; example, all...

10.48550/arxiv.2404.13161 preprint EN arXiv (Cornell University) 2024-04-19

This paper proposes a functional safety and information security protection mechanism based on blockchain technology. The design of the basic level integration structure CPS distributed architecture related measures are introduced. An effective communication judgment error threshold is proposed, which stored judged by smart contract. And refund transaction with clock proposed to ensure execution mechanism. article takes cyber physical machine tool system as an example describe SIL method...

10.1109/access.2020.2967453 article EN cc-by IEEE Access 2020-01-01

Rolling bearing fault diagnosis is of great significance to the safe and reliable operation manufacturing equipment. In actual complex environment, collected signals usually contain a large amount noises from resonances environment other components, resulting in nonlinear characteristics data. Existing deep-learning-based solutions for perform poorly classification performance under noises. To address above problems, this paper proposes an improved dilated-convolutional-neural network-based...

10.3390/s23125532 article EN cc-by Sensors 2023-06-13

The kernel of Torreya grandis cv. 'Merrillii' (Cephalotaxaceae) is a rare nut with variety bioactive compounds and high economic value. β-sitosterol not only the most abundant plant sterol but also has various biological effects, such as antimicrobial, anticancer, anti-inflammatory, lipid-lowering, antioxidant, antidiabetic activities. In this study, squalene synthase gene from T. grandis, TgSQS, was identified functionally characterized. TgSQS encodes deduced protein 410 amino acids....

10.3389/fpls.2023.1136643 article EN cc-by Frontiers in Plant Science 2023-06-20

Abstract Blockchain-based cloud application (BCP) is an emerging architecture. By moving trust-critical functions onto blockchain, BCP offers unprecedented function transparency and data integrity. Ethereum by far the most popular blockchain platform chosen for BCP. In Ethereum, special programs named smart contracts are often used to implement key components design, users can send transactions contracts, which will automatically lead code execution state modification. However, unlike...

10.1186/s13677-020-00176-9 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2020-06-30

10.1016/j.simpat.2008.04.007 article EN Simulation Modelling Practice and Theory 2008-04-18

In recent years, as blockchain adoption has been expanding across a wide range of domains, e.g., digital asset, supply chain finance, etc., the confidentiality smart contracts is now fundamental demand for practical applications. However, while new privacy protection techniques keep coming out, how existing ones can best fit development settings little studied. Suffering from limited architectural support in terms programming interfaces, state-of-the-art solutions hardly reach general...

10.1109/icdcs51616.2021.00111 article EN 2021-07-01

With the development of intelligent manufacturing, traditional industrial communication systems based on field bus and Ethernet can hardly meet its common requirements for complexity scalability in foreseeable future. In contrast, wireless network is not mature yet, there are still plenty problems velocity, stability, security other aspects. this paper, a model to enhance comprehensive performance networks proposed existing scheduling methods Time-sensitive networks. The composed 3 parts,...

10.1109/iccc51575.2020.9345100 article EN 2020-12-11

This paper proposes a novel method for layered media transmission in mobile broadcast systems, which is referred to as the layer-mixed forward error correction (FEC). Unlike existing unequal protection and layer-aware FEC decode each layer symbols with probability, new approach capable of decoding data deterministically long enough are received corresponding specific layer. The lower always decoded prior upper layers, facilitates delivery scalable stream, especially TV services heterogeneous...

10.1109/tbc.2016.2630309 article EN IEEE Transactions on Broadcasting 2016-12-09
Coming Soon ...