Yuhao Zhu

ORCID: 0000-0002-0776-3719
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Biometric Identification and Security
  • Integrated Circuits and Semiconductor Failure Analysis
  • Face recognition and analysis
  • Domain Adaptation and Few-Shot Learning
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Neural Network Applications
  • Advanced Graph Neural Networks
  • Bacillus and Francisella bacterial research
  • Spam and Phishing Detection
  • Gait Recognition and Analysis
  • Railway Engineering and Dynamics
  • Transport and Logistics Innovations
  • Transportation Systems and Logistics
  • Text and Document Classification Technologies
  • Industrial Vision Systems and Defect Detection
  • Brain Tumor Detection and Classification
  • Railway Systems and Energy Efficiency
  • Autonomous Vehicle Technology and Safety
  • Data Visualization and Analytics
  • Digital Media Forensic Detection
  • Telecommunications and Broadcasting Technologies
  • Parallel Computing and Optimization Techniques
  • Internet Traffic Analysis and Secure E-voting

China Academy of Railway Sciences
2022-2024

University of Maryland, College Park
2024

Shanghai Jiao Tong University
2019-2022

National University of Singapore
2022

Fudan University
2022

Institute of Automation
2021

Chinese Academy of Sciences
2021

University of Rochester
2019-2020

The University of Texas at Austin
2015-2016

Recently, researchers have started decomposing deep neural network models according to their semantics or functions. Recent work has shown the effectiveness of decomposed functional blocks for defending adversarial attacks, which add small input perturbation image fool DNN models. This proposes a profiling-based method decompose different blocks, lead effective path as new approach exploring DNNs' internal organization. Specifically, per-image can be aggregated class-level path, through we...

10.1109/cvpr.2019.00491 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

Enterprise Web applications are moving towards server-side scripting using managed languages. Within this shifting context, event-driven programming is emerging as a crucial model to achieve scalability. In paper, we study the microarchitectural implications of scripting, JavaScript in particular, from unique perspective. Using Node.js framework, come several critical conclusions. First, unlike traditional server-workloads such CloudSuite and BigDataBench that based on conventional...

10.1145/2830772.2830792 article EN 2015-12-05

Deep learning is vulnerable to adversarial attacks, where carefully-crafted input perturbations could mislead a well-trained Neural Network (DNN) produce incorrect results. Adversarial attacks jeopardize the safety, security, and privacy of DNN-enabled systems. Today's countermeasures either do not have capability detect samples at inference-time, or introduce prohibitively high overhead be practical inference-time.We propose Ptolemy, an algorithm-architecture co-designed system that detects...

10.1109/micro50266.2020.00031 article EN 2020-10-01

Occlusion is a common problem with biometric recognition in the wild. The generalization ability of CNNs greatly decreases due to adverse effects various occlusions. To this end, we propose novel unified framework integrating merits both and graph models overcome occlusion problems recognition, called multiscale dynamic representation (MS-DGR). More specifically, group deep features reflected on certain subregions recrafted into feature (FG). Each node inside FG deemed characterize specific...

10.1109/tpami.2023.3298836 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2023-07-25

With the widespread use of face masks due to COVID-19 pandemic, accurate masked recognition has become more crucial than ever. While several studies have investigated using convolutional neural networks (CNNs), there is a paucity research exploring plain Vision Transformers (ViTs) for this task. Unlike ViT models used in image classification, object detection, and semantic segmentation, model trained by modern losses struggles converge when from scratch. To end, paper initializes parameters...

10.1109/tifs.2023.3280717 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Iris segmentation and localization in non-cooperative environment is challenging due to illumination variations, long distances, moving subjects limited user cooperation, etc. Traditional methods often suffer from poor performance when confronted with iris images captured these conditions. Recent studies have shown that deep learning could achieve impressive on task. In addition, as defined an annular region between pupil sclera, geometric constraints be imposed help locating the more...

10.48550/arxiv.1901.11195 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Deep learning-based face recognition models are vulnerable to adversarial attacks. To curb these attacks, most defense methods aim improve the robustness of against perturbations. However, generalization capacities quite limited. In practice, they still unseen learning fairly robust general perturbations, such as Gaussian noises. A straightforward approach is inactivate perturbations so that can be easily handled this paper, a plug-and-play method, named perturbation inactivation (PIN),...

10.1109/tifs.2022.3195384 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Purpose In recent years, railway systems worldwide have faced challenges such as the modernization of engineering projects, efficient management intelligent digital equipment, rapid growth in passenger and freight transport demands, customized services ubiquitous safety. The transformation toward railways has emerged an effective response to formidable confronting industry, thereby becoming inevitable global trend development. Design/methodology/approach This paper, therefore, conducts a...

10.1108/rs-10-2023-0036 article EN cc-by Railway Sciences 2023-11-17

Expert-curated guides to the best of CS research.

10.1145/2980989 article EN Communications of the ACM 2016-12-20

Deep neural networks have proven to be highly effective in the face recognition task, as they can map raw samples into a discriminative high-dimensional representation space. However, understanding this complex space proves challenging for human observers. In paper, we propose novel approach that interprets deep models via facial attributes. To achieve this, introduce two-stage framework recovers attributes from representations. This allows us quantitatively measure significance of relation...

10.1109/tifs.2024.3424291 article EN cc-by IEEE Transactions on Information Forensics and Security 2024-01-01

Abstract: Because of the increasing prevalence and sophistication credit card theft, standard detection measures frequently fail. This study investigates use several machine learning algorithms to improve fraud in bank transactions. The research aims develop enhanced systems by employing an integrated strategy involving data preprocessing, application various classification algorithms, performance evaluation. thoroughly examines such as Random Forest, Logistic Regression, Neural Networks,...

10.54254/2754-1169/122/20242522 article EN Advances in Economics Management and Political Sciences 2024-10-25

Convolutional neural networks trained on large datasets can generalize various down-streaming tasks, including industrial anomaly detection and localization, which is critical in modern large-scale manufacturing. Whereas previous methods have demonstrated that the feature fusion strategy across multiple layers effective for better performance they lack flexibility intervening manipulating local global information composition process. Through experiments, we demonstrate brute-force used leads...

10.1109/access.2023.3265715 article EN cc-by-nc-nd IEEE Access 2023-01-01

Recently, researchers have started decomposing deep neural network models according to their semantics or functions. Recent work has shown the effectiveness of decomposed functional blocks for defending adversarial attacks, which add small input perturbation image fool DNN models. This proposes a profiling-based method decompose different blocks, lead effective path as new approach exploring DNNs' internal organization. Specifically, per-image can be aggregated class-level path, through we...

10.48550/arxiv.1904.08089 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Deep learning is vulnerable to adversarial attacks, where carefully-crafted input perturbations could mislead a well-trained Neural Network produce incorrect results. Today's countermeasures attacks either do not have capability detect samples at inference time, or introduce prohibitively high overhead be practical time. We propose Ptolemy, an algorithm-architecture co-designed system that detects time with low and accuracy.We exploit the synergies between DNN imperative program execution:...

10.48550/arxiv.2008.09954 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Our third installment of Research for Practice brings readings spanning programming languages, compilers, privacy, and the mobile web.

10.1145/2984629.3005356 article EN Queue 2016-08-01

The transmission bandwidth of a vehicle–ground connection is low when an EMU (electric multiple unit) running in high-speed scenario. To this end, paper focuses on the need to solve problem poor integration information network, and proposes network scheme for EMUs based small base stations. Based existing wi-fi system EMU, order realize coverage 5G signal carriage, paper—through deployment technical characteristics 5G—sinks customized UPF (user plane function) MEC (mobile edge computing)...

10.3390/electronics11121824 article EN Electronics 2022-06-08

Abstract Deep neural network model extraction attack is the process of retraining a surrogate based on outputs target with given set inputs. Such attacks are hard to defend for sake owners’ interest. Recently, some work propose watermarking scheme image processing networks, which able prove intellectual property deep models even after attack. This makes sure that, once (an network) watermarked, we can extract watermark from output model. In this paper, new fight against latest method....

10.1093/comjnl/bxac190 article EN The Computer Journal 2022-12-30

The spam filtering system is used to identify which emails in the received are completely meaningless recipient and perform operations such as interception deletion. Nowadays, with rapid development of Internet, while e-mail provides convenience for people, also comes along it, brings many troubles users. According statistics, 80% world spam, e-spam really annoying. Therefore, how solve problem has important practical significance. Spam using Bayesian theory a statistical technique applied...

10.54097/hset.v38i.5734 article EN cc-by-nc Highlights in Science Engineering and Technology 2023-03-16

Occlusion is a common problem with biometric recognition in the wild. The generalization ability of CNNs greatly decreases due to adverse effects various occlusions. To this end, we propose novel unified framework integrating merits both and graph models overcome occlusion problems recognition, called multiscale dynamic representation (MS-DGR). More specifically, group deep features reflected on certain subregions recrafted into feature (FG). Each node inside FG deemed characterize specific...

10.48550/arxiv.2307.14617 preprint EN other-oa arXiv (Cornell University) 2023-01-01

As the informatization, digitization, and intelligence of railways continues to progress, new advantages, such as massive data resources rich application scenarios, promote generation autonomous intelligent high-speed railway system (AIHSRS). Based on an analysis current state transportation research, this article proposes overall architecture AIHSRS, with its connotations characteristics. Specifically, fundamental platform AIHSRS consists entity model layer, fusion mechanism interface...

10.1109/mits.2023.3305200 article EN IEEE Intelligent Transportation Systems Magazine 2023-09-06
Coming Soon ...