Hao Wu

ORCID: 0000-0002-0795-3790
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Remote-Sensing Image Classification
  • Real-Time Systems Scheduling
  • Entomopathogenic Microorganisms in Pest Control
  • Security and Verification in Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Smart Grid Energy Management
  • Network Security and Intrusion Detection
  • Automated Road and Building Extraction
  • Robotic Path Planning Algorithms
  • Advanced Memory and Neural Computing
  • Natural Language Processing Techniques
  • Control and Dynamics of Mobile Robots
  • Sentiment Analysis and Opinion Mining
  • Studies on Chitinases and Chitosanases
  • Plant Disease Management Techniques
  • Model Reduction and Neural Networks
  • Energy Load and Power Forecasting
  • Wireless Networks and Protocols
  • Text and Document Classification Technologies
  • Advanced Malware Detection Techniques
  • Distributed Control Multi-Agent Systems
  • Advanced oxidation water treatment
  • Energy Efficiency in Computing
  • Insect symbiosis and bacterial influences

Wuhan University
2005-2025

Anhui Agricultural University
2020-2024

University of Science and Technology of China
2022-2024

Anhui Medical University
2024

Hangzhou Dianzi University
2022

Jiangsu University
2021

National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2020

Southern Connecticut State University
2018

Jilin University
2017

Princeton University
2015-2016

Newcache is a secure cache that can thwart side-channel attacks to prevent the leakage of secret information. All caches today are susceptible attacks, despite software isolation memory pages in virtual address spaces or machines. These leak encryption keys private identity keys, nullifying any protection provided by strong cryptography. uses novel dynamic, randomized memory-to-cache mapping contention-based rather than static used conventional set-associative caches. In this article,...

10.1109/mm.2016.85 article EN IEEE Micro 2016-09-01

In this paper, we address the issue of modeling and estimating changes in state spatio-temporal dynamical systems based on a sequence observations like video frames. Traditional numerical simulation depend largely initial settings correctness constructed partial differential equations (PDEs). Despite recent efforts yielding significant success discovering data-driven PDEs with neural networks, limitations posed by singular scenarios absence local insights prevent them from performing...

10.1109/tkde.2024.3363711 article EN IEEE Transactions on Knowledge and Data Engineering 2024-02-08

This study investigated the effects of light source, pH value, and NO3- concentration on photodegradation prothioconazole in aqueous solution. The half-life (t1/2) was 173.29, 21.66, 11.18 min under xenon, ultraviolet, high-pressure mercury lamps, respectively. At values 4.0, 7.0, 9.0 a xenon lamp t1/2 were 693.15, 231.05, 99.02 min, Inorganic substance clearly promoted prothioconazole, with 115.53, 77.02, 69.32 at concentrations 1.0, 2.0, 5.0 mg L-1, products identified as C14H15Cl2N3O,...

10.1021/acs.jafc.3c00453 article EN Journal of Agricultural and Food Chemistry 2023-04-19

Information leakage through cache side channels is a serious threat in computer systems. The leak of secret cryptographic keys voids the protections provided by strong cryptography and software virtualization. Past channel defenses focused almost entirely on data caches. Recently, instruction based side-channel attacks have been demonstrated to be practical -- even Cloud Computing environment across two virtual machines. Unlike caches, caches information secret-dependent execution paths. In...

10.1145/2768566.2768570 article EN 2015-06-02

Human-Computer natural language interaction is helpful to reduce the operation and maintenance cost of SCADA system, it necessary solve complex interface problem that supports data query real-time control. According complexity instructions, a hierarchical classification semantic parsing algorithm adopted. Firstly, KWECS method used classify intent instruction, then TF-IDF keyword extraction combined with cosine similarity structure key-value classified instructions which was into control...

10.1109/access.2021.3083540 article EN cc-by-nc-nd IEEE Access 2021-01-01

The rapid development and popularity of IoT technology has reshaped the way people interact with real world. Many researchers have attempted to build natural language interfaces for platforms, but not produced much progress in parsing commands that contain multiple operations more complex logical structures. In this paper, we propose IoT-NLI, a query control interface popular which uses hierarchical semantic algorithms directed edge-tagged graph structures efficiently parse input by users,...

10.1109/access.2022.3186760 article EN cc-by IEEE Access 2022-01-01

A community intrusion detection and pre-warning system based on wireless mesh network is presented in this paper. This composed of ARM (Advanced RISC Machines) data acquisition nodes, control centre. The flame, smog infrared signal human can be detected by video audio collected transmitted to centre when any those situation happened. stores information special area gives alarm monitors. nodes use embedded its unit transmit transmission module which connected ARM9 send signal. establish...

10.1109/ramech.2008.4681478 article EN 2008-09-01

Hyperspectral images are rich in both spectral information and spatial dependence between pixels; however, hyperspectral characterized by the high dimensionality of small data sets variance. Facing these problems, as supplementary is a relatively effective means to solve them. And label characteristic excellent information. Therefore, address above issues, based on residual network extractor(RAS), which network, pixel embedding(PE), extractor(SIE). At stage mining information, we use mine...

10.1109/access.2021.3107976 article EN cc-by IEEE Access 2021-01-01

The human–machine interaction of existing agricultural measurement and control platforms lacks user-friendliness requires manual operation by trained professionals. recent development natural language processing technology may bring some interesting changes. We propose a pipeline for building interface to provide better platforms. Our construction process uses new method collecting training data based on the dynamic tuple framework synthesize commands entered user into structured AOM...

10.3390/app122211830 article EN cc-by Applied Sciences 2022-11-21

Based on high speed Ad hoc networks, researchers build a kind of information sharing system using data access service for variety operating and different types hardware source.Information service-oriented software architecture that supports localization systems databases as well tactical network environment, platforms can provide good compatibility, provides unified secondary development interface, through future optimize improve the interface load balancing control module effectively...

10.2991/lemcs-15.2015.273 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2015-01-01

10.3724/sp.j.1016.2013.01312 article EN Chinese Journal of Computers 2014-03-18

Abstract Due to the complexity, uncertainty and increase of data dimension in power systems, conventional methods often encounter bottlenecks when trying solve decision-making control problems. Therefore, data-driven these problems are being widely studied. Deep reinforcement learning (DRL) is one regarded as true artificial intelligence (AI). It has been applied a series complex sequential problems, including those system. This paper first reviews basic idea, model, algorithm technology...

10.1088/1742-6596/1881/2/022051 article EN Journal of Physics Conference Series 2021-04-01

To accommodate execution mode change and hardware malfunction, dynamic system reconfiguration, which invokes application migration across different processing cores, needs to be supported on multi-core embedded systems. Different strategies will impact system's timing behaviors in manners, it is important select an appropriate one such that the performance after process still acceptable. The focus of our research predict possible upon choose optimal one. Extensive experiments have been set...

10.1109/bds/hpsc/ids18.2018.00044 article EN 2018-05-01

Renewable energy sources (RES) generation has huge environmental and social benefits, as a clean source with great potential. However, the difference in uncertainty characteristics of RES electric–thermal loads poses significant challenge to optimal schedule an integrated system (IES). Therefore, for different multiple uncertainties IES, this paper proposes type-II fuzzy interval chance-constrained programming (T2FICCP)-based optimization model solve above problem. In model, sets are used...

10.3390/en15186763 article EN cc-by Energies 2022-09-15

Fast deploying and networking in a disaster area are of great importance. Firstly, we propose an architecture Emergency Medical Networks this paper. The objective study is to achieve the optimality heterogeneous sensor nodes assignment network. To obtain needed coverage, network designers initially need determine how many should be deployed area. In consideration finite energy sensing ranges both sensors sink nodes, apply coverage process theory into wireless networks improve ratio during...

10.1109/ubi-healthtech.2015.7203324 article EN 2015-05-01

With pixel un-mixing, the omission of caused by mixed can be resolved so as to improve classification accuracy. But trouble is only proportion each end member object in one which got through while spatial distribution uncertain. The objective this study introduce sub-pixel mapping based on attraction model and explore some issues it, such neighboring pixels selection normalization. As experiments proven, could get better result eight selecting mode normalizing most cases.

10.1109/igarss.2010.5652045 article EN 2010-07-01
Coming Soon ...