Shuteng Niu

ORCID: 0000-0002-1069-9236
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • UAV Applications and Optimization
  • Anomaly Detection Techniques and Applications
  • Domain Adaptation and Few-Shot Learning
  • Distributed Control Multi-Agent Systems
  • Adversarial Robustness in Machine Learning
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Advanced Wireless Communication Technologies
  • Machine Learning and ELM
  • Wireless Signal Modulation Classification
  • Advanced Graph Neural Networks
  • COVID-19 diagnosis using AI
  • Multimodal Machine Learning Applications
  • Explainable Artificial Intelligence (XAI)
  • Neural Networks and Applications
  • Advanced Neural Network Applications
  • Blockchain Technology Applications and Security
  • Coronary Interventions and Diagnostics
  • Sparse and Compressive Sensing Techniques
  • Speech Recognition and Synthesis
  • AI in cancer detection
  • Speech and Audio Processing
  • Recommender Systems and Techniques
  • Antiplatelet Therapy and Cardiovascular Diseases
  • Protein Structure and Dynamics

Bowling Green State University
2021-2024

The University of Texas Health Science Center at Houston
2021-2024

Embry–Riddle Aeronautical University
2019-2021

Auburn University at Montgomery
2021

Shenzhen University
2021

Transfer learning (TL) has been successfully applied to many real-world problems that traditional machine (ML) cannot handle, such as image processing, speech recognition, and natural language processing (NLP). Commonly, TL tends address three main of learning: (1) insufficient labeled data, (2) incompatible computation power, (3) distribution mismatch. In general, can be organized into four categories: transductive learning, inductive unsupervised negative learning. Furthermore, each...

10.1109/tai.2021.3054609 article EN publisher-specific-oa IEEE Transactions on Artificial Intelligence 2020-10-01

The Internet of Things (IoT) is becoming an indispensable part everyday life, enabling a variety emerging services and applications. However, the presence rogue IoT devices has exposed to untold risks with severe consequences. first step in securing detecting identifying legitimate ones. Conventional approaches use cryptographic mechanisms authenticate verify devices' identities. protocols are not available many systems. Meanwhile, these methods less effective when can be exploited or...

10.1109/jiot.2021.3099028 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-07-21

Medical image processing is one of the most important topics in Internet Things (IoMT). Recently, deep learning methods have carried out state-of-the-art performances on medical imaging tasks. In this paper, we propose a novel transfer framework for classification. Moreover, apply our method COVID-19 diagnosis with lung Computed Tomography (CT) images. However, well-labeled training data sets cannot be easily accessed due to disease's novelty and privacy policies. The proposed has two...

10.1109/jbhi.2021.3051470 article EN publisher-specific-oa IEEE Journal of Biomedical and Health Informatics 2021-01-15

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature IoT make it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens existing radio communications then mimic legitimate devices conduct malicious activities. Existing solutions employ cryptographic signatures verify trustworthiness received information. In prevalent IoT, secret keys for cryptography can...

10.1109/jiot.2020.3018677 article EN IEEE Internet of Things Journal 2020-08-21

10.1016/j.comcom.2020.11.008 article EN publisher-specific-oa Computer Communications 2020-11-18

Deep learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application DL IoT is device identification from wireless signals, namely, noncryptographic (NDI). However, components NDI systems have to evolve adapt operational variations, such a paradigm termed as incremental (IL). Various IL algorithms proposed and many them require dedicated space store increasing amount historical data, therefore, they are not suitable for or mobile applications. Besides,...

10.1109/jiot.2021.3078407 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-05-08

Multi-agent unmanned aerial vehicle (UAV) teaming becomes an essential part in science mission, modern warfare surveillance, and disaster rescuing. This paper proposes a decentralized UAV swarm persistent monitoring strategy realizing continuous sensing coverage network service. A two-layer (high altitude low altitude) hierarchical structure is adopted the accurate object tracking area of interest (AOI). By introducing communication channel model its path planning, both centralized control...

10.3390/drones5020033 article EN cc-by Drones 2021-04-30

The ubiquitous deployment of 5G New Radio (5G NR) accelerates the evolution in many fields. With enhancement NR, unmanned aerial vehicle (UAV) swarm networking can gain more flexibility, reliability, and elasticity to assist residents or workers finish missions high complexity risks remotely. beamforming NR improve accuracy flexibility connections between mobile devices. a throughput guaranteed UAV networking, remote deliver specific instructions with requirement. Further, reliable volume...

10.1109/jmass.2021.3067861 article EN publisher-specific-oa IEEE Journal on Miniaturization for Air and Space Systems 2021-03-22

While deep-learning-enabled recommender systems demonstrate strong performance benchmarks, many struggle to adapt effectively in real-world environments due limited use of user-item relationship data and insufficient transparency recommendation generation. Traditional collaborative filtering approaches fail integrate multifaceted item attributes, although Factorization Machines account for item-specific details, they overlook broader relational patterns. Collaborative knowledge graph-based...

10.48550/arxiv.2501.04161 preprint EN arXiv (Cornell University) 2025-01-07

Big data analytics and mining have the potential to enable real-time decision making control in a range of Internet Things (IoT) application domains, such as Vehicles, Wings, Airport Things. The prediction toward air mobility, which is essential studies traffic management, has been challenging task due complex spatial temporal dependencies with highly nonlinear variational patterns. Existing works for only focus on either modeling static patterns individual flight or correlation, no limited...

10.1109/jiot.2021.3090265 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-06-17

Human activities and city routines follow patterns. Transfer learning can help achieve scalable solutions toward the realization of smart cities accounting for similarities between regions, domains, activities. In this study, we propose a transfer learning-based framework buildings to test hypothesis in energy-related problems. Our has two major components: network creation transferable predictive model. order create that groups sharing characteristics, evaluated strategies: novel clustering...

10.1109/tia.2022.3179222 article EN publisher-specific-oa IEEE Transactions on Industry Applications 2022-05-31

The rapid evolution of artificial intelligence (AI) in conjunction with recent updates dual antiplatelet therapy (DAPT) management guidelines emphasizes the necessity for innovative models to predict ischemic or bleeding events after drug-eluting stent implantation. Leveraging AI dynamic prediction has potential revolutionize risk stratification and provide personalized decision support DAPT management.

10.1161/jaha.123.029900 article EN cc-by-nc-nd Journal of the American Heart Association 2024-01-31

In this paper, we study a not well-investigated but important transfer learning problem termed Distant Domain Transfer Learning (DDTL). This topic is closely related to negative transfer. Unlike conventional problems which assume that the source domain and target are more or less similar each other, DDTL aims make efficient transfers even when domains tasks completely different. As an extreme example in image classification, there only sufficient amount of unlabeled images watches,...

10.1109/bigdata50022.2020.9378493 article EN 2021 IEEE International Conference on Big Data (Big Data) 2020-12-10

The ubiquitous of 5G New Radio (5G NR) accelerates the massive implementations in many fields including swarm Unmanned Aircraft System (UAS) networking. ultra capacities NR can provide more sufficient networking services for UAS which enable to deploy complex and challenging scenarios achieve missions. However, conventional are mainly centralized or hierarchical is vulnerable dynamics deployment on a large scale. In this paper, we formulate cell wall communications heterogeneous with...

10.1109/icc42927.2021.9500733 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

With the evolution of 5G cellular communication, beamforming is mature for implementation on a large scale. The development networking provides great opportunity swarm UAS. Concurrently, advantages UAS can provide immense improvement to advance industrial and residential implementations. However, nature antenna array constrains in limited space which rarely mentioned routing researches. In this paper, regarding constrained steering space, we proposed novel algorithm, Optimized Ad-hoc...

10.1109/tnse.2020.3040311 article EN publisher-specific-oa IEEE Transactions on Network Science and Engineering 2020-11-25

The ubiquitous deployment of 5G New Radio (5G NR) stimulates Unmanned Aircraft Systems (UAS) swarm networking to evolve achieve more imminent progress. heterogeneous collaboration between UAS enhances the complexity and efficiency mission complement that requires robustness, flexibility, sustainability throughput in networking. conventional approaches mainly are based on hierarchical architectures limited satisfy challenges with high dynamics a large scale. In this paper, we propose an...

10.1109/tits.2021.3082512 article EN IEEE Transactions on Intelligent Transportation Systems 2021-05-27

In the past decades, information from all kinds of data has been on a rapid increase. With state-of-the-art performance, machine learning algorithms have beneficial for management. However, insufficient supervised training is still an adversity in many real-world applications. Therefore, transfer (TF) was proposed to address this issue. This article studies not well investigated but important TL problem termed cross-modality (CMTL). topic closely related distant domain (DDTL) and negative...

10.1145/3464324 article EN ACM Transactions on Management Information Systems 2021-10-05

Recently, waste sorting has become more and important in our daily life. It plays an essential role the big picture of recycling, reducing environmental pollution significantly. Deep learning (DL) methods have been dominating field image classification successfully applied to tasks achieve state-of-art performance. However, most traditional DL require a massive amount annotated data for training phase. Unfortunately, there is only one small set sorting, TrashNet created by Standford. In...

10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00108 article EN 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 2020-08-01

The Internet of Things (IoT) is becoming an indispensable part everyday life, enabling a variety emerging services and applications. However, the presence rogue IoT devices has exposed to untold risks with severe consequences. first step in securing detecting identifying legitimate ones. Conventional approaches use cryptographic mechanisms authenticate verify devices' identities. protocols are not available many systems. Meanwhile, these methods less effective when can be exploited or...

10.48550/arxiv.2101.10181 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Abnormal event detection with the lowest latency is an indispensable function for safety-critical systems, such as cyber defense systems. However, systems become increasingly complicated, conventional sequential methods less effective, especially when we need to define indicator metrics from complicated data manually. Although deep neural networks (DNNs) have been used handle heterogeneous data, theoretic assurability and explainability are still insufficient. This article provides a...

10.1109/jiot.2021.3126819 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-11-10

10.1016/j.compeleceng.2021.107401 article EN publisher-specific-oa Computers & Electrical Engineering 2021-09-10

Deep Learning (DL) and Neural Networks (DNNs) are widely used in various domains. However, adversarial attacks can easily mislead a neural network lead to wrong decisions. Defense mechanisms highly preferred safety- critical applications. In this paper, firstly, we use the gradient class activation map (GradCAM) analyze behavior deviation of VGG-16 when its inputs mixed with perturbation or Gaussian noise. particular, our method locate vulnerable layers that sensitive We also show be detect...

10.1109/fuzz52849.2023.10309766 article EN 2023-08-13
Coming Soon ...