Tao Ye

ORCID: 0000-0002-1814-530X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Crystallization and Solubility Studies
  • X-ray Diffraction in Crystallography
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Video Surveillance and Tracking Methods
  • Chaos-based Image/Signal Encryption
  • Network Packet Processing and Optimization
  • Recommender Systems and Techniques
  • Hand Gesture Recognition Systems
  • Robotics and Sensor-Based Localization
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Infrastructure Maintenance and Monitoring
  • Human Pose and Action Recognition
  • Metaheuristic Optimization Algorithms Research
  • Vehicle License Plate Recognition
  • Advanced Image Fusion Techniques
  • Face and Expression Recognition
  • Human Mobility and Location-Based Analysis
  • Advanced Algorithms and Applications
  • Data Stream Mining Techniques
  • Advanced Computational Techniques and Applications
  • Cryptographic Implementations and Security
  • Coding theory and cryptography

China University of Mining and Technology
2011-2025

University of Science and Technology Liaoning
2017-2025

Peking University
2016-2025

Shandong University
2006-2025

Peking University People's Hospital
2025

Chongqing University of Technology
2024

China University of Petroleum, Beijing
2024

BGI Group (China)
2024

BGI Research
2024

Traffic Management Research Institute
2024

Unmanned aerial vehicles (UAVs) play an important role in conducting automatic patrol inspections of cities, which can ensure the safety urban residents' life and property normal operation cities. However, during inspection process, problems may arise. For example, numerous small objects UAV images are difficult to detect, severely occluded, requirements for real-time performances posed. To address these issues, we first propose a object detection network (RTD-Net) images. Besides, deal with...

10.1109/tim.2023.3241825 article EN IEEE Transactions on Instrumentation and Measurement 2023-01-01

Sampling techniques are widely used for traffic measurements at high link speed to conserve router resources. Traditionally, sampled data is network management tasks such as matrix estimations, but recently it has also been in numerous anomaly detection algorithms, security analysis becomes increasingly critical providers. While the impact of sampling on engineering metrics flow size and mean rate well studied, its remains an open question.This paper presents a comprehensive study whether...

10.1145/1177080.1177102 article EN 2006-10-25

Railway shunting accidents, in which trains collide with obstacles, often occur because of human error or fatigue. It is therefore necessary to detect traffic objects front the and inform driver take timely action. To these railways, we proposed an object-detection method using a differential feature fusion convolutional neural network (DFF-Net). DFF-Net includes two modules: prior module module. The produces initial anchor boxes for subsequent detection Taking as input, applies sub-module...

10.1109/tits.2020.2969993 article EN IEEE Transactions on Intelligent Transportation Systems 2020-02-04

Unmanned aerial vehicles (UAVs) have been widely used in post-disaster search and rescue operations, object tracking, other tasks. Therefore, the autonomous perception of UAVs based on computer vision has become a research hotspot recent years. However, UAV images include dense objects, small arbitrary directions, which bring about significant challenges to existing detection methods. To alleviate these issues, we propose global-local feature enhanced network (GLF-Net). Considering...

10.1109/tim.2022.3196319 article EN IEEE Transactions on Instrumentation and Measurement 2022-01-01

While immutability is an important property of blockchain and can be utilized to build a credible data publishing platform, the same also abused disseminate illicit content may violate requirements under General Data Protection Regulation (GDPR) as well other privacy regulations. Hence, there has been increased focus on designing redactable blockchain-based solutions, which this survey article. Specifically, we extant literature blockchain, discuss existing limitations challenges prior...

10.1109/tnse.2022.3233448 article EN IEEE Transactions on Network Science and Engineering 2023-04-24

Parameter configuration is a common procedure used in large-scale network protocols to support multiple operational goals. It can be formulated as black-box optimization problem and solved with an efficient search algorithm. This paper proposes new heuristic algorithm, Recursive Random Search(RRS), for parameter optimization. The RRS algorithm based on the initial high-efficiency feature of random sampling it attempts maintain this high efficiency by constantly "restarting" adjusted sample...

10.1145/781027.781052 article EN 2003-06-10

Unauthorized operations referred to as "black flights" of unmanned aerial vehicles (UAVs) pose a significant danger public safety, and existing low-attitude object detection algorithms encounter difficulties in balancing precision speed. Additionally, their accuracy is insufficient, particularly for small objects complex environments. To solve these problems, we propose lightweight feature-enhanced convolutional neural network able perform with high flying real time provide guidance...

10.23919/jsee.2021.000073 article EN Journal of Systems Engineering and Electronics 2021-08-01

With the growing popularity of civilian unmanned aerial vehicles (UAVs), unauthorized flights are on rise accordingly. Therefore, it is critical to detect low-altitude UAVs for protecting personal privacy and public safety. Though substantial progress has been made in UAV detection, existing detection methods still have problems balancing accuracy, model size, speed. To address these limitations, this article proposes a novel deep learning method named convolution–transformer network...

10.1109/tim.2022.3165838 article EN IEEE Transactions on Instrumentation and Measurement 2022-01-01

Many accidents happen under shunting mode when the speed of a train is below 45 km/h. In this mode, attendants observe railway condition ahead using traditional manual method and tell observation results to driver in order avoid danger. To address problem, an automatic object detection system based on convolutional neural network (CNN) proposed detect objects which called Feature Fusion Refine (FR-Net). It consists three connected modules, i.e., depthwise-pointwise convolution, coarse...

10.3390/s18061916 article EN cc-by Sensors 2018-06-12

The lack of floor plans is a critical reason behind the current sporadic availability indoor localization service. Service providers have to go through effort-intensive and time-consuming business negotiations with building operators, or hire dedicated personnel gather such data. In this paper, we propose Jigsaw, plan reconstruction system that leverages crowdsensed data from mobile users. It extracts position, size, orientation information individual landmark objects images taken by also...

10.1109/tmc.2016.2550040 article EN IEEE Transactions on Mobile Computing 2016-04-04

Obstacles in front of a train pose significant threat to traffic safety, and many accidents happen under shunting mode when the speed is below 45 km/h. The existing track object–detection algorithms encounter difficulty balancing detection precision mode. Additionally, their accuracy insufficient, particularly for small objects complex environments. To address these problems, we propose stable lightweight feature extraction adaptive fusion network real-time obstacles railway scenarios ensure...

10.1109/tits.2022.3156267 article EN IEEE Transactions on Intelligent Transportation Systems 2022-03-23

Images are important information carriers in our lives, and images should be secure when transmitted stored. Image encryption algorithms based on chaos theory emerge endlessly. Based previous various chaotic image fast algorithms, this paper proposes a color sector algorithm one-dimensional composite sinusoidal mapping. The main purpose of is to improve the decryption speed efficiency big data era. First, four basic maps combined pairs added with sine operations. Six (CSCM) were obtained....

10.1371/journal.pone.0310279 article EN cc-by PLoS ONE 2025-01-24

Abstract Background This study compared the effectiveness of different ultrawide field fundus imaging systems (Clarus™ 500 and Optos ® ) in diagnosing diabetic retinopathy (DR). Methods was a prospective, multicentre study. Retinal photographs were captured at four eye centres utilizing both Clarus™ systems. The image quality effective retinal area compared. Then consistency severity DR by two distinct according to three separate grading criteria (the International Council Ophthalmology,...

10.1186/s12886-024-03835-6 article EN cc-by BMC Ophthalmology 2025-02-10

Research on the detection and identification of anomalies in electric power systems is crucial for ensuring their secure stable operation. Anomaly models based Support Vector Machines (SVMs) effectively process high-dimensional data while maintaining strong generalization capabilities. However, performance SVMs significantly depends choice parameters, where improper parameter settings can lead to overfitting or underfitting, consequently decreasing accuracy anomaly detection. Furthermore,...

10.3390/pr13020549 article EN Processes 2025-02-15

10.32604/cmc.2025.059882 article EN Computers, materials & continua/Computers, materials & continua (Print) 2025-01-01

Coordinating various controllable distributed resources to reduce network losses is crucial the secure and economical operation of modern power systems. This paper proposes a bi-level optimization model for system loss reduction based on “source-grid-load-storage” coordinated optimization. The upper level aims minimize total annual planning cost system, determining location capacity photovoltaic systems, energy storage devices, electric vehicle charging stations. lower load curve smoothness...

10.3390/pr13030831 article EN Processes 2025-03-12

Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the focus enterprise gateway-level intrusion detection systems where traffic volume is low network configuration information readily available. This paper investigates effectiveness of existing algorithms in context a large transit backbone proposes new algorithm meets demands aggregated high speed traffic. Specifically,...

10.1109/.2006.1629454 article EN IEEE International Performance, Computing, and Communications Conference 2006-05-25

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Packet sampling is commonly deployed in high-speed backbone routers to minimize resources used for network monitoring. It known that packet distorts traffic statistics and its impact has been extensively studied engineering metrics such as flow size mean rate. However, it unclear how impacts anomaly detection, which become increasingly critical providers. This paper the first attempt address this...

10.1109/jsac.2006.884027 article EN IEEE Journal on Selected Areas in Communications 2006-12-01

With the high growth rates of railway transportation, it is extremely important to detect obstacles ahead train ensure safety. Manual and traditional feature-extraction methods have been utilized in this scenario. There are also deep learning-based object detection approaches. However, case a complex scene, these approaches either inefficient or insufficient accuracy, particularly for small objects. To address issue, we propose feature-enhanced single-shot detector (FE-SSD). The proposed...

10.1109/access.2020.3015251 article EN cc-by IEEE Access 2020-01-01

Detection of railway traffic objects is an important task during train driving and implemented to ensure safe driving. Although object detection has been investigated for years, many challenges exist in precisely detecting under complex scenes. These mainly include adverse weather states, various backgrounds, diverse objects, low-quality images. To address these issues, we introduce a novel deep learning method, called multi-mode feature enhanced convolutional neural network (MMFE-Net),...

10.1109/tits.2022.3154751 article EN IEEE Transactions on Intelligent Transportation Systems 2022-03-03

As the Internet infrastructure grows to support a variety of services, its legacy protocols are being overloaded with new functions such as traffic engineering. Today, operators engineer capabilities through clever, but <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">manual</i> parameter tuning. In this paper, we propose back-end tool for large-scale configuration that is based on efficient state space search techniques and on-line simulation. The...

10.1109/tnet.2008.2001729 article EN IEEE/ACM Transactions on Networking 2008-08-01
Coming Soon ...