Yuxing Mao

ORCID: 0000-0002-1829-4719
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Advanced Image Processing Techniques
  • Advanced Measurement and Detection Methods
  • IoT Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Image Processing Techniques and Applications
  • Infrared Target Detection Methodologies
  • Gaze Tracking and Assistive Technology
  • Digital Holography and Microscopy
  • Privacy-Preserving Technologies in Data
  • Cognitive Radio Networks and Spectrum Sensing
  • Embedded Systems and FPGA Design
  • Glaucoma and retinal disorders
  • Cloud Computing and Resource Management
  • Cryptography and Data Security
  • Energy Harvesting in Wireless Networks
  • Sparse and Compressive Sensing Techniques
  • Context-Aware Activity Recognition Systems
  • Security and Verification in Computing
  • Image and Video Stabilization
  • Advanced MIMO Systems Optimization
  • Blockchain Technology Applications and Security
  • Industrial Vision Systems and Defect Detection
  • Retinal Imaging and Analysis
  • Power Systems and Technologies

Chongqing University
2013-2024

New Technology (Israel)
2023

Shanghai Second People's Hospital
2022

Space Engineering University
2020

PLA Army Engineering University
2012

Medical research shows that eye movement disorder is related to many kinds of neurological diseases. Eye characteristics can be used as biomarkers Parkinson's disease, Alzheimer's schizophrenia and other However, due the unknown medical mechanism some diseases, it difficult establish an intuitive correspondence between In this paper, we propose a classification method diseases based on decision tree random forest. Firstly, variety experimental schemes are designed obtain images, information...

10.3389/fnins.2020.00798 article EN cc-by Frontiers in Neuroscience 2020-08-06

Previous schemes for designing secure branch prediction unit (SBPU) based on physical isolation can only offer limited security and significantly affect BPU's capability, leading to prominent performance degradation. Moreover, encryption-based SBPU periodic key re-randomization have the risk of being compromised by advanced attack algorithms, overhead is also considerable. To this end, paper proposes a conflict-invisible (CIBPU). CIBPU employs redundant storage design, load-aware indexing,...

10.48550/arxiv.2501.10983 preprint EN arXiv (Cornell University) 2025-01-19

Benign paroxysmal positional vertigo (BPPV) is a prevalent form of that necessitates skilled physician to diagnose by observing the nystagmus and resulting from specific changes in patient's position. In this study, we aim explore integration eye movement video position information for BPPV diagnosis apply artificial intelligence (AI) methods improve accuracy diagnosis.

10.1186/s12911-024-02438-x article EN cc-by BMC Medical Informatics and Decision Making 2024-03-21

In recent years, with an increasing number of Internet Things (IoT) devices, general cloud computing mode is hard to process large amounts data high Quality Service (QoS). Edge put forward relieve the pressure servers, but most them only focused on allocating tasks depending servers or edge virtualization technology. Resource-constrained smart mobile terminals (RC-SMTs) produce be processed some are usually not able support even Docker The cooperative computation capacity RC-SMTs potential...

10.1109/jiot.2023.3235065 article EN IEEE Internet of Things Journal 2023-01-16

The expansion of Internet Things (IoT) spawns large on-device machine learning demands, while the can be a hard task for resource constrained IoT terminals with fragmented data set. Federal (FL), which aims to build joint model across multiple devices, IoT-FL has now become promising path on terminals. In broad FL fields, current server–client pattern cannot jump out third-party self-trustless problem, and recent researches suggest that even sharing training results may also reveal raw sets....

10.1109/jiot.2023.3279830 article EN IEEE Internet of Things Journal 2023-05-25

Medical research confirms that eye movement abnormalities are related to a variety of psychological activities, mental disorders and physical diseases. However, as the specific manifestations various diseases in terms remain unclear, accurate diagnosis according is difficult. In this paper, deep neural network (DNN) method employed establish disease discrimination model movement. First, multiple eye-tracking experiments designed obtain images. Second, pupil characteristics, including...

10.1109/access.2020.3017680 article EN cc-by IEEE Access 2020-01-01

Abstract:

10.21629/jsee.2018.04.04 article EN Journal of Systems Engineering and Electronics 2018-01-01

In Wireless Sensor Networks (WSNs), unlicensed users, that is, sensor nodes, have excessively exploited the radio spectrum. Through Cognitive Radio (CR), licensed spectra, which are owned by can be partly or entirely shared with users. This paper proposes a strategic bargaining spectrum-sharing scheme, considering CR-based heterogeneous WSN (HWSN). The sensors of HWSNs discrepant and exist in different wireless environments, leads to various signal-to-noise ratios (SNRs) for same Unlicensed...

10.3390/s17122737 article EN cc-by Sensors 2017-11-27

Mobile edge computing (MEC) has become an effective solution for insufficient and communication problems the Internet of Things (IoT) applications due to its rich resources on side. In multi-terminal scenarios, deployment scheme nodes important impact system performance essential issue in end-edge-cloud architecture. this article, we consider specific factors, such as spatial location, power supply, urgency requirements terminals, with respect building evaluation model solve allocation...

10.3390/s22186719 article EN cc-by Sensors 2022-09-06

Aiming at the problems of imperfectness and poor robustness to current analysis methods videonystagmography (VNG), a medical characteristics method for displacement vectors nystagmus is proposed in this paper. Firstly, video images are captured with infrared cameras motion trajectories eyeballs obtained through pupil localization. Then, 2D between any two adjacent frames acquired computing differences their positions. The statistical results demonstrated match joint distribution several...

10.1109/bmei.2013.6746899 article EN 2013-12-01

As the use and scale of wireless sensor networks has grown, lack transmission spectrum become a key factor affecting network quality service. An effective solution is to collect unused from primary users (i.e. licensed users) that for networks. In this article, cognitive radio-based network, sharing strategy between clusters proposed. First, as secondary user an unlicensed user), base station plays Bertrand game with monopolists (the gain access on behalf clusters. Then, allocates band...

10.1177/1550147717742888 article EN cc-by International Journal of Distributed Sensor Networks 2017-11-01

<title>Abstract</title> In the grid intelligent inspection system, automatic registration of infrared and visible light images in power scenes is a crucial research technology. Since there are obvious differences key attributes between images, direct alignment often difficult to achieve expected results. To overcome high difficulty aligning an image method proposed this paper. First, we use Sobel operator extract edge information pair. Second, feature points edges recognized by curvature...

10.21203/rs.3.rs-5331545/v1 preprint EN cc-by Research Square (Research Square) 2024-11-05

10.3969/j.issn.1004-4132.2011.06.018 article EN Journal of Systems Engineering and Electronics 2011-12-01

To defend against conflict-based cache side-channel attacks, partitioning or remapping techniques were proposed to prevent set conflicts between different security domains obfuscate the locations of such conflicts. But complicate design and may result in significant performance penalties. Therefore, there have been lightweight prefetching-based schemes introduce noise confuse attackers' observation. However, we validated experimentally that relying on prefetching only is insufficient, as...

10.48550/arxiv.2405.03217 preprint EN arXiv (Cornell University) 2024-05-06

The diversity of smart city scenarios makes it difficult for Internet Things terminals (IoTT) to accurately match their differential demands computing, storage, and communication resources with general-purpose MCU chips, leading resource redundancy cost increases. Due the lack demand analysis IoT application scenarios, traditional customized chip design methods cannot be directly used IoTT chips. To address this issue, we propose building a decoupled atomic service set analyze practical...

10.1109/icpsasia58343.2023.10294386 article EN 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&amp;CPS Asia) 2023-07-07

Modern processors make use of optimization techniques such as cache and speculation mechanisms to greatly improve performance. But recent research has found that these can also be exploited by attackers perform powerful side-channel attacks. A large number cache-based attacks have been replicated enhanced over Intel X86- ARM-based architectures, but there is a relative lack on RISC-V-based architectures. Xuantie-910 BOOM are both processors. So far, cache-side channels in the unprivileged...

10.1109/trustcom56396.2022.00166 article EN 2022-12-01
Coming Soon ...