Hao Liu

ORCID: 0000-0002-1979-8994
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Traffic Prediction and Management Techniques
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Traffic control and management
  • Blockchain Technology Applications and Security
  • Auction Theory and Applications
  • Consumer Market Behavior and Pricing
  • Human Mobility and Location-Based Analysis
  • IoT and Edge/Fog Computing
  • Adversarial Robustness in Machine Learning
  • Cryptography and Data Security
  • Advanced Neural Network Applications
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Decision-Making Techniques
  • Innovation Diffusion and Forecasting
  • Cognitive Radio Networks and Spectrum Sensing
  • Markov Chains and Monte Carlo Methods
  • Anomaly Detection Techniques and Applications
  • Advanced Computational Techniques and Applications
  • Autonomous Vehicle Technology and Safety
  • Genomics and Phylogenetic Studies
  • Brain Tumor Detection and Classification
  • Domain Adaptation and Few-Shot Learning
  • Genetic Mapping and Diversity in Plants and Animals
  • Energy Efficient Wireless Sensor Networks

State Key Laboratory of Gas Disaster Detecting, Preventing and Emergency Controlling
2025

Huazhong Agricultural University
2017-2024

Guilin University of Electronic Technology
2023

Beijing University of Technology
2018-2022

Beijing Transportation Research Center
2016-2022

University of Cincinnati
2019-2022

South Central Minzu University
2021-2022

BaiCheng Normal University
2022

Central South University
2021

Berkeley College
2021

Data missing remains a difficult and important problem in the transportation information system, which seriously restricts application of intelligent system (ITS), dominatingly on traffic monitoring, e.g., data collection, state estimation, control. Numerous imputation methods had been proposed last decade. However, lacking sufficient temporal variation characteristic analysis as well spatial correlation measurements leads to limited completion precision, poses major challenge for an ITS....

10.1109/tits.2018.2854968 article EN IEEE Transactions on Intelligent Transportation Systems 2018-08-01

Machine learning (ML) technology has shown its unique advantages in many fields and excellent performance applications, such as image recognition, speech recommendation systems, natural language processing. Recently, the applicability of ML wireless sensor networks (WSNs) attracted much attention. As resources are limited WSNs, identifying how to improve resource utilization achieve power-efficient load balancing is becoming a critical issue WSNs. Traditional green routing algorithms aim...

10.3390/electronics10131539 article EN Electronics 2021-06-25

Millions of smart home speakers, such as Amazon Echo and Google Home, have been purchased by U.S. consumers. However, the security privacy speakers not rigorously examined, which raise critical concerns. In this paper, we investigate untold severe leakage speakers. Specifically, examine a new passive attack, referred to voice command fingerprinting on We demonstrate that attacker, who can only eavesdrop encrypted traffic between speaker cloud server, infer users' commands compromise millions...

10.1109/cns.2019.8802686 article EN 2019-06-01

With the access of massive mobile devices, spectrum resources are becoming increasingly scarce. How to effectively and securely utilize limited has become a fundamental challenge for future communication systems. Focusing on intelligent sensing sharing, this article proposes blockchain-based two-stage secure sharing auction mechanism (BISA), which selects appropriate base stations form consortium blockchain guarantee efficient with low complexity. In first stage, reverse-auction-based...

10.1109/tii.2021.3104325 article EN IEEE Transactions on Industrial Informatics 2021-08-12

Characterizing regulatory effects of genomic variants in plants remains a challenge. Although several tools based on deep-learning models and large-scale chromatin-profiling data have been available to predict elements variant effects, no dedicated or web services reported plants. Here, we present PlantDeepSEA as deep learning-based service multiple tissues six plant species (including four crops). provides two main functions. One is called Variant Effector, which aims the sequence chromatin...

10.1093/nar/gkab383 article EN cc-by Nucleic Acids Research 2021-04-28

Federated learning (FL) provides a promising solution to meet the requirements of data privacy and security in intelligent transportation systems (ITS), which enables edge devices road side units (RSUs) collaboratively train models without exposing raw data. However, deep leakage from gradients (DLG) still leads risk divulging original Meanwhile, existing gradient protection methods based on secure multi-party computation (SMC) result huge communication overheads latency, are difficult...

10.1109/tits.2023.3243088 article EN IEEE Transactions on Intelligent Transportation Systems 2023-02-16

Rebar constitutes a crucial element within tunnel lining structures, where its precise arrangement plays pivotal role in determining both structural stability and load-bearing capacity. Due to the rebar’s high dielectric constant approaching infinity, radar signal reflections are intensified, manifesting as distinct hyperbolic patterns imagery. By performing convolutional operations, these features of rebar can be effectively extracted from images. Building upon feature extraction...

10.3390/app15010367 article EN cc-by Applied Sciences 2025-01-02

Invariant molecular representation models provide potential solutions to guarantee accurate prediction of properties under distribution shifts out-of-distribution (OOD) by identifying and leveraging invariant substructures inherent the molecules. However, due complex entanglement functional groups frequent display activity cliffs properties, separation molecules becomes inaccurate tricky. This results in inconsistent semantics among identified existing models, which means sharing identical...

10.1093/bib/bbaf147 article EN PubMed 2025-03-04

Accurately determining the geographic location of an Internet host is important for location-aware applications such as location-based advertising and network diagnostics. Despite their fast response time, widely used database-driven geolocation approaches provide only inaccurate locations. Delay measurement based improve estimation accuracy but still suffer from a limited precision (about 10 km) long time (tens seconds) to localize single PC, which cannot meet demand precise real-time...

10.1109/infocom.2014.6847987 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Abstract As a signaling molecule, nitric oxide (NO) regulates the development and stress response in different organisms. The major biological activity of NO is protein S‐nitrosylation, whose function fungi remains largely unclear. Here, it found rice blast fungus Magnaporthe oryzae , de‐nitrosylation process essential for functional appressorium formation during infection. Nitrosative caused by excessive accumulation harmful fungal While S‐nitrosoglutathione reductase GSNOR‐mediated removes...

10.1002/advs.202403894 article EN cc-by Advanced Science 2024-05-05

Transformers have emerged as the architecture of choice for many state-of-the-art AI models, showcasing exceptional performance across a wide range applications. However, memory demands imposed by limit their ability to handle long sequences, thereby posing challenges in utilizing videos, actions, and other long-form sequences modalities complex environments. We present novel approach, Ring Attention with Blockwise (Ring Attention), which leverages blockwise computation self-attention...

10.48550/arxiv.2310.01889 preprint EN other-oa arXiv (Cornell University) 2023-01-01

We introduce a new unsupervised pretraining objective for reinforcement learning. During the reward-free phase, agent maximizes mutual information between tasks and states induced by policy. Our key contribution is novel lower bound of this intractable quantity. show that reinterpreting combining variational successor features~\citep{Hansen2020Fast} with nonparametric entropy maximization~\citep{liu2021behavior}, can be efficiently optimized. The proposed method Active Pretraining Successor...

10.48550/arxiv.2108.13956 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Due to the distributed and dynamic characteristics of Internet Vehicles (IoV) continuous growth in number devices, content-centric decentralized vehicular named data networking (VNDN) has become more suitable for content-oriented applications IoV. However, existing centralized architecture is prone failure single points, which results trust problems key verification between cross-domain nodes consuming power reducing lifetime. Focusing on secure management power-efficient routing, this...

10.1155/2021/3717702 article EN cc-by Security and Communication Networks 2021-07-07

Vertical federated learning (VFL) is a promising category of for the scenario where data vertically partitioned and distributed among parties. VFL enriches description samples using features from different parties to improve model capacity. Compared with horizontal learning, in most cases, applied commercial cooperation companies. Therefore, contains tremendous business values. In past few years, has attracted more attention both academia industry. this paper, we systematically investigate...

10.48550/arxiv.2304.01829 preprint EN other-oa arXiv (Cornell University) 2023-01-01

In order to reduce traffic conflicts on cross-intensive roads, this paper proposes a new early warning system based the active safety concept. The collects real-time vehicle data using roadside sensors and transmits results drivers major road in timely manner via lights. research, principles of are discussed detail, including how dynamics collected potential collisions identified avoided. Through driving simulation experiment, speed prediction model after implementation was examined. Results...

10.1155/2018/8372108 article EN cc-by Journal of Advanced Transportation 2018-08-12

Artificial neural networks are widely used in various fields, such as intelligent road networks, Internet of Things, and smart medical systems due to their ability process large amounts data parallel, store information a distributed manner, self-organize self-learn. Cloud computing technology has further expanded the development network applications. However, user often contains sensitive information, once management right is transferred cloud, it faces serious security privacy issues. In...

10.1109/icecai58670.2023.10176838 article EN 2023-05-12

Cognitive radio (CR) provides an effective solution to meet the huge bandwidth requirements in intelligent transportation systems (ITS), which enables secondary users (SUs) access idle spectrum of primary (PUs). However, high mobility and real-time service result additional transmission collisions interference, degrades rate quality (QoS) ITS. This paper proposes a algorithm (Feilin) based on federated deep reinforcement learning (FDRL) improve rate, maximizes QoS reward function with...

10.1109/tits.2022.3179442 article EN IEEE Transactions on Intelligent Transportation Systems 2022-06-20

This Nowadays, people are paying more and attention to the quality of home environment with rapid popularity smart system Internet things technology. In this paper, a new method based on technology WSN is adopted monitor some indicators indoors, so that damaging caused by these imperceptible even dangerous indications, such as PM 2.5, temperature, humidity concentration carbon monoxide, can be reduced or eliminated. The proposed 2.5 detector used in acquiring real-time data for surveillance...

10.1109/icct.2017.8359775 article EN 2017-10-01

For the traditional inspection methods, visual data is firstly recorded on forms and then input manually into computer, which inefficient creates errors frequently. This research aims at establishing a smartphone-based bridge management system that can avoid such inputting facilitate process. The enables inspector to complete information collection in portable smart phone. site photos related investigated structures be easily added edited during work with help of After investigation, report...

10.1115/smasis2016-9067 article EN 2016-09-28

The development of an intelligent transportation system (ITS) architecture has attracted increasing attention across the world because such provides a common reference for ITS community. Standardization procedures in is necessary and urgent architecture's inherent complexity, which requires involvement several teams. Although computer-aided systems engineering model widely adopted to accomplish parts task, so far no countries define strict, clear, applicable procedure aid This paper first...

10.3141/1910-06 article EN Transportation Research Record Journal of the Transportation Research Board 2005-01-01

Website fingerprinting can reveal which sensitive website a user visits over encrypted network traffic. Obfuscating traffic, e.g., adding dummy packets, is considered as primary approach to defend against fingerprinting. How-ever, existing defenses relying on traffic obfuscation are either ineffective or introduce significant overheads. As recent attacks heavily rely deep neural networks achieve high accuracy, producing adversarial examples could be utilized new way obfuscate Unfortunately,...

10.1109/iwqos54832.2022.9812875 article EN 2022-06-10
Coming Soon ...