Zuli Wang

ORCID: 0000-0002-5643-8576
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Experience-Based Knowledge Management
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • IoT and Edge/Fog Computing
  • Advanced Neural Network Applications
  • Complex Network Analysis Techniques
  • Advanced Text Analysis Techniques
  • Misinformation and Its Impacts
  • Environmental Engineering and Cultural Studies
  • Human Pose and Action Recognition
  • Vehicular Ad Hoc Networks (VANETs)
  • Smart Grid Security and Resilience
  • Currency Recognition and Detection
  • Robotics and Sensor-Based Localization
  • Brain Tumor Detection and Classification
  • Functional Brain Connectivity Studies
  • Technology Assessment and Management
  • Experimental Learning in Engineering
  • Advanced Image and Video Retrieval Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Autonomous Vehicle Technology and Safety
  • Technology and Security Systems

Chengdu University of Information Technology
2016-2025

China Jiliang University
2016

Jiangxi University of Science and Technology
2014

The power system is confronted with a variety of cybersecurity threats, such as False Data Injection Attacks(FDIA), Denial Service (DoS) attacks, and botnet which pose serious risks to the stable operation grid. Traditional model-based attack detection methods face limitations related parameter selection, computational efficiency, overall model performance, resulting in challenges enhancing effectiveness generalization ability these models. In this paper, we propose an based on Extremely...

10.1117/12.3056383 article EN 2025-02-17

The Internet of Things (IoT) has gained significant attention from industry as well academia during the past decade.The main reason behind this interest is capabilities IoT for seamlessly integrating classical networks and networked objects, hence allowing people to create an intelligent environment based on powerful integration. However, how extract useful information data produced by facilitate standard knowledge sharing among different systems are still open issues be addressed. In paper,...

10.1080/01969722.2016.1276771 article EN Cybernetics & Systems 2017-03-02

In this paper, we propose a Neural Knowledge DNA (NK-DNA)-based framework that is capable of learning from the car’s daily operations and reusing such learned knowledge in future tasks. The NK-DNA novel representation reasoning approach designed to support discovering, storing, reusing, improving, sharing among machines computing devices. We examine our for drivers’ classification based on their driving behaviors. experimental data are collected via smartphone sensors. initial results...

10.1080/01969722.2016.1276780 article EN Cybernetics & Systems 2017-03-02

This article researches on node importance ranking of multiplex network. Existing methods are amost monoplex network using only single relationship. However, in real life a person often has various relationships, so how to rank nodes is more realistic and meaningful. In this article, we propose method based weighted aggregation. Firstly, weight each layer by Analytic Hierarchy Process for existing aggregation either lack weighting process or rely artificial calculation rather than precise...

10.1109/fskd.2016.7603426 article EN 2016-08-01

The hemodynamic balloon model describes the change in coupling from underlying neural activity to observed blood oxygen level dependent (BOLD) response. It plays an increasing important role brain research using magnetic resonance imaging (MRI) techniques. However, changes BOLD signal are sensitive resting volume fraction (i.e., $$V_0$$ ) associated with regional vasculature. In previous studies value was arbitrarily set a physiologically plausible circumvent ill-posedness of inverse...

10.1186/s12938-016-0137-6 article EN cc-by BioMedical Engineering OnLine 2016-02-20

10.1166/jmihi.2015.1457 article EN Journal of Medical Imaging and Health Informatics 2015-06-11

Malicious web domains represent a serious threat to online users’ privacy and security, causing monetary loss, theft of private information, malware attacks, among others. In recent years, machine learning methods have been widely used as prediction models identify malicious domains. this study, we propose Fuzzy-Weighted Least Squares Support Vector Machine (FW-LS-SVM) model for domain identification. our proposed model, fuzzy-weighted operation is applied each data sample considering the...

10.3233/jifs-200943 article EN Journal of Intelligent & Fuzzy Systems 2021-07-20

The Internet of Things (IoT) has gained significant attention from industry as well academia during the past decade. Smartness, however, remains a substantial challenge for IoT applications. Recent advances in networked sensor technologies, computing, and machine learning have made it possible building new smart In this paper, we propose novel approach: Neural Knowledge DNA based Smart that enables to extract knowledge experiences, store, evolve, share, reuse such aiming functions. By...

10.1080/01969722.2019.1705545 article EN Cybernetics & Systems 2020-01-20

Video summarization can help people retrieve videos quickly. Existing unsupervised video models make insufficient use of frame uniqueness in the self-attention mechanism and have redundancy computation uniqueness. In this paper, we rethink relationship between attentive diversity frames, improve calculation method by masking adjacent information model framework based on a mechanism, simplify concentrated attention with it. addition, propose new loss function called Deviation loss, which uses...

10.1109/icnc-fskd59587.2023.10281113 article EN 2023-07-29

The prediction of emergency event occupies an important position in the network public opinion. In this paper, improved algorithm for based on statistics word frequency is presented, which takes BBS, blog, news sites with commentary function as investigated subjects. experiment shows it can provide useful ideas and exploration analysis opinion early warning mass group incidents.

10.1109/iceceng.2011.6057292 article EN International Conference on Electrical and Control Engineering 2011-09-01

In Chinese text clustering, short is very different from traditional long text, principally in the low frequency of word. As a result, feature extraction and method for weight calculating not directly suitable clustering. To solve problem clustering drift segments, this paper proposes an through improving based on words co-occurrence. Experiments show can get better performance short-text compared with TF-IDF.

10.1109/icetce.2012.66 article EN International Conference on Electric Technology and Civil Engineering 2012-05-18

Online learning is the main implementation of distance education and adult education. A pertinence timely online teaching intervention could determine persistence quality learning. However, existing mechanism mainly determined by teachers focus on offline which cannot be compatible with system well. In this paper we propose a model based behavior features. After interveners selection, adaptive measures generated in strategy library executed automated. We emphasis construction combines...

10.1145/3338147.3338171 article EN 2019-05-24

Abstract Intelligent vehicle is a complex system includes at least three parts of information, the vehicles themselves, driving surroundings and drivers which has different formats, properties, collection methods. These differences bring difficulties to communication knowledge sharing among drivers, also create barriers safety research. To address these problems, we propose novel intelligent framework contain all related information with clear hierarchical architecture unified SOEKS...

10.1088/1755-1315/428/1/012047 article EN IOP Conference Series Earth and Environmental Science 2020-01-01

With the development of deep learning, object detection has achieved rapid in recent years, and is widely used real-life scenarios such as face automatic driving. In field ship navigation safety, it necessary to identify whether some specific items appear wheelhouse help determine there a threat drive safety. These are usually small size require higher efficiency. To address this problem, paper proposes ship-specific item method that improves YOLOv5s algorithm. By introducing convolution...

10.1109/cyberc55534.2022.00044 article EN 2022-10-01
Coming Soon ...