Qiao Hu

ORCID: 0000-0002-6483-1431
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Flood Risk Assessment and Management
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Remote Sensing in Agriculture
  • Remote Sensing and LiDAR Applications
  • Security in Wireless Sensor Networks
  • Land Use and Ecosystem Services
  • Atomic and Molecular Physics
  • Advanced Authentication Protocols Security
  • Cryptographic Implementations and Security
  • RFID technology advancements
  • Wireless Signal Modulation Classification
  • Advanced Chemical Physics Studies
  • Adversarial Robustness in Machine Learning
  • Peatlands and Wetlands Ecology
  • Disaster Management and Resilience
  • Wildlife-Road Interactions and Conservation
  • Automated Road and Building Extraction
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Advanced Steganography and Watermarking Techniques
  • Nuclear physics research studies
  • Landslides and related hazards

Hunan University
2019-2025

City University of Hong Kong
2015-2024

Hong Kong Polytechnic University
2024

University of Nebraska–Lincoln
2016-2024

Xi'an Jiaotong University
2024

Southwestern University of Finance and Economics
2024

Academy of Mathematics and Systems Science
2024

Shandong University of Science and Technology
2021-2023

Guangdong University of Technology
2023

Jinggangshan University
2023

Security is a key problem for the transmission, interchange, and storage process of multimedia systems applications. In 2018, Li et al. proposed in-depth security analysis on an image encryption algorithm based first-order time-delay system (IEATD) gave specific chosen-plaintext attack it. Moreover, enhanced version called as IEACD was designed to fix reported defects. This article analyzes essential structures two algorithms evaluates their real performances: 1) no efficient nonlinear...

10.1109/mmul.2021.3114589 article EN IEEE Multimedia 2021-09-22

Recent developments in Unmanned Aircraft Vehicles (UAVs), thermal imaging, and Auto-machine learning (AutoML) have shown high potential for precise wildlife surveys but rarely been studied habitat assessment. Here, we propose a framework that leverages these advanced techniques to achieve cost-effective quality assessment from the perspective of actual community usage. The exploits vision intelligence hidden UAV images AutoML methods distribution mapping, then derives use indicators imply...

10.3390/rs16061081 article EN cc-by Remote Sensing 2024-03-20

10.1109/icassp49660.2025.10889113 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Nonrelativistic energies for the low-lying states of lithium are calculated using variational method in Hylleraas coordinates. Variational eigenvalues infinite nuclear mass case with up to 34 020 terms $\ensuremath{-}7.478\phantom{\rule{0.16em}{0ex}}060\phantom{\rule{0.16em}{0ex}}323\phantom{\rule{0.16em}{0ex}}910\phantom{\rule{0.16em}{0ex}}147(1)$ a.u. $1{s}^{2}2s{\phantom{\rule{0.16em}{0ex}}}^{2}\phantom{\rule{-0.16em}{0ex}}S$,...

10.1103/physreva.85.052513 article EN Physical Review A 2012-05-24

The rising machine learning (ML) models have become the preferred way for landslide detection based on remote sensing images, but performance of these in a sample-free area are rarely concerned many studies. In this study, we used cross-validation method (training model one and validation another) to compare portability trained ML applied an “off-site” area, as consideration ability areas. We integrate nighttime light imagery, multi-seasonal optical Landsat time-series digital elevation...

10.3390/rs11212530 article EN cc-by Remote Sensing 2019-10-29

Physical-layer key agreement is used to generate a shared between devices on demand. Such schemes utilize the characteristics of wireless channel from device-to-device channel. As all are time-dependent and location-dependent, it hard for eavesdroppers get key. However, most research works in this area use passive attack models whereas active attacks that aim at manipulating also possible. with User Introduced Randomness (PHYUIR) solution similar Diffie-Hellman protocol against such kind...

10.1109/tii.2019.2923662 article EN IEEE Transactions on Industrial Informatics 2019-06-19

We present improved calculations of variational energy eigenvalues for the $1{s}^{2}2s {}^{2}S$, $1{s}^{2}3s and $1{s}^{2}2p {}^{2}P$ states lithium using basis sets with up to 30 224 terms in Hylleraas coordinates. The nonrelativistic energies infinite nuclear mass are $\ensuremath{-}7.478 060 323 910 143 7(45)$ a.u. $\ensuremath{-}7.354 098 421 444 316 4(32)$ $\ensuremath{-}7.410 156 532 651 6(5)$ {}^{2}P$, which represent most accurate upper bounds date. An important advantage multiple...

10.1103/physreva.83.034503 article EN Physical Review A 2011-03-25

When authenticating a group of radio-frequency identification tags, common method is to authenticate each tag with some challenge-response exchanges. However, sequentially individual tags one by might not be desirable, especially when considering that reader often has deal multiple within limited period, since it will incur long scanning time and heavy communication costs. To address these problems, we put forward novel efficient authentication protocol, where can authenticated...

10.1109/jiot.2021.3059047 article EN IEEE Internet of Things Journal 2021-02-13

Conservation easements (CEs) play an important role in the provision of ecological services. This paper aims to use open-access Sentinel-2 satellites advance existing conservation management capacity a new level near-real-time monitoring and assessment for Nebraska. research uses machine learning Google Earth Engine classify inundation status using imagery during 2018–2021 all CE sites Nebraska, USA. The proposed approach helps monitor at landscape scale efficient low-cost manner. results...

10.3390/rs14174382 article EN cc-by Remote Sensing 2022-09-03

Woody plant encroachment into grasslands ecosystems causes significantly ecological destruction and economic losses. Effective efficient management largely benefits from accurate timely detection of encroaching species at an early development stage. Recent advances in unmanned aircraft systems (UAS) enabled easier access to ultra-high spatial resolution images a centimeter level, together with the latest machine learning based image segmentation algorithms, making it possible detect...

10.3390/rs13101975 article EN cc-by Remote Sensing 2021-05-19

Physical layer key agreement is a new kind of schemes used to generate shared between pervasive and resource constrained devices. These utilize the characteristics wireless channel key. As all are time-depend location-depend, it hard for eavesdroppers get But lacks research on active attacks which aim at manipulating PHY-UIR (PHYsical with User Introduced Randomness) only paper proposes solution in detail against such attacks. In this paper, we propose attack can not prevent. We call session...

10.1109/icit.2017.7915573 article EN 2022 IEEE International Conference on Industrial Technology (ICIT) 2017-03-01

Liquid scintillators are commonly used to detect low energy neutrinos from the reactors, sun, and earth. It is a challenge reconstruct deposited energies for large liquid scintillator detector. For detectors with multiple optical mediums such as JUNO SNO+, prediction of propagation detected photons extremely difficult due mixed processes Rayleigh scattering, refraction total reflection at their boundaries. Calibration based reconstruction methods consume impractical time since number...

10.1088/1748-0221/14/03/p03009 article EN Journal of Instrumentation 2019-03-08

The epidemiological features of the Klebsiella pneumoniae causing bloodstream infections in Hong Kong and their potential threats to human health remained unknown. K. strains collected from four hospitals during period 2009-2018 were subjected molecular typing, string test, antimicrobial susceptibility testing, whole genome sequencing analysis. Clinical data patients whom these isolated analyzed retrospectively using univariate multivariate logistic regression approaches. 240 spp. belonged...

10.1016/j.ebiom.2024.104998 article EN cc-by-nc-nd EBioMedicine 2024-02-09

This paper explores the design of an architecture that replaces Disk with Persistent Memory (PM) to achieve highest I/O throughput in Log-Structured Merge Tree (LSM-Tree) based key-value stores (KVS). Most existing LSM-Tree KVSs use PM as intermediate or smoothing layer, which fails fully exploit PM's unique advantages maximize throughput. However, due distinct characteristics, such byte addressability and short erasure time, simply replacing storage does not yield optimal performance....

10.1109/tc.2024.3377914 article EN IEEE Transactions on Computers 2024-03-18
Coming Soon ...