Yizhao Huang

ORCID: 0000-0002-7291-3920
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image Enhancement Techniques
  • Advanced Malware Detection Techniques
  • Water Quality Monitoring Technologies
  • Remote Sensing and LiDAR Applications
  • Network Security and Intrusion Detection
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Advanced Image Fusion Techniques
  • Visual Attention and Saliency Detection
  • Image and Signal Denoising Methods
  • Cybercrime and Law Enforcement Studies
  • Optical Coherence Tomography Applications
  • Artificial Immune Systems Applications
  • Solid State Laser Technologies
  • Random lasers and scattering media
  • Phytochemicals and Antioxidant Activities
  • Optical Polarization and Ellipsometry
  • Luminescence Properties of Advanced Materials
  • Hate Speech and Cyberbullying Detection
  • Video Surveillance and Tracking Methods
  • Plant Physiology and Cultivation Studies
  • Optical measurement and interference techniques
  • Glass properties and applications
  • Generative Adversarial Networks and Image Synthesis
  • Pomegranate: compositions and health benefits

Sichuan University
2024

Tianjin University
2022

Zaozhuang University
2021

Foshan University
2021

Underwater images always suffer from low contrast and color distortion due to the wavelength-dependent scattering absorption effects caused by particles existing in turbid water, especially high turbidity conditions. Based on polarization properties of backscattering light, polarimetric methods can estimate intensity level transmittance media. Accordingly, they separate target signal undesired ones achieve high-quality imaging. In addition, learning-based are effective for gray-model image...

10.3389/fmars.2022.1031549 article EN cc-by Frontiers in Marine Science 2022-11-28

A flat 2.0 μm ultra broadband emission with a full width at half maximum (FWHM) of 329 nm is achieved in 1 mol.% Tm2O3 and 0.05 Ho2O3 co-doped gallium tellurite glasses upon the excitation an 808 laser diode. The influence Tm3+ Ho3+ contents on spectroscopic properties minutely investigated by absorption spectra, lifetime measurement. In addition, cross section gain coefficient ions are calculated, values reach 8.2 × 10−21 cm2 1.54 cm−1, respectively. Moreover, forward backward energy...

10.3390/cryst11020190 article EN cc-by Crystals 2021-02-15

Currently, among the millions of Android applications, there exist numerous malicious programs that pose significant threats to people’s security and privacy. Therefore, it is imperative develop approaches for detecting malware. Recently developed malware detection methods usually rely on various features, such as application programming interface (API) sequences, images, permissions, thereby ignoring importance source code associated comments, which are not included in we propose...

10.3390/electronics11050672 article EN Electronics 2022-02-22

Automatic malware detection was aimed at determining whether the application is malicious or not with automated systems. Android attacks have gained tremendous pace owing to widespread use of mobile devices. Although significant progress has been made in antimalware techniques, these methods mainly rely on program features, ignoring importance source code analysis. Furthermore, dynamic analysis low coverage and poor efficiency. Hence, we propose an automatic approach, named HyGNN-Mal. It...

10.1155/2022/7245403 article EN Wireless Communications and Mobile Computing 2022-05-11

Topology inference driven by non-collaborative or incomplete prior knowledge is widely used in pivotal target network sieving and completion. However, perceivable topology also allows attackers to identify the fragile bottlenecks perform efficacious attacks that are difficult defend against injecting indistinguishable low-volume attacks. Most existing countermeasures proposed obfuscate data set up honeypots with adversarial examples. there two challenges when adding perturbations live links...

10.2139/ssrn.4758548 preprint EN 2024-01-01

In this Letter, we introduce a self-supervised depth estimation method based on polarization binocular imaging. First, an end-to-end disparity network is utilized to estimate the left and right disparities from stereo view images. Next, design loss functions that facilitate training of network, eliminating need for labeled data. The framework fully leverages strengths both effectiveness proposed algorithm validated using real underwater polarized

10.1364/opticaopen.27917082.v3 preprint EN 2024-11-29

In this Letter, we introduce a self-supervised depth estimation method based on polarization binocular imaging. First, an end-to-end disparity network is utilized to estimate the left and right disparities from stereo view images. Next, design loss functions that facilitate training of network, eliminating need for labeled data. The framework fully leverages strengths both effectiveness proposed algorithm validated using real underwater polarized

10.1364/opticaopen.27917082.v2 preprint EN 2024-11-28

In this Letter, we introduce a self-supervised depth estimation method based on polarization binocular imaging. First, an end-to-end disparity network is utilized to estimate the left and right disparities from stereo view images. Next, design loss functions that facilitate training of network, eliminating need for labeled data. The framework fully leverages strengths both effectiveness proposed algorithm validated using real underwater polarized

10.1364/opticaopen.27917082.v1 preprint EN 2024-11-28

In this Letter, we introduce a self-supervised depth estimation method based on polarization binocular imaging. First, an end-to-end disparity network is utilized to estimate the left and right disparities from stereo view images. Next, design loss functions that facilitate training of network, eliminating need for labeled data. The framework fully leverages strengths both effectiveness proposed algorithm validated using real underwater polarized

10.1364/opticaopen.27917082 preprint EN 2024-11-28

In this Letter, we introduce a self-supervised depth estimation method based on polarization binocular imaging. First, an end-to-end disparity network is utilized to estimate the left and right disparities from stereo view images. Next, design loss functions that facilitate training of network, eliminating need for labeled data. The framework fully leverages strengths both effectiveness proposed algorithm validated using real underwater polarized

10.1364/opticaopen.27917082.v4 preprint EN 2024-11-29

Pomegranate flowers as row materials were used for extraction of polysaccharides by water-extraction and alcohol-precipitation method. After purification, the physical chemical properties, structure, monosaccharide composition molecular weight studied. The results showed that from pomegranate mainly contained two kinds water soluble acidic polysaccharides, arabinose galactose, both hydroxyl, carboxyl, amino, hydroxyl radical, sulfate, beta glycosidic bond alpha structure. PP1 PP2 6.16 × 104...

10.4236/as.2021.122005 article EN Agricultural Sciences 2021-01-01

The use of natural language processing to analyze binary data is a popular research topic in malware analysis. Embedding code into vector an important basis for building analysis neural network model. Current solutions focus on embedding instructions or basic block sequences vectors with recurrent models utilizing graph algorithm control flow graphs annotated generate representation vectors. In analysis, most these studies only the single structural information and rely one corpus. It...

10.3390/electronics11060940 article EN Electronics 2022-03-17

With the rapid development of information technology, scale software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting plagiarism, vulnerabilities discovery, and copyright solution issues. Nevertheless, what cannot be ignored is that a variety approaches to binary semantic representation have been introduced recently, but few can catch up with existing obfuscation techniques due their maturing extensive...

10.1155/2022/4095481 article EN Wireless Communications and Mobile Computing 2022-06-24

Utilizing NLP methods in malware classification or clustering applications is a hotspot analysis. Binary embedding has become an important direction and basis for Existing binary vectorizing cannot extract semantic functional information simultaneously, which may affect the performance of family clustering. In this paper, novel feature fusion representation method proposed based on PV -DM (Paragraph Vector-Distributed Memory) model, K-Means algorithm adopted The combines features...

10.1109/cisce55963.2022.9851172 article EN 2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) 2022-05-27
Coming Soon ...