- Advanced Neural Network Applications
- Image and Signal Denoising Methods
- Advanced Image and Video Retrieval Techniques
- Domain Adaptation and Few-Shot Learning
- Advanced Numerical Analysis Techniques
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Mathematical Analysis and Transform Methods
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Cavitation Phenomena in Pumps
- ECG Monitoring and Analysis
- Anomaly Detection Techniques and Applications
- Advanced Image Processing Techniques
- Geological and Geochemical Analysis
- Adversarial Robustness in Machine Learning
- Advanced Malware Detection Techniques
- Geochemistry and Geologic Mapping
- EEG and Brain-Computer Interfaces
- Engineering Education and Technology
- Wireless Body Area Networks
- Digital Filter Design and Implementation
- Robotics and Sensor-Based Localization
- Traffic Prediction and Management Techniques
- Earthquake Detection and Analysis
Tianjin University of Technology
2025
National University of Singapore
2023-2024
State Key Laboratory of Robotics and Systems
2021-2024
Harbin Institute of Technology
2021-2024
Changchun Institute of Technology
2019-2024
Hohai University
2013-2024
National Transportation Research Center
2024
Oak Ridge National Laboratory
2024
Sichuan University
2024
Purdue University West Lafayette
2023
The electroencephalogram (EEG) signals based on the Brian-computer Interface (BCI) equipment is weak, non-linear, non-stationary and time-varying, so an effective feature extraction method key to improving recognition accuracy. Electrooculogram electrocardiogram artifacts are common noises in process of EEG acquisition, it seriously affects useful information. This paper proposes a processing by combing independent component analysis (ICA), wavelet transform (WT) spatial pattern (CSP)....
<title>Abstract</title> With the widespread popularity of IoT applications, devices are increasingly becoming targets cyber attacks. Existing intrusion detection systems usually face computing resource limitations and accuracy challenges when facing complex, high-dimensional attack traffic data. Therefore, this paper proposes a lightweight framework STFNIoT based on interpretable analysis spatiotemporal fusion networks, which combines principal component (PCA) deep learning models to address...
Industrial Internet of Things (IIoT) is a fusion industrial automation systems and IoT systems. It features comprehensive sensing, interconnected transmission, intelligent processing, self-organization self-maintenance. Its applications span transportation, smart factories, intelligence. Many areas such as power grid environment detection. With the widespread application IIoT technology, cyber security threats to are increasing day by day, information issues have become major challenge in...
Neural architecture search (NAS) can have a significant impact in computer vision by automatically designing optimal neural network architectures for various tasks. A variant, binarized (BNAS), with space of convolutions, produce extremely compressed models. Unfortunately, this area remains largely unexplored. BNAS is more challenging than NAS due to the learning inefficiency caused optimization requirements and huge space. To address these issues, we introduce channel sampling operation...
This paper focuses on motion planning for mobile manipulators, which includes both the base and manipulator. A hierarchical planner is proposed that allows manipulator to change its configuration autonomously in real time as needed. The has two levels: global dimensions local three dimensions. first generates a path using an optimized A* algorithm. As moves along with unchanged, potential collisions between environment are checked data obtained from on-board sensors. If current collision,...
SMS4 is a 32-round block cipher with 128-bit size and user key. This paper presents rolling unrolling field programmable gate array implementation of the algorithm, both encryption decryption algorithms have been implemented on same FPGA. The design for area requires 1552 ALMs, maximum operating clock 139MHz corresponding data throughput about 539 Mbit/s. speed 8373 162 MHz 20736 Our has good balance between high performance low complexity in as result taking advantage certain features...
Facing the increasingly fierce international competition, it has been core of higher education to explore how cultivate college students with innovative ability. College students' ability is mainly composed basic ability, thinking and actions. In conformity above composition, cultivation pattern should include learning knowledge, training thoughts skills. The practice in school, independent social serve as three main sections development addition, some effective methods are beneficial for...
An efficient operation of the electric shared mobility system (ESMS) relies heavily on seamless interconnections among vehicles (SEV), vehicle supply equipment (EVSE), and grid. Nevertheless, this interconnectivity also makes ESMS vulnerable to cyberattacks that may cause short-term breakdowns or long-term degradation ESMS. This study focuses one such attack with long-lasting effects, Delayed Charge Attack (DCA), stealthily delays charging service by exploiting physical communication...
Empowering 3D Gaussian Splatting with generalization ability is appealing. However, existing generalizable methods are largely confined to narrow-range interpolation between stereo images due their heavy backbones, thus lacking the accurately localize and support free-view synthesis across wide view range. In this paper, we present a novel framework FreeSplat that capable of reconstructing geometrically consistent scenes from long sequence input towards synthesis.Specifically, firstly...
Precise prediction of irrigation volumes is crucial in modern agriculture. This study proposes an optimized long short-term memory (LSTM) model-based method that combines bidirectional LSTM networks. The model provides farmers with more precise management decisions, facilitating optimal utilization water resources and effective crop production management. proposed aims to fully exploit spatio-temporal features sequence dependencies enhance accuracy reliability. We aim leverage volumes'...
Abstract Under non-design operating conditions, pump-turbines often exhibit notable instabilities within their runner regions. This study endeavors to investigate the spatial distribution patterns of vortex structures occurring between blade channels, focusing on different guide vane opening conditions in turbine mode a model pump-turbine. Based rigid vorticity vectors, large-scale channels were analysed. Additionally, this proposes novel approach that utilizes relative streamline...
Neural architecture search (NAS) proves to be among the best approaches for many tasks by generating an application-adaptive neural architectures, which are still challenged high computational cost and memory consumption. At same time, 1-bit convolutional networks (CNNs) with binarized weights activations show their potential resource-limited embedded devices. One natural approach is use CNNs reduce computation of NAS taking advantage strengths each in a unified framework. To this end,...
3D scene segmentation based on neural implicit representation has emerged recently with the advantage of training only 2D supervision. However, existing approaches still requires expensive per-scene optimization that prohibits generalization to novel scenes during inference. To circumvent this problem, we introduce a generalizable framework representation. Specifically, our takes in multi-view image features and semantic maps as inputs instead spatial information avoid overfitting...
Abstract Pump turbines under off-design operating conditions can generate significant vortex structures that cause hydraulic instability in the unit. The aim of this study is to investigate spatial distribution large-scale rigid runner blade channels a model pump turbine operated different head with fixed guide vane opening mode. A new method proposed utilizes relative streamline coordinate system based on mean camber line and provides unique perspective quantify intensity various physical...
Web robots or web crawlers have become the major source of traffic. While some are well-behaving such as search engines, others can perform DDoS attacks, which put great threats on websites. Effectively detecting will benefit not only for network traffic cleaning, but also improving cybersecurity IoT enabled systems and services. To get state arts in robot detection, this paper reviews recent decade research robot/crawler detection techniques compares their performances identify challenges...
Object in-hand reorientation is widely known to be crucial for robotic dexterous manipulation, and the stable of object with two-fingered gripper challenging. In this paper, completed using a commercial integrated force/torque sensors. The identification models status (slipping pivoting status) are built based on friction theory. In-hand provides an important guarantee reorientation. Moreover, we propose control framework under action gravity. This make slip or pivot by continuously...