Hanlin Chen

ORCID: 0000-0002-7868-6028
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Image and Signal Denoising Methods
  • Advanced Image and Video Retrieval Techniques
  • Domain Adaptation and Few-Shot Learning
  • Advanced Numerical Analysis Techniques
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Mathematical Analysis and Transform Methods
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • Cavitation Phenomena in Pumps
  • ECG Monitoring and Analysis
  • Anomaly Detection Techniques and Applications
  • Advanced Image Processing Techniques
  • Geological and Geochemical Analysis
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Geochemistry and Geologic Mapping
  • EEG and Brain-Computer Interfaces
  • Engineering Education and Technology
  • Wireless Body Area Networks
  • Digital Filter Design and Implementation
  • Robotics and Sensor-Based Localization
  • Traffic Prediction and Management Techniques
  • Earthquake Detection and Analysis

Tianjin University of Technology
2025

National University of Singapore
2023-2024

State Key Laboratory of Robotics and Systems
2021-2024

Harbin Institute of Technology
2021-2024

Changchun Institute of Technology
2019-2024

Hohai University
2013-2024

National Transportation Research Center
2024

Oak Ridge National Laboratory
2024

Sichuan University
2024

Purdue University West Lafayette
2023

The electroencephalogram (EEG) signals based on the Brian-computer Interface (BCI) equipment is weak, non-linear, non-stationary and time-varying, so an effective feature extraction method key to improving recognition accuracy. Electrooculogram electrocardiogram artifacts are common noises in process of EEG acquisition, it seriously affects useful information. This paper proposes a processing by combing independent component analysis (ICA), wavelet transform (WT) spatial pattern (CSP)....

10.1016/j.aej.2021.10.034 article EN cc-by-nc-nd Alexandria Engineering Journal 2021-11-01

<title>Abstract</title> With the widespread popularity of IoT applications, devices are increasingly becoming targets cyber attacks. Existing intrusion detection systems usually face computing resource limitations and accuracy challenges when facing complex, high-dimensional attack traffic data. Therefore, this paper proposes a lightweight framework STFNIoT based on interpretable analysis spatiotemporal fusion networks, which combines principal component (PCA) deep learning models to address...

10.21203/rs.3.rs-5880612/v1 preprint EN cc-by Research Square (Research Square) 2025-01-28

Industrial Internet of Things (IIoT) is a fusion industrial automation systems and IoT systems. It features comprehensive sensing, interconnected transmission, intelligent processing, self-organization self-maintenance. Its applications span transportation, smart factories, intelligence. Many areas such as power grid environment detection. With the widespread application IIoT technology, cyber security threats to are increasing day by day, information issues have become major challenge in...

10.1109/icvris.2019.00095 article EN 2019-09-01

Neural architecture search (NAS) can have a significant impact in computer vision by automatically designing optimal neural network architectures for various tasks. A variant, binarized (BNAS), with space of convolutions, produce extremely compressed models. Unfortunately, this area remains largely unexplored. BNAS is more challenging than NAS due to the learning inefficiency caused optimization requirements and huge space. To address these issues, we introduce channel sampling operation...

10.1609/aaai.v34i07.6624 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

This paper focuses on motion planning for mobile manipulators, which includes both the base and manipulator. A hierarchical planner is proposed that allows manipulator to change its configuration autonomously in real time as needed. The has two levels: global dimensions local three dimensions. first generates a path using an optimized A* algorithm. As moves along with unchanged, potential collisions between environment are checked data obtained from on-board sensors. If current collision,...

10.3390/s23156952 article EN cc-by Sensors 2023-08-04

SMS4 is a 32-round block cipher with 128-bit size and user key. This paper presents rolling unrolling field programmable gate array implementation of the algorithm, both encryption decryption algorithms have been implemented on same FPGA. The design for area requires 1552 ALMs, maximum operating clock 139MHz corresponding data throughput about 539 Mbit/s. speed 8373 162 MHz 20736 Our has good balance between high performance low complexity in as result taking advantage certain features...

10.1109/icess.symposia.2008.76 article EN 2008-07-01

Facing the increasingly fierce international competition, it has been core of higher education to explore how cultivate college students with innovative ability. College students' ability is mainly composed basic ability, thinking and actions. In conformity above composition, cultivation pattern should include learning knowledge, training thoughts skills. The practice in school, independent social serve as three main sections development addition, some effective methods are beneficial for...

10.5539/ies.v3n2p51 article EN cc-by International Education Studies 2010-04-15

An efficient operation of the electric shared mobility system (ESMS) relies heavily on seamless interconnections among vehicles (SEV), vehicle supply equipment (EVSE), and grid. Nevertheless, this interconnectivity also makes ESMS vulnerable to cyberattacks that may cause short-term breakdowns or long-term degradation ESMS. This study focuses one such attack with long-lasting effects, Delayed Charge Attack (DCA), stealthily delays charging service by exploiting physical communication...

10.1109/tits.2023.3287792 article EN IEEE Transactions on Intelligent Transportation Systems 2023-06-28

10.1016/j.compeleceng.2016.02.004 article EN Computers & Electrical Engineering 2016-02-25

Empowering 3D Gaussian Splatting with generalization ability is appealing. However, existing generalizable methods are largely confined to narrow-range interpolation between stereo images due their heavy backbones, thus lacking the accurately localize and support free-view synthesis across wide view range. In this paper, we present a novel framework FreeSplat that capable of reconstructing geometrically consistent scenes from long sequence input towards synthesis.Specifically, firstly...

10.48550/arxiv.2405.17958 preprint EN arXiv (Cornell University) 2024-05-28

Precise prediction of irrigation volumes is crucial in modern agriculture. This study proposes an optimized long short-term memory (LSTM) model-based method that combines bidirectional LSTM networks. The model provides farmers with more precise management decisions, facilitating optimal utilization water resources and effective crop production management. proposed aims to fully exploit spatio-temporal features sequence dependencies enhance accuracy reliability. We aim leverage volumes'...

10.7717/peerj-cs.2112 article EN cc-by PeerJ Computer Science 2024-06-13

Abstract Under non-design operating conditions, pump-turbines often exhibit notable instabilities within their runner regions. This study endeavors to investigate the spatial distribution patterns of vortex structures occurring between blade channels, focusing on different guide vane opening conditions in turbine mode a model pump-turbine. Based rigid vorticity vectors, large-scale channels were analysed. Additionally, this proposes novel approach that utilizes relative streamline...

10.1088/1742-6596/2752/1/012065 article EN Journal of Physics Conference Series 2024-06-01

Neural architecture search (NAS) proves to be among the best approaches for many tasks by generating an application-adaptive neural architectures, which are still challenged high computational cost and memory consumption. At same time, 1-bit convolutional networks (CNNs) with binarized weights activations show their potential resource-limited embedded devices. One natural approach is use CNNs reduce computation of NAS taking advantage strengths each in a unified framework. To this end,...

10.24963/ijcai.2020/144 article EN 2020-07-01

3D scene segmentation based on neural implicit representation has emerged recently with the advantage of training only 2D supervision. However, existing approaches still requires expensive per-scene optimization that prohibits generalization to novel scenes during inference. To circumvent this problem, we introduce a generalizable framework representation. Specifically, our takes in multi-view image features and semantic maps as inputs instead spatial information avoid overfitting...

10.48550/arxiv.2310.15712 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Abstract Pump turbines under off-design operating conditions can generate significant vortex structures that cause hydraulic instability in the unit. The aim of this study is to investigate spatial distribution large-scale rigid runner blade channels a model pump turbine operated different head with fixed guide vane opening mode. A new method proposed utilizes relative streamline coordinate system based on mean camber line and provides unique perspective quantify intensity various physical...

10.1088/1742-6596/2707/1/012058 article EN Journal of Physics Conference Series 2024-02-01

Web robots or web crawlers have become the major source of traffic. While some are well-behaving such as search engines, others can perform DDoS attacks, which put great threats on websites. Effectively detecting will benefit not only for network traffic cleaning, but also improving cybersecurity IoT enabled systems and services. To get state arts in robot detection, this paper reviews recent decade research robot/crawler detection techniques compares their performances identify challenges...

10.1109/cybersecurity49315.2020.9138856 article EN 2020-06-01

Object in-hand reorientation is widely known to be crucial for robotic dexterous manipulation, and the stable of object with two-fingered gripper challenging. In this paper, completed using a commercial integrated force/torque sensors. The identification models status (slipping pivoting status) are built based on friction theory. In-hand provides an important guarantee reorientation. Moreover, we propose control framework under action gravity. This make slip or pivot by continuously...

10.1109/jsen.2021.3100149 article EN IEEE Sensors Journal 2021-07-26
Coming Soon ...