Yun Wang

ORCID: 0000-0002-8220-9726
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Cryptography and Data Security
  • Rough Sets and Fuzzy Logic
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Time Series Analysis and Forecasting
  • Data Mining Algorithms and Applications
  • Cloud Data Security Solutions
  • Advanced Computational Techniques and Applications
  • Cryptography and Residue Arithmetic
  • CCD and CMOS Imaging Sensors
  • Hearing Loss and Rehabilitation
  • Advanced Database Systems and Queries
  • Data Management and Algorithms
  • Human Pose and Action Recognition
  • Adversarial Robustness in Machine Learning
  • Membrane-based Ion Separation Techniques
  • Advanced Numerical Analysis Techniques
  • Music and Audio Processing
  • Internet Traffic Analysis and Secure E-voting
  • Domain Adaptation and Few-Shot Learning
  • Imbalanced Data Classification Techniques
  • Data Stream Mining Techniques
  • Blockchain Technology Applications and Security
  • Brain Tumor Detection and Classification

Institute of Automation
2024

Chinese Academy of Sciences
2023-2024

Tianjin University
2017-2024

Shandong Institute of Automation
2023

State Administration of Cultural Heritage
2022

Shandong University of Technology
2010-2020

University of Jinan
2012

Capital Normal University
2010

Qinghai University
2009-2010

Nanchang Institute of Technology
2010

Convolutional neural networks (CNNs) have been widely deployed in computer vision tasks. However, the computation and resource intensive characteristics of CNN bring obstacles to its application on embedded systems. MobileNet, as a representative compact models, can reduce amount parameters computation. A high-performance inference accelerator FPGA for MobileNet is proposed this paper. With respect three types convolution operations, multiple parallel strategies are exploited corresponding...

10.1109/fpl53798.2021.00011 article EN 2021-08-01

Identifying the same persons across different views plays an important role in many vision applications. In this paper, we study problem, denoted as Multi-view Multi-Human Association (MvMHA), on multi-view images that are taken by cameras at time. Different from previous works human association two views, paper is focused more general and challenging scenarios of than none these fixed or priorly known. addition, each involved person may be present all only a subset which also not We develop...

10.1109/tip.2021.3139178 article EN IEEE Transactions on Image Processing 2022-01-01

The post-training quantization (PTQ) is a common technology to improve the efficiency of embedded neural network accelerators. Existing PTQ schemes for CNN activations usually rely on calibration dataset with good data representation reduce overflow in inference, which not always effective due large variation and uncertainty inference input practice. This paper proposes an adaptive method (AQA), monitors activations, adaptively updates parameters, re-quantizes on-the-fly when degree over...

10.1109/tc.2024.3398503 article EN IEEE Transactions on Computers 2024-05-09

The post-training compression based on affine quantization is a common technology to improve the efficiency of embedded neural network accelerators. Current state-of-the-art schemes for CNN activations usually rely calibration dataset with better data representation reduce possibility overflow in inference, which not always effective due uncertainty inference input practice. This paper proposes an adaptive method and its hardware-friendly design directly address inference. monitors...

10.1109/iscas46773.2023.10181695 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2023-05-21

Blockchain is a distributed database with tamper-evident and decentralized data structure. However, due to the huge amount of in blockchain, storage costs are high. In an effort minimize expenses, it necessary choose most pertinent features for preservation on blockchain. Therefore, effective feature selection method can quickly accurately select representative features, which reduce redundancy blockchain upload effectively confirm rights. This paper puts forth algorithm (i.e. FS_NGRE) based...

10.1109/icbctis59921.2023.00019 article EN 2023-06-01

The work presents an efficient identification threshold signature scheme based on the elliptic curve cryptosystem, with a view to optimizing these techniques for implementation within network. (Any t out of n users in group can represent this sign signature) as compared existing public key system RSA and ELGmal, our need less parameters but provide more super security. Moreover it is constructed two base points other only one point. distinguishing feature proposed that value denotes minimum...

10.1109/icime.2010.5478163 article EN 2010-01-01

Although statistical modeling techniques have been employed to detect anomaly intrusion and profile user behavior with network traffic data collected from multi-sites (IP addresses), the minimum sample size of audit required for each site is unclear. Using Intrusion Detection Evaluation off-line developed by Lincoln Laboratory at Massachusetts Institute Technology under Defense Advanced Research Projects Agency, this study aimed address challenge determining size. Bivariate analysis was...

10.4018/jbdcn.2006070103 article EN International Journal of Business Data Communications and Networking 2006-07-01

Proxy signature can be combined other special to obtain some new types of proxy signature. Threshold is a variant the Most existing threshold schemes based on certificate-based public key systems. But, in cases, receiver cannot find out who signed signatures. In this paper, we put forward novel identity-based scheme from bilinear pairings without dealer. Using our scheme, original signer know generated and certify actuality group signers. Moreover, constructions would simpler but still with...

10.1109/icmss.2009.5304884 article EN 2009-09-01

This paper takes the driver as research object, establishes a vehicle driving data set based on driver's emotions, builds support vector machine (SVM) model to recognize anger.And effects of linear kernel function, polynomial gaussian function and sigmoid recognition result SVM are discussed separately.The results show that is completely unsuitable for anger recognition.The has best effect, which accuracy rate, recall rate F1 score significantly higher than other functions, not much...

10.24214/jecet.c.9.3.52836 article EN Journal of Environmental Science Computer Science and Engineering & Technology 2020-08-26

In the real world applications, those basic decision rules inducted using rough set theory can't match a new object, so it always make an accurate for object. order to improve matching ability of algorithm which generates approximate more efficiently is proposed in this article and applied field filtering spam based on theory. The results experimental test showed that obtained by can enhance mail. So paper believed be effective feasible.

10.1109/grc.2010.12 article EN 2010-08-01

Abstract To describe rough differential equations in function model, a series of new concepts are proposed by generalizing theory difference and ordinary into model. Based on these basic concepts, fundamental properties linear solutions discussed four principles superposition put forward, which lay foundations for solving methods equations. Several insufficiencies original respectively pointed out improved. Three types typical given. According to characteristics different equations,...

10.4156/aiss.vol4.issue17.49 article EN INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 2012-09-30

The auto-commissioning system of engineering equipment requires real-time identification the working mode with whole product. Determine whether there is any abnormality in commissioning process according to parameter standards each mode, evaluate compliance rate commissioning. In this article, determined by Toeplitz Inverse Covariance-based Clustering (TICC) and time series data are segmented clustered. Each TICC defined a Markov Random Field (MRF), which characterizes interdependence...

10.1117/12.2627120 article EN 2022-02-15

The post-training compression with quantization is a common technology to improve the efficiency of embedded neural network accelerators. In this paper, Dynamic Quantization in Inference (DQI) method proposed solve severe overflow problem that may occur CNN inference process. Based on analysis errors activation values convolutional layers, efficient detection and parameters dynamic update are designed implemented accelerator. evaluation result VGG16 MobileNetV2 models demonstrates DQI can...

10.1109/fccm53951.2022.9786195 article EN 2022-05-15
Coming Soon ...