Heyuan Shi

ORCID: 0000-0002-9040-7247
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Software Testing and Debugging Techniques
  • Security and Verification in Computing
  • Energy Harvesting in Wireless Networks
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Cognitive Radio Networks and Spectrum Sensing
  • Embedded Systems Design Techniques
  • IoT and Edge/Fog Computing
  • Advanced MIMO Systems Optimization
  • Quantum Computing Algorithms and Architecture
  • Software System Performance and Reliability
  • Advanced Neural Network Applications
  • Alzheimer's disease research and treatments
  • Network Packet Processing and Optimization
  • Web Data Mining and Analysis
  • Algorithms and Data Compression
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Data Storage Technologies
  • Formal Methods in Verification
  • Real-Time Systems Scheduling
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Tryptophan and brain disorders

Central South University
2022-2024

National University of Defense Technology
2024

Tsinghua University
2016-2023

Hubei University of Chinese Medicine
2019-2023

Alibaba Group (China)
2022

D.F. Chebotarev Institute of Gerontology
2020

Ministry of Public Security of the People's Republic of China
2018

At present, convolutional neural networks (CNNs) have become popular in visual classification tasks because of their superior performance. However, CNN-based methods do not consider the correlation data to be classified. Recently, graph (GCNs) mitigated this problem by modeling pairwise relationship data. Real-world typically must address numerous complex relationships data, which are fit for structure using GCNs. Therefore, it is vital explore underlying Regarding issue, we propose a...

10.1109/tnnls.2018.2869747 article EN IEEE Transactions on Neural Networks and Learning Systems 2018-10-02

Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being continuously developed validation contracts, testing EVM remains challenging because special test input format absence oracles. In this paper, we propose EVMFuzzer, first tool that uses differential fuzzing technique detect EVM. The core idea generate seed feed them target benchmark EVMs, so as find many inconsistencies...

10.1145/3338906.3341175 article EN 2019-08-09

Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being developed validation contracts, security EVM have not been well-studied. In this paper, we propose EVMFuzz, aiming detect EVMs with differential fuzz testing. The core idea EVMFuzz continuously generate seed different EVMs' execution, so as find many inconsistencies among execution results possible, eventually discover...

10.1002/smr.2556 article EN Journal of Software Evolution and Process 2023-03-26

Privacy-preserving data aggregation (PPDA) enables availability and privacy preservation simultaneously in smart grid. However, existing methods, such as masking homomorphic encryption, cannot offer strong preservation, fault tolerance for both meters aggregators, verifiable aggregation, lightweight encryption. To tackle these challenges, we design HTV-PRE, a threshold proxy re-encryption scheme with verifiability. HTV-PRE involves only linear operations resists quantum attacks after being...

10.1109/tdsc.2023.3252593 article EN IEEE Transactions on Dependable and Secure Computing 2023-03-06

Due to the material variations of lithium-ion cells and fluctuations in their manufacturing precision, differences exist electrochemical characteristics cells, which inevitably lead a reduction available capacity premature failure battery pack with multiple configured series, parallel, series–parallel. Screening that have similar overcome inconsistency among is challenging problem. This paper proposes an approach for lithium -ion cell screening using convolutional neural networks (CNNs)...

10.1109/access.2018.2875514 article EN cc-by-nc-nd IEEE Access 2018-01-01

Learning-based clone detection is widely exploited for binary vulnerability search. Although they solve the problem of high time overhead traditional dynamic and static search approaches to some extent, their accuracy limited, need manually identify true positive cases among top-M results during industrial practice. This paper presents VulSeeker-Pro, an enhanced seeker that integrates function semantic emulation at back end learning, release engineers from manual identification work. It...

10.1145/3236024.3275524 article EN 2018-10-26

Abstract Background Suan-Zao-Ren Decoction (SZRD) has been widely used to treat neurological illnesses, including dementia, insomnia and depression. However, the mechanisms underlying SZRD’s improvement in cognitive function remain unclear. In this study, we examined effect on APP/PS1 transgenic mice associated with action alleviating neuroinflammation improving synaptic plasticity. Methods The were treated different dosages of SZRD (12.96 25.92 g/kg/day, L-SZRD H-SZRD groups, respectively)...

10.1186/s13020-021-00425-2 article EN cc-by Chinese Medicine 2021-01-21

While massive efforts have been investigated in adversarial testing of convolutional neural networks (CNN), for recurrent (RNN) is still limited and leaves threats vast sequential application domains. In this paper, we propose an framework RNN-Test RNN systems, focusing on sequence-to-sequence (seq2seq) tasks widespread deployments, not only classification First, design a novel search methodology customized models by maximizing the inconsistency states against their inner dependencies to...

10.1109/tse.2021.3114353 article EN IEEE Transactions on Software Engineering 2021-09-21

Introduction Existing evidence suggests an association between certain vitamins and metabolic syndrome (MetS), but few epidemiological studies have focused on the effects of multivitamin co-exposure MetS. This study aims to investigate associations individual or multiple water-soluble (i.e., vitamin C (VC), B9 (VB9), B12 (VB12)) with MetS, as well dose-response relationships among them. Methods A cross-sectional was conducted by employing National Health Examination Surveys (NHANESs)...

10.3389/fendo.2023.1167317 article EN cc-by Frontiers in Endocrinology 2023-05-12

Automatic protocol reverse engineering is essential for various security applications.While many existing techniques achieve this task by analyzing static network traces, they face increasing challenges due to their dependence on high-quality samples.This paper introduces DYNPRE, a tool that exploits the interactive capabilities of servers obtain more semantic information and additional traffic dynamic inference.DYNPRE first processes initial input traces learns rules interacting with server...

10.14722/ndss.2024.24083 article EN 2024-01-01

Coverage-guided kernel fuzzing is a widely-used technique that has helped developers and testers discover numerous vulnerabilities. However, due to the high complexity of application hardware environment, there little study on deploying enterprise-level Linux kernel. In this paper, collaborating with enterprise developers, we present industry practice deploy four different distributions are responsible for internal business external services company. We have addressed following outstanding...

10.1145/3338906.3340460 article EN 2019-08-09

Vulnerable code clones in the operating system (OS) threaten safety of smart industrial environment, and most vulnerable OS clone detection approaches neglect correlations between functions that limits effectiveness. In this article, we propose a two-phase framework to find by learning on functions. On training phase, as set are extracted from latest repository function features derived their AST structure. Then, external internal explored graph modeling Finally, convolutional network for...

10.1109/tii.2019.2929739 article EN IEEE Transactions on Industrial Informatics 2019-07-18

Electricity Theft Detection (ETD) based on deep learning can detect abnormal electricity consumption behaviors by analyzing user historical data. However, existing ETD schemes conduct neural network inferencing in plaintext without strong privacy guarantees, moreover, none has considered the of proprietary models from electric utilities. To address those issues, we introduce p2Detect, a privacy-preserving scheme via over encrypted p2Detect works two-party setting where model is held Server...

10.1109/tsg.2022.3214194 article EN IEEE Transactions on Smart Grid 2022-10-12

The spread of misinformation on social media is a serious issue that can have negative consequences for public health and political stability. While detecting identifying be challenging, many attempts been made to address this problem. However, traditional models focus pairwise relationships propagation paths may not effective in capturing the underlying connections among multiple tweets. To limitation, proposed “Conversation-Branch-Tweet” hypergraph convolutional network (CBT-HGCN) uses...

10.1145/3610297 article EN ACM Transactions on Knowledge Discovery from Data 2023-07-28

Embedded operating systems (Embedded OSs) are extensively deployed in many mission-critical industrial scenarios. Any defects within these may result unacceptable losses. Therefore, it is imperative to develop tools detect bugs OSs, thus minimizing potential impacts on infrastructures. Coverage-guided fuzzing a vulnerability detection technique that has found numerous real-world vulnerabilities both application programs as well kernels. However, state-of-the-art kernel fuzzers, e.g.,...

10.1109/tcad.2022.3198910 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022-11-01

Quantum Neural Network (QNN) combines the Deep Learning (DL) principle with fundamental theory of quantum mechanics to achieve machine learning tasks acceleration. Recently, QNN systems have been found manifest robustness issues similar classical DL systems. There is an urgent need for ways test their correctness and security. However, differ significantly from traditional software systems, posing critical challenges testing. These include inapplicability testing methods due differences in...

10.1145/3688840 article EN ACM Transactions on Software Engineering and Methodology 2024-08-19
Coming Soon ...