Yi Wang

ORCID: 0000-0003-0171-2133
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Algorithms and Applications
  • Anomaly Detection Techniques and Applications
  • Face and Expression Recognition
  • Context-Aware Activity Recognition Systems
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Advanced Computational Techniques and Applications
  • Technology and Security Systems
  • Blockchain Technology Applications and Security
  • Distributed and Parallel Computing Systems
  • Robotic Path Planning Algorithms
  • Cloud Computing and Resource Management
  • Advanced Decision-Making Techniques
  • Smart Grid Security and Resilience
  • Educational Technology and Assessment
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Image Retrieval and Classification Techniques
  • Digital and Cyber Forensics
  • Advanced Sensor and Control Systems
  • Advanced Data Storage Technologies
  • Security and Verification in Computing
  • Image and Signal Denoising Methods
  • Smart Agriculture and AI
  • Spam and Phishing Detection

Hunan Agricultural University
2003-2024

University of Macau
2024

Manhattan College
2017-2023

Southern University of Science and Technology
2018-2022

University of Science and Technology of China
2021

Zhangjiakou Academy of Agricultural Sciences
2020

Xi'an Jiaotong University
2019

National University of Defense Technology
2019

Wuhan Business University
2019

Central South University
2018

False data injection cyber-physical threat is a typical integrity attack in modern smart grids. These days, analytical methods have been employed to mitigate false attacks (FDIAs), especially when large scale grids generate huge amounts of data. In this paper, novel method proposed detect FDIAs based on data-centric paradigm employing the margin setting algorithm (MSA). The performance demonstrated through simulation using six-bus power network wide area measurement system environment, as...

10.1109/access.2017.2769099 article EN cc-by-nc-nd IEEE Access 2017-01-01

Blockchain is a technology that ensures data security by verifying database of records established in decentralized and distributed network. Blockchain-based approaches have been applied to secure the fields Internet Things, software engineering, healthcare systems, financial services, smart power grids. However, blockchain system still major concern. We took initiative present systematic study which sheds light on what defensive strategies are used effectively. Specifically, we focus aims...

10.1109/access.2020.3047365 article EN cc-by IEEE Access 2020-12-25

Photos obtained via crowdsourcing can be used in many critical applications. Due to the limitations of communication bandwidth, storage, and processing capability, it is a challenge transfer huge amount crowdsourced photos. To address this problem, we propose framework, called <i>SmartPhoto</i> , quantify quality (utility) photos based on accessible geographical geometrical information (called <i>metadata </i> ) including smartphone's orientation, position, all related parameters built-in...

10.1109/tmc.2015.2444379 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2015-06-17

Abstract Efficiency, memory consumption and robustness are common problems with many popular methods for data analysis. As a solution, we present Random Bits Forest (RBF), classification regression algorithm that integrates neural networks (for depth), boosting width) random forests prediction accuracy). Through gradient scheme, it first generates selects ~10,000 small, 3-layer networks. These then fed into modified forest to obtain predictions. Testing datasets from the UCI (University of...

10.1038/srep30086 article EN cc-by Scientific Reports 2016-07-22

In this study, computer vision applicable to traditional agriculture was used achieve accurate identification of rice leaf diseases with complex backgrounds. The researchers developed the RiceDRA-Net deep residual network model and it identify four different diseases. disease test set a background named CBG-Dataset, new single constructed, SBG-Dataset, based on original dataset. Res-Attention module 3 × convolutional kernels denser connections compared other attention mechanisms reduce...

10.3390/app13084928 article EN cc-by Applied Sciences 2023-04-14

Based on the current research wine grape variety recognition task, it has been found that traditional deep learning models relying only a single feature (e.g., fruit or leaf) for classification can face great challenges, especially when there is high degree of similarity between varieties. In order to effectively distinguish these similar varieties, this study proposes multisource information fusion method, which centered SynthDiscrim algorithm, aiming achieve more comprehensive and accurate...

10.3390/s24092953 article EN cc-by Sensors 2024-05-06

Abstract Vitiligo is a common depigmentary skin disease that may follow pattern of multifactorial inheritance. The essential factors its immunopathogenesis thought to be the selective destruction melanocytes. As new class microregulators gene expression, mi RNA have been reported play vital roles in autoimmune diseases, metabolic diseases and cancer. This study sought characterize different expression peripheral blood mononuclear cells ( PBMC ) patients with non‐segmental vitiligo NSV...

10.1111/1346-8138.12725 article EN The Journal of Dermatology 2014-12-12

Integer-based vulnerability is an extremely serious bug for programs written in languages such as C/C++. However,in practice, very few software security tools can efficiently detect and accurately locate vulnerability. In addition, previous methods mainly depend on source code analysis recompilation which are impractical when protecting the program without code. this paper,we present design, implementation, evaluation of BRICK (binary run-time integer-based checker), a tool detecting...

10.1109/ares.2009.77 article EN 2009-01-01

Stock evaluation is a significant decision-making activity for investors. Due to the complexity of stock exchange market, information may be fuzzy and stochastic in meantime. Therefore, it essential conduct research on multi-criteria (FSMCDM ) methods. In this paper, at beginning, we propose interval neutrosophic probability from definition probability. Then, novel MCDM method proposed with based regret theory, which criteria values are numbers (INNs). The much better than methods using...

10.3233/jifs-17622 article EN Journal of Intelligent & Fuzzy Systems 2018-07-20

Bitcoin is a well-known cryptocurrency in which records of transactions are maintained by P2P network to create distributed ledger. Due the complex nature maintaining highly efficient, transparent and speed between nodes, security one primary concerns this system. The most prominent modern-day attacks system selfish mining double spending attacks. This survey organized around aspects pertaining countermeasures We selected total 20 studies from recent years as result systematic analysis...

10.1109/sarnoff47838.2019.9067821 article EN 2019-09-01

In short, the ubiquitous power Internet of Things is connection various devices and people in system. Specifically, firstly, it uses sensor technology to collect device-related data. Then, data sent server via communication technology. Finally, processed stored through big data, cloud computing, artificial intelligence other technologies. Therefore, user supply company can grasp relevant each link grid, realize transparency sharing The system a large with many related equipments complicated...

10.1109/ei247390.2019.9061975 article EN 2019-11-01

10.1007/s12652-020-02229-y article EN Journal of Ambient Intelligence and Humanized Computing 2020-06-21

Data stream processing has become a hot issue in recent years due to the arrival of big data era. There are three fundamental tasks: membership query, frequency query and Top-K query. While most existing solutions address these queries fixed windows, this paper focuses on more challenging task: answering sliding windows. different kinds by using algorithms, generic framework. In paper, we propose framework, namely Sliding sketches, which can be applied many for above queries, enable them...

10.1109/tkde.2022.3151140 article EN publisher-specific-oa IEEE Transactions on Knowledge and Data Engineering 2022-01-01

A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type attack pertains a coin being spent more in that one transaction the network. paper motivated by goal create can withstand attacks. way, honest miners will be able safely and securely exchange cryptocurrency. There currently lack valuable prevention methods network therefore we designed novel countermeasure combat attacks on system. We proposed MSP...

10.1109/uemcon47517.2019.8992991 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON) 2019-10-01

LSM-tree is widely used as a write-optimized storage engine in many NoSQL systems. However, the periodical compaction operations cost I/O bandwidths and CPU resources of local server, resulting throughput drops system. To address this issue, paper proposes new scheme based on FaaS (Functions Service) architecture, which called Compaction. It utilizes elastic computing capability always pushes compactions to cluster. The cluster will perform actual operations, not affect processing server....

10.1145/3459637.3481913 article EN 2021-10-26

This paper describes the application of SVM to breast cancer diagnosis, which has shown good generalization. We take use non-symmetrical C-SVM solve problem unbalanced training examples. In order gain a fast searching method for parameters model, margin-based bound on generalization is more effective than traditional k-fold cross-validation. After feature subset selection by cross-entry filter, we even gained perfect prediction accuracy.

10.1109/chicc.2006.280871 article EN Chinese Control Conference 2006-08-01

A wireless sensor network-based agricultural monitoring system was developed. Soil moisture and air temperature/humidity were monitored by nodes of the WSN. The collected information transmitted wirelessly to a gateway node which connected computer. Considering variable conditions under different applications, series field experiments conducted evaluate performance developed WSN system. communication distance, energy consumption data transmission tested three crop environments: greenhouse,...

10.1080/08327823.2014.11689881 article EN Journal of Microwave Power and Electromagnetic Energy 2014-01-01

In this paper, in order to improve the precision of short-term load forecasting, we propose a power forecasting method combined principal component analysis (PCA) with least squares support vector machine (LS-SVM). Firstly PCA extracts feature influence factors for load, and then LS-SVM constructs training model new variables extracted by PCA. After using PCA-LS-SVM paper proposed forecast one area, results show that can effectively eliminate redundant information among influential factors,...

10.4028/www.scientific.net/amr.756-759.4193 article EN Advanced materials research 2013-09-01

The network link speed is increasing at an alarming rate, which requires all functions on routers/switches to keep pace. Bloom filter a widely-used membership check data structure in applications. It also faces the urgent demand of improving performance speed. To this end, paper proposes new variant called Ultra-Fast Filters, by leveraging SIMD techniques. We make three improvements for UFBF accelerate First, we develop novel hash computation algorithm can compute multiple parallel with use...

10.1109/iwqos.2017.7969125 article EN 2017-06-01

10.1007/s13042-015-0387-9 article EN International Journal of Machine Learning and Cybernetics 2015-06-22

Blockchain as a novel technology which consists of peer-to-peer network, distributed consensus, cryptography and other fundamental knowledge. can help people build trust among untrusted people, will establish new application models in multiple areas. But there are several legacy problems obstruct the deployment development blockchain, biggest problem is blockchain performance that cannot process transactions much centralized server per second. We propose cascade structure for accelerate...

10.1109/hoticn.2018.8605959 article EN 2018-08-01

Intelligent environments is receiving lots of attention in the research community. With algorithms developed over years to model activity and pattern recognition, most are still not suitable for learning. Early was focused on home automation but recent moving towards an intelligent environment that capable identifying trends patterns make effective decisions. Making this feat a possibility requires extensive fields artificial intelligence, machine learning statistical These tools enable...

10.1109/uemcon.2018.8796766 article EN 2018-11-01

Activity recognition in smart environments is an important technology for assisted living and e-health. Recently there are growing interests applying machine learning algorithms to activity tasks. In this paper, we combine support vector (SVM) association rule improve the performance of based on streaming sensor data homes. The proposed approach allows us accurately identify boundaries, hence reducing errors system.

10.1109/icc.2016.7510732 article EN 2016-05-01

Support vector machine (SVM) is powerful to solve some problems such as nonlinear classification, function estimation and density estimation. To consider the chaotic fh (frequency hopping)-code's characters in dynamic system, forecasting model of support combination with Takens' delay coordinate phase reconstruction times established least squares for large-scale used local training this model. Finally, a fh-code series generated by Logistic-Kent mapping applied verify prediction Simulation...

10.1016/s1004-4132(08)60047-x article EN Journal of Systems Engineering and Electronics 2008-02-01
Coming Soon ...