Yipeng Wang

ORCID: 0000-0003-2092-8888
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Parallel Computing and Optimization Techniques
  • Network Packet Processing and Optimization
  • AI in cancer detection
  • Guidance and Control Systems
  • Metaheuristic Optimization Algorithms Research
  • Robotic Path Planning Algorithms
  • Topic Modeling
  • Adaptive Control of Nonlinear Systems
  • 3D Shape Modeling and Analysis
  • Spacecraft Dynamics and Control
  • Military Defense Systems Analysis
  • Computer Graphics and Visualization Techniques
  • Radiation Effects in Electronics
  • Advanced Vision and Imaging
  • Advanced Algorithms and Applications
  • Advanced Multi-Objective Optimization Algorithms
  • Topological and Geometric Data Analysis
  • Advanced Malware Detection Techniques
  • Natural Language Processing Techniques
  • Statistical and Computational Modeling
  • Recommender Systems and Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Memory and Neural Computing

Ocean University of China
2025

Qingdao National Laboratory for Marine Science and Technology
2025

Chinese Academy of Medical Sciences & Peking Union Medical College
2019-2024

Harbin Institute of Technology
2023-2024

Beijing Institute of Technology
2011-2024

Peking Union Medical College Hospital
2024

Ji Hua Laboratory
2021-2024

Columbia University
2024

The University of Texas at Austin
2024

China Jiliang University
2023

In network-centric warfare, the interconnections among various combat resources enable an advanced operational pattern of cooperative engagement. The effectiveness and outcome strongly depends on reasonable utilization available sensors weapons. this paper, a mathematical model for coallocation weapons is built, taking into account interdependencies between sensors, resource constraints, capability as well strategy constraints. A marginal-return-based constructive heuristic (MRBCH) proposed...

10.1109/tsmc.2017.2784187 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2018-01-08

Trustworthy software requires strong privacy and security guarantees from a secure trust base in hardware. While chipmakers provide hardware support for basic primitives such as enclaves memory encryption. these do not address hiding of the access pattern, information about which may enable attacks on system or reveal characteristics sensitive user data. State-of-the-art approaches to protecting pattern are largely based Oblivious RAM (ORAM). Unfortunately, current ORAM implementations...

10.1145/3079856.3080230 article EN 2017-06-15

We show scalar-mean curvature rigidity of warped products round spheres dimension at least 2 over compact intervals equipped with strictly log-concave warping functions. This generalizes earlier results Cecchini-Zeidler to all dimensions. Moreover, we scalar 3 two antipodal points removed. resolves a problem in Gromov's ''Four Lectures'' Our arguments are based on spin geometry.

10.3842/sigma.2024.035 article EN cc-by-sa Symmetry Integrability and Geometry Methods and Applications 2024-04-18

Abstract Predicting marine biogeochemical data is an effective method to solve the problem of data‐scarcity and provides support for fundamental research in science. Machine learning techniques are commonly used improve stability accuracy predicting biogeochemistry data. However, current methods based on Random Forest (RF) Artificial Neural network (ANN) often struggle effectively capture intricate features ocean data, resulting suboptimal prediction accuracy. In this study, we develop a...

10.1029/2024jg008386 article EN other-oa Journal of Geophysical Research Biogeosciences 2025-03-01

Spoken Language Understanding (SLU) aims to interpret the meanings of human speeches in order support various human-machine interaction systems. A key technique for SLU is Automatic Speech Recognition (ASR), which transcribes speech signals into text contents. As output texts modern ASR systems unavoidably contain errors, mainstream models either trained or tested on transcribed by would not be sufficiently error robust. We present ARoBERT, an Robust BERT model, can fine-tuned solve a...

10.1109/taslp.2022.3153268 article EN IEEE/ACM Transactions on Audio Speech and Language Processing 2022-01-01

To address the problems of strong coupling and large hysteresis in temperature control a continuously stirred tank reactor (CSTR) process, an improved sparrow search algorithm (ISSA) is proposed to optimize PID parameters. The improvement aims solve population diversity reduction easy-to-fall-into local optimal solutions when traditional close global optimum. This differs from other algorithms by adding new Gauss Cauchy mutation strategy at end each iteration without increasing time...

10.3390/pr11051302 article EN Processes 2023-04-22

Application-level protocol specifications are helpful for network security management, including intrusion detection and prevention which rely on monitoring technologies such as deep packet inspection. Moreover, detailed knowledge of is also an effective way detecting malicious code. However, current methods obtaining unknown proprietary message formats (i.e., no publicly available specification), especially binary protocols, highly manual operations, reverse engineering time-consuming...

10.1109/pdcat.2011.25 article EN 2011-10-01

Classification and regression trees have long been used for cancer diagnosis prognosis. Nevertheless, instability variable selection bias, as well overfitting, are well-known problems of tree-based methods. In this article, we investigate whether ensemble tree classifiers can ameliorate these difficulties, using data from two recent studies radical prostatectomy in prostate cancer.Using time to progression following the relevant clinical endpoint, found that robustly reproducibly identified...

10.1093/bioinformatics/btn354 article EN Bioinformatics 2008-07-15

As the number of cores in a multicore system increases, core-to-core (C2C) communication is increasingly limiting performance scaling workloads that share data frequently. The traditional way communicate by using shared memory space between them. However, fundamentally involves coherence invalidations and cache misses, which cause large overheads incur high amount network traffic. Many important significant C2C are affected significantly costs, including pipelined packet processing widely...

10.1145/2967938.2967954 article EN 2016-08-31

The close spatial and temporal connection between osteogenesis angiogenesis around type H vasculature is referred as "osteogenesis-angiogenesis coupling", which one of the basic mechanisms osteogenesis. Endothelial cells (ECs), bone marrow mesenchymal stem (BMSCs), their specific lineage constitute important cluster that participate in regulation microenvironment. However, regulatory mechanism osteogenesis-angiogenesis coupling under condition healing has not been unveiled. In this study, we...

10.1186/s12951-024-03002-5 article EN cc-by-nc-nd Journal of Nanobiotechnology 2024-11-19

While pressure forces are often the bottleneck in (near-)inviscid fluid simulations, viscosity can impose orders of magnitude greater computational costs at lower Reynolds numbers. We propose an implicit octree finite difference discretization that significantly accelerates solution free surface equations using adaptive staggered grids, while supporting viscous buckling and rotation effects, variable viscosity, interaction with scripted moving solids. In experimental comparisons against...

10.1145/3306346.3322939 article EN ACM Transactions on Graphics 2019-07-12

The network community always pays its attention to find better methods for traffic classification, which is crucial Internet Service Providers (ISPs) provide QoS users. Prior works on classification mainly focus their attentions dividing into different categories based application layer protocols (such as HTTP, Bit Torrent etc.). Making from another point of view, we divide content types. Our technology an attempt solve the problem traffic, contains unknown and proprietary (i.e., no publicly...

10.1109/nas.2011.18 article EN 2011-07-01

This article investigates the joint allocation problem of stochastic resources (JASRs), which is widely found in complex systems. A general mathematical model for multiple heterogeneous built, capturing interdependencies between resources, quantity constraints, capability and strategy constraints resources. An adaptive memetic algorithm (MA) proposed JASR, multipermutation encoding method developed to denote assignment schemes different Multiple permutation-based operators are employed...

10.1109/tcyb.2021.3087363 article EN IEEE Transactions on Cybernetics 2021-06-29

Cryptographic hardware modules, by exhibiting unique power and EM signatures, are vulnerable to Side Channel Attacks (SCAs) revealing secret keys. Prior countermeasures based on port [1] –[4] masking [5] incur significant area overheads or often not amenable scaling ASIC flow integration. work clock randomization [6] can cause SoC timing verification integration challenges. asynchronous AES implementations [7] rely dual-rail completion detection round-key-unwrap, which expensive in...

10.1109/isscc49657.2024.10454574 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2024-02-18

Because of the widespread Trojan, Internet users become more and vulnerable to threat information leakage. Traditional techniques Trojan detection were classified into two main categories: host-based network-based. Unfortunately, existing are insufficient limited, because following reasons: (1)only uncover known while inefficiently detecting novel samples, (2) should be adjusted in a timely fashion even trivial change is applied, (3)become computationally expensive. In our work, we focus on...

10.1109/nas.2012.10 article EN 2012-06-01

The memory subsystem (memory controller, bus, andDRAM) is becoming a bottleneck in computer system performance. Optimizing the design of multicore requires good understanding representative workload. A common practice designing to rely on trace simulation. However, conventional method relying traditional traces faces two major challenges. First, many software users are apprehensive about sharing their code (source or binaries) due proprietary nature secrecy data, so sometimes not available....

10.1109/pact.2015.36 article EN 2015-10-01

This paper studies the orbital pursuit-evasion-defense problem with continuous low thrust propulsion. A control strategy for pursuer is proposed based on fuzzy comprehensive evaluation and differential game. First, system described by Lawden’s equations, simplified introducing relative state variables zero effort miss (ZEM) variables. Then, objective function of designed evaluation, analytical necessary conditions optimal are presented. Finally, a hybrid method combining multi-objective...

10.3390/app9153190 article EN cc-by Applied Sciences 2019-08-05

The open circuit voltage (OCV) and model parameters are critical reference variables for a lithium-ion battery management system estimating the state of charge (SOC) accurately. However, polarization effect reduces accuracy OCV test, coupled to increase non-linearity cell model, all challenging SOC estimation. This paper presents an curve fusion method based on incremental low-current test. Fusing test results without low current with non-linear characteristics electrodes, improves curve’s...

10.3390/app10041264 article EN cc-by Applied Sciences 2020-02-13

Multi-task learning has been widely applied in computational vision, natural language processing and other fields, which achieved well performance. In recent years, a lot of work about multi-task recommender system yielded, but there is no previous literature to summarize these works. To bridge this gap, we provide systematic survey systems, aiming help researchers practitioners quickly understand the current progress direction. survey, first introduce background motivation learning-based...

10.48550/arxiv.2305.13843 preprint EN cc-by arXiv (Cornell University) 2023-01-01
Coming Soon ...