Yahan Yang

ORCID: 0000-0003-3233-1720
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Time Series Analysis and Forecasting
  • Fault Detection and Control Systems
  • Topic Modeling
  • Image Processing Techniques and Applications
  • Machine Learning and Data Classification
  • Reservoir Engineering and Simulation Methods
  • Formal Methods in Verification
  • Optical Systems and Laser Technology
  • Image and Signal Denoising Methods
  • Enhanced Oil Recovery Techniques
  • Advanced Image Fusion Techniques
  • Hydraulic Fracturing and Reservoir Analysis
  • Software Reliability and Analysis Research
  • Medical Research and Treatments
  • ECG Monitoring and Analysis
  • Advanced Measurement and Detection Methods
  • Domain Adaptation and Few-Shot Learning
  • Neural Networks and Applications
  • Reproductive System and Pregnancy
  • Reproductive Biology and Fertility
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Industrial Vision Systems and Defect Detection
  • Photoacoustic and Ultrasonic Imaging

University of Pennsylvania
2022-2024

Philadelphia University
2023-2024

California University of Pennsylvania
2021-2023

Hebei Normal University of Science and Technology
2023

Guangzhou Sport University
2022

Northwest Normal University
2020-2022

Stanford University
2019-2021

Qingdao National Laboratory for Marine Science and Technology
2018

Uncertainty in the predictions of learning enabled components hinders their deployment safety-critical cyber-physical systems (CPS). A shift from training distribution a component (LEC) is one source uncertainty LEC's predictions. Detection this or out-of-distribution (OOD) detection on individual datapoints has therefore gained attention recently. But many applications, inputs to CPS form temporal sequence. Existing techniques for OOD time-series data either do not exploit relationships...

10.1145/3576841.3585931 article EN 2023-05-04

10.1007/s11042-022-12725-2 article EN Multimedia Tools and Applications 2022-03-23

As machine learning models continue to achieve impressive performance across different tasks, the importance of effective anomaly detection for such has increased as well. It is common knowledge that even well-trained lose their ability function effectively on out-of-distribution inputs. Thus, (OOD) received some attention recently. In vast majority cases, it uses distribution estimated by training dataset OOD detection. We demonstrate current detectors inherit biases in dataset,...

10.48550/arxiv.2302.11019 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Incorporating learning based components in the current state-of-the-art cyber-physical systems (CPS) has been a challenge due to brittleness of underlying deep neural networks. On bright side, if executed correctly with safety guarantees, this ability revolutionize domains like autonomous systems, medicine, and other safety-critical domains. This is because it would allow system designers use high-dimensional outputs from sensors camera LiDAR. The trepidation deploying vision LiDAR comes...

10.1145/3643892 article EN mit ACM Transactions on Cyber-Physical Systems 2024-02-06

The use of learning based components in cyber-physical systems (CPS) has created a gamut possible avenues to high dimensional real world signals generated from sensors like camera and LiDAR. ability process such can be largely attributed the adoption high-capacity function approximators deep neural networks. However, this does not come without its potential perils. pitfalls arise over-fitting, subsequent unsafe behavior when exposed unknown environments. One challenge is that, input spaces...

10.1109/iccps54341.2022.00027 article EN 2022-05-01

Deep neural network (DNN) models have proven to be vulnerable adversarial digital and physical attacks. In this paper, we propose a novel attack- dataset-agnostic real-time detector for both types of inputs DNN-based perception systems. particular, the proposed relies on observation that images are sensitive certain label-invariant transformations. Specifically, determine if an image has been adversarially manipulated, checks output target classifier given input changes significantly after...

10.1145/3450267.3450535 article EN 2021-04-01

As designs grow in size and complexity, design verification becomes one of the most difficult costly tasks facing teams. Formal techniques offer great promise because their ability to exhaustively explore behaviors. However, formal also have a reputation for being labor-intensive limited small blocks. Is there any hope successful application at scale? We answer this question affirmatively by digging deeper understand what real technological issues opportunities are. First, we look...

10.1109/iccad45719.2019.8942096 article EN 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2019-11-01

10.2118/duplicate-106464-ms article EN Proceedings of SPE Reservoir Simulation Symposium 2007-02-01

Uncertainty in the predictions of learning-enabled components hinders their deployment safety-critical cyber-physical systems (CPS). A shift from training distribution a component (LEC) is one source uncertainty LEC’s predictions. Detection this or out-of-distribution (OOD) detection on individual datapoints has therefore gained attention recently. But many applications, inputs to CPS form temporal sequence. Existing techniques for OOD time-series data either do not exploit relationships...

10.1145/3648005 article EN ACM Transactions on Cyber-Physical Systems 2024-02-13

Recently it has been shown that state-of-the-art NLP models are vulnerable to adversarial attacks, where the predictions of a model can be drastically altered by slight modifications input (such as synonym substitutions). While several defense techniques have proposed, and adapted, discrete nature text benefits general-purpose regularization methods such label smoothing for language models, not studied. In this paper, we study robustness provided strategies in foundational diverse tasks both...

10.18653/v1/2023.acl-short.58 article EN cc-by 2023-01-01

The performance of machine learning models can significantly degrade under distribution shifts the data. We propose a new method for classification which improve robustness to shifts, by combining expert knowledge about ``high-level" structure data with standard classifiers. Specifically, we introduce two-stage classifiers called memory First, these identify prototypical points -- memories cluster training This step is based on features designed guidance; instance, image they be extracted...

10.48550/arxiv.2206.05323 preprint EN cc-by-nc-sa arXiv (Cornell University) 2022-01-01

Abstract Pulse-coupled neural network (PCNN) model is widely used in digital image processing, but it always a difficult problem to set parameters and determine the optimal segmentation. By analyzing firing characteristics setting for non-coupled linking PCNN, we propose an improved PCNN The introduce coupling effect of neighboring neurons into dynamic threshold subsystem, using combination DNN network, manual adjusting on step length initial value. When value adjusted properly, segmentation...

10.1088/1757-899x/790/1/012130 article EN IOP Conference Series Materials Science and Engineering 2020-03-01

10.2523/duplicate-106464-ms article EN Proceedings of SPE Reservoir Simulation Symposium 2007-02-01

Cyber-physical systems (CPS) with learning-enabled components suffer from reduced performance under distribution shift. In this paper, we consider the problem of motion prediction within an autonomous racing setting. such a setting, ability to predict adversaries' behavior is essential for safe and efficient planning. We propose method using memories detect anomalous input incrementally learn model online, quickly adapt unseen behaviors. our experiments, demonstrate effectiveness approach in...

10.1145/3576841.3589627 article EN 2023-05-04

Deep neural networks (DNNs) have the ability to transform inference with medical data. However, large DNN models need sufficient labeled data be effective at generalization. This involves considerable manual efforts generate quality in copious amounts for hungry learning tasks. Data programming addresses this issue by using weak labeling functions obtained from experts label unlabeled Such now become a key component pipeline. A step further direction is ask question: it possible...

10.1145/3576841.3589620 article EN 2023-05-04

BabyBERTa, a language model trained on small-scale child-directed speech while none of the words are unmasked during training, has been shown to achieve level grammaticality comparable that RoBERTa-base, which is 6,000 times more and 15 parameters. Relying this promising result, we explore in paper performance BabyBERTa-based models downstream tasks, focusing Semantic Role Labeling (SRL) two Extractive Question Answering with aim building efficient systems rely less data smaller models. We...

10.18653/v1/2023.emnlp-main.30 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2023-01-01

Optical fiber laser hydrophone which has more research potentiality and value owing to higher acoustic pressure sensitivity, smaller size lower difficulty of multiplexing. However the detecting capacity low frequency signal optical will be limited because noise such as 1/f thermal pumped laser. In order suppress these noises, iterative discrete wavelet transformation algorithm was designed used multi-scale trait transform. The different spectral components underwater were separated noises...

10.1117/12.2505484 article EN 2018-12-12

Deep neural network (DNN) models have proven to be vulnerable adversarial digital and physical attacks. In this paper, we propose a novel attack- dataset-agnostic real-time detector for both types of inputs DNN-based perception systems. particular, the proposed relies on observation that images are sensitive certain label-invariant transformations. Specifically, determine if an image has been adversarially manipulated, checks output target classifier given input changes significantly after...

10.48550/arxiv.2002.09792 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Nowadays, due to some internal conflicts such as political and economic problems, especially religional intervention by other great powers, wars racial oppression have occured even lead a large number of citizens turing be refugees, finally here comes global refugee problems.In this paper, the author, through method literature review, focues on relationship between international refugees human rights, finds out available ways solve it extent.Through research, author there are several kind...

10.2991/assehr.k.220504.292 article EN cc-by-nc Advances in Social Science, Education and Humanities Research/Advances in social science, education and humanities research 2022-01-01

Recently it has been shown that state-of-the-art NLP models are vulnerable to adversarial attacks, where the predictions of a model can be drastically altered by slight modifications input (such as synonym substitutions). While several defense techniques have proposed, and adapted, discrete nature text benefits general-purpose regularization methods such label smoothing for language models, not studied. In this paper, we study robustness provided various strategies in foundational diverse...

10.48550/arxiv.2212.10258 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...