Shuai He

ORCID: 0000-0003-3541-4599
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Numerical Analysis Techniques
  • Advanced Measurement and Metrology Techniques
  • Advanced machining processes and optimization
  • Advanced Malware Detection Techniques
  • Advanced Surface Polishing Techniques
  • Advanced Image Processing Techniques
  • Advanced Image and Video Retrieval Techniques
  • Robotics and Sensor-Based Localization
  • Image Processing Techniques and Applications
  • Software Testing and Debugging Techniques
  • Advanced Neural Network Applications
  • Machine Learning and ELM
  • Adversarial Robustness in Machine Learning
  • Software Engineering Research
  • Advanced Vision and Imaging
  • Artificial Intelligence in Games
  • Thermoregulation and physiological responses
  • Anomaly Detection Techniques and Applications
  • Gyrotron and Vacuum Electronics Research
  • RFID technology advancements
  • Biochemical and Structural Characterization
  • Hate Speech and Cyberbullying Detection
  • E-commerce and Technology Innovations
  • Domain Adaptation and Few-Shot Learning
  • Radiomics and Machine Learning in Medical Imaging

Huazhong University of Science and Technology
2019-2024

City College of Dongguan University of Technology
2021-2024

Nanjing University of Chinese Medicine
2023

Xi'an University of Technology
2021

University of Science and Technology Beijing
2020

Hubei University
2020

Minzu University of China
2019

South China University of Technology
2018

State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering
2010

Abstract With the globalization of global economy, protection intangible cultural heritage is facing a crisis survival. Intangible crystallization wisdom working people country in past dynasties, with strong national characteristics. Applying digital technology to can promote inheritance, transformation and application heritage. Since China put forward information development strategy, it has become more practical use protect Due imperfection management mechanism format specification, as...

10.1088/1742-6596/1915/3/032048 article EN Journal of Physics Conference Series 2021-05-01

Recent methods have demonstrated that machine learning (ML) based static malware detection models are vulnerable to adversarial attacks. However, the generated often fails generalize production-level anti-malware software (AMS), as they usually involve multiple methods. This calls for universal solutions problem of variants generation. In this work, we demonstrate how proposed method, MalwareTotal, has allowed continue abound in ML-based, signature-based, and hybrid software. Given a...

10.1145/3597503.3639141 article EN 2024-04-12

In the RFID system, tag collision problem seriously affects efficiency of identification. Among anti-collision algorithms, tree-based algorithms are popular for reason that they can ensure tags theoretically 100% be identified by readers. As multi-reader scenarios more and widely used in complex internet things environments, there slots idle traditional which algorithm. We propose a interactive algorithm (TMIA) identification to solve problems above. Readers optimize broadcast prefix...

10.1109/access.2020.2991027 article EN cc-by IEEE Access 2020-01-01

The vast majority of indoor navigation algorithms either rely on manual scene augmentation and labelling or exploit multi-sensor fusion techniques in achieving simultaneous localization mapping (SLAM), leading to high computational costs, hardware complexities robustness deficiencies. This paper proposes an efficient robust deep learning-based framework for robots. Firstly, we put forward end-to-end trainable siamese convolutional neural network (DCNN) which decomposes into orientation one...

10.1145/3268866.3268886 article EN 2018-08-18

Researches on computer games for Go, Chess, and Japanese Chess stand out as one of the notable landmarks in progress artificial intelligence. AlphaGo, AlphaGo Zero, AlphaZero algorithms, which are called style (AZ-style) algorithms some literature [1], have achieved superhuman performance by using deep reinforcement learning (DRL). However, unavailability training details, expensive equipment used model training, low evaluation accuracy resulted slow self-play without computing practical...

10.1109/access.2019.2938568 article EN cc-by IEEE Access 2019-01-01

Abstract Using multi‐task learning to extract code features can effectively increase the information of features. However, existing methods mainly have two limitations: (1) They cannot enough code‐related or only similar semantic Similar makes in increased insufficiently. high difference is challenging converge. (2) train on heterogeneous datasets. In standard training, we need label all tasks for data, which consumes enormous labor. To solve above limitations, select tasks, cross‐language...

10.1002/spe.3094 article EN Software Practice and Experience 2022-05-16

Abstract The continuous development of the information age promotes transformation teaching methods, and forms students’ learning receiving knowledge are also constantly updated. In this paper, virtual reality technology is used to realize deep integration traditional culture ideological political education from three aspects course: objectives, content process, design a three-dimensional animation classroom. particle swarm algorithm optimize acquisition resources integrate best that...

10.2478/amns-2024-3453 article EN cc-by Applied Mathematics and Nonlinear Sciences 2024-01-01

Abstract It has gradually become a trend to infiltrate the knowledge of non-heritage culture and inherit spirit ethnic crafts in art education colleges universities. The purpose this paper is discuss significance universities, problems faced by integration into transmission path We hope enhance deep connection between college increasing research efforts, so that students will pay attention preservation pass on studies. This develops cultivation intangible cultural heritage through...

10.2478/amns.2023.1.00217 article EN cc-by Applied Mathematics and Nonlinear Sciences 2023-06-03

Target-guided navigation establishes the foundation for efficiently addressing vision-based multi-agent coordination robotics. This work proposes a multi-objective deep convolution network which consists of two parallel branches built atop shared feature extractor. The proposed is capable concurrently constructing semantic maps while achieving efficient visual detection designated guider robot or landmark towards outdoor navigation. In order to achieve low latency requirements controller,...

10.1145/3234804.3234823 article EN 2018-06-27
Coming Soon ...