Mengdie Huang

ORCID: 0000-0003-3705-7345
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Mineral Processing and Grinding
  • Video Coding and Compression Technologies
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Security and Verification in Computing
  • Information and Cyber Security
  • Adversarial Robustness in Machine Learning
  • Tunneling and Rock Mechanics
  • Internet Traffic Analysis and Secure E-voting
  • Domain Adaptation and Few-Shot Learning
  • Thermography and Photoacoustic Techniques
  • International Business and FDI
  • Energy Efficiency and Management
  • Cloud Data Security Solutions
  • Smart Grid Security and Resilience
  • Blind Source Separation Techniques
  • Optimization and Search Problems
  • Reliability and Maintenance Optimization
  • Occupational Health and Safety Research
  • Guidance and Control Systems
  • Sparse and Compressive Sensing Techniques
  • Quality and Supply Management
  • Ga2O3 and related materials
  • Elevator Systems and Control

Shanghai University
2025

Xidian University
2022-2025

Purdue University West Lafayette
2024-2025

Guilin University of Electronic Technology
2014-2024

Shanghai Jiao Tong University
2018-2022

Yancheng Institute of Technology
2020

Communication University of China
2018

Huaiyin Institute of Technology
2016

Network intrusion detection systems based on deep learning are gaining significant traction in cyber security due to their high prediction accuracy and strong adaptability evolving threats. However, a serious drawback is vulnerability evasion attacks that rely adversarial examples. To provide robustness guarantees for neural networks against any possible perturbations, certified defenses perturbations within l p -bounded region around the input being increasingly explored. Unfortunately,...

10.1145/3715121 article EN ACM Transactions on Privacy and Security 2025-04-16

Internet of Things (IoT) cyber threats, exemplified by jackware and crypto mining, underscore the vulnerability IoT devices. Due to multi-step nature many attacks, early detection is vital for a swift response preventing malware propagation. However, accurately detecting early-stage attacks challenging, as attackers employ stealthy, zero-day, or adversarial machine learning evade detection. To enhance security, we propose ARIoTEDef, an Adversarially Robust Early Defense system, which...

10.1145/3660646 article EN other-oa ACM Transactions on Internet of Things 2024-04-20

Abstract Existing perception and identification methods for coal–rock interfaces are generally based on various cutting signals during shearer mining, but they cannot achieve pre-perception. Further, some pre-identification significantly affected by the mining environment accurate identification. In this study, a universal method is proposed to pre-perception recognition of interfaces. Using interface test-bed, active excitation infrared images were tested with different time, distance,...

10.1093/jcde/qwac104 article EN cc-by Journal of Computational Design and Engineering 2022-09-22

Deep neural networks excel at solving intuitive tasks that are hard to describe formally, such as classification, but easily deceived by maliciously crafted samples, leading misclassification. Recently, it has been observed the attack-specific robustness of models obtained through adversarial training does not generalize well novel or unseen attacks. While data augmentation mixup in input space shown improve generalization and models, there limited research progress on latent space....

10.1145/3579856.3595786 article EN 2023-07-05

The rise of 4K and 8K techniques has led to the growth video data streaming. Consequently, greater challenges encryption efficiency information leakage facing selective (SE) makes it necessary reduce ratio as much possible. In this paper, we design a SE scheme for H.264/AVC which achieves trade-off between low high safety, both cryptographic attack sketch point view. As starting point, propose novel calculation model, called block weight model that can take advantage reference structure...

10.1109/icct.2018.8599959 article EN 2018-10-01

In the rapidly developing product–service paradigm, a multi-unit manufacturing system will be leased many times during life cycle. Besides maintenance programming for single leasing period, an upgrade policy is essential to achieve life-cycle profit optimization sequential periods. This article presents framework integrating opportunistic scheduling and decision throughout its cycle based on real-time prognostic method. With machine-level prognosis updating, system-level predictive...

10.1080/0305215x.2022.2122457 article EN Engineering Optimization 2022-11-25

Abstract To achieve efficient and low energy consumption mining under different cutting depths of a shearer, multiparameter coupling optimization method for the shearer based on three‐dimensional (3D) characterization coal wall was proposed. First, seven‐axis absolute articulated arm measuring machine used to obtain 3D point cloud data wall, then surface reconstructed by using segmentation, filtering, stitching processing, thereby obtaining average thickness areas. Second, through quadratic...

10.1002/ese3.1646 article EN cc-by Energy Science & Engineering 2024-01-02

This paper presents a new dynamic recognition model to identify the coal-rock interface, which overcame problems of low identification accuracy and hysteresis quality. The proposed designed on basis cutting acoustic emission fuzzy D-S theory is able confirm ratio between coal rock. For this purpose, seven specimens were poured with different ratios. Thus, feature signals tested in process given specimens. Furthermore, by using wavelet packet decomposition energy reconstruction, distributions...

10.1109/itnec48623.2020.9084688 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

Abstract Using online information resources to build knowledge bases provide answering services would help auto companies or third-party platforms gain competitive advantages. Therefore, a construction plan of automobile maintenance expert system based on graph was proposed by integrated modelling. In terms the entity recognition algorithm, BM LSTM (Boyer-Moore Long Short-Term Memory) algorithm integrating hidden Markov model, Conditional Random Field (CRF), Bi-directional Memory (BiLSTM),...

10.1088/1742-6596/1983/1/012118 article EN Journal of Physics Conference Series 2021-07-01

10.1007/s12204-018-2029-3 article EN Journal of Shanghai Jiaotong University (Science) 2018-12-01

At present, almost all the provable data possession schemes require a large number of exponent calculations.In this paper new scheme based on homomorphy NTRU algorithm is proposed.The includes modules Key Generation, Tag Challenge, Proof and Verification.This requires only plus, minus, multiplication modular computation.The correctness security are analyzed result shows that reliable.Compared with other existing schemes, higher security, less computation, storage communication cost.

10.2991/icca-16.2016.82 article EN cc-by-nc 2016-01-01

10.2495/cta140011 article EN WIT transactions on information and communication technologies 2014-10-28

As the number of interconnected IoT devices continues to skyrocket, so does attack surface for malicious actors. loT are often resource-constrained and deployed in diverse challenging environments (e.g., critical infras-tructures), making them susceptible various vulnerabilities attacks. Additionally, attacks multi-step, which complicates detection mitigation efforts. Without proactive measures, these can be exploited devastating effects. In this paper, we propose a defense framework systems...

10.1109/cic58953.2023.00025 article EN 2023-11-01

The following topics are dealt with: finite element analysis; design engineering; aircraft; vibrations; optimisation; fasteners; beams (structures); structural aircraft control; cutting.

10.1109/icmeas51739.2020.00053 article EN 2020-10-01
Coming Soon ...