Haoyu Liu

ORCID: 0000-0003-3755-5184
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • HVDC Systems and Fault Protection
  • Opportunistic and Delay-Tolerant Networks
  • Privacy, Security, and Data Protection
  • Traffic Prediction and Management Techniques
  • Machine Learning and Data Classification
  • Advanced Image and Video Retrieval Techniques
  • Domain Adaptation and Few-Shot Learning
  • Smart Grid Energy Management
  • Time Series Analysis and Forecasting
  • Advanced MIMO Systems Optimization
  • Bluetooth and Wireless Communication Technologies
  • Smart Grid Security and Resilience
  • EEG and Brain-Computer Interfaces
  • Microgrid Control and Optimization
  • Cloud Computing and Resource Management
  • IoT-based Smart Home Systems
  • Advanced Data and IoT Technologies
  • Anaerobic Digestion and Biogas Production
  • Mobile Ad Hoc Networks
  • Mobile Crowdsensing and Crowdsourcing

Xiamen University
2023-2024

Sichuan University
2022-2024

Zhejiang University
2020-2024

Xi’an University of Posts and Telecommunications
2024

North China Electric Power University
2018-2024

Hangzhou Dianzi University
2024

University of Edinburgh
2019-2023

Yanshan University
2023

Tianjin Research Institute of Electric Science (China)
2023

Fuzhou University
2021-2023

Frequency regulation of voltage source converter-based multi-terminal high-voltage direct current (VSC-MTDC) system with offshore wind farms enhances the frequency stability by compensating power for a disturbed AC system. However, it is difficult to reasonably allocate frequency-regulation resources due lack coordination mechanisms between and MTDC Moreover, control manage changes in speed; risk wind-turbine stalls high. Thus, based on kinetic energy turbines margin converters, capability...

10.35833/mpce.2023.000001 article EN Journal of Modern Power Systems and Clean Energy 2024-01-01

Duminil-Copin and Manolescu (2022) recently proved the scaling relations for planar Fortuin-Kasteleyn (FK) percolation. In particular, they showed that one-arm exponent mixing rate are sufficient to derive other near-critical exponents. The limit of critical FK percolation is conjectured be a conformally invariant random collection loops called conformal loop ensemble (CLE). this paper, we define CLE analog exponent. Assuming convergence CLE, show agrees with CLE. We prove CLE$_\kappa$...

10.48550/arxiv.2502.09950 preprint EN arXiv (Cornell University) 2025-02-14

In Taobao, the largest e-commerce platform in China, billions of items are provided and typically displayed with their images.For better user experience business effectiveness, Click Through Rate (CTR) prediction online advertising system exploits abundant historical behaviors to identify whether a is interested candidate ad. Enhancing behavior representations images will help understand user's visual preference improve accuracy CTR greatly. So we propose model jointly ID features images....

10.1145/3269206.3272007 article EN 2018-10-17

Building-information-modeling for cultural heritage (HBIM), which is established using surveying data, can be used to conserve architectural heritage. The development of an HBIM model ancient wooden architecture (AWA) structures requires interdisciplinary integration. A parametric the main components that intelligently integrates historical knowledge, as well intelligent modeling method these components, are two critical issues required bridge existing gap and improve application HBIM....

10.3390/ijgi9030167 article EN cc-by ISPRS International Journal of Geo-Information 2020-03-11

This letter presents the design of a symmetrical Doherty power amplifier (DPA) with extended high-efficiency range by using new and explicit circuit model. Theoretical analysis reveals that adjustment electrical length transmission line sections in proposed model, DPA variants simple circuitry enhanced output back-off (OBO) are obtained. For experimental verification, 42-dBm, 2-GHz OBO 9.5 dB was designed fabricated identical GaN HEMT devices. Under continuous-wave stimulation, measurement...

10.1109/lmwc.2017.2690870 article EN IEEE Microwave and Wireless Components Letters 2017-04-17

We present a novel algorithm to refine an input atlas with bounded packing efficiency. Central this method is the use of axis-aligned structure that converts general polygon problem rectangle problem, which easier achieve high Given parameterized mesh no flipped triangles, we propose new angle-driven deformation strategy transform it into set charts, can be decomposed rectangles by motorcycle graph algorithm. Since graphs are not unique, select one balancing trade-off between efficiency and...

10.1145/3306346.3323001 article EN ACM Transactions on Graphics 2019-07-12

Abstract As a research of human arm activities, the soft actuator is one important topics in field robotics. This article concerned with robust passive tracking control for an uncertain by right coprime factorization (RRCF). First, applying recursive least squares identification algorithm, modeling studied which parameter radius estimated using experimental data. Second, passivity inflatable rubber tube discussed; meanwhile, robustness ensured designed controllers. Third, combining RRCF and...

10.1002/rnc.5645 article EN International Journal of Robust and Nonlinear Control 2021-06-14

Electrical impedance tomography (EIT) has gained considerable attention in the medical field for diagnosis of lung-related diseases, owing to its non-invasive and real-time characteristics. However, due ill-posedness underdetermined nature inverse problem EIT, suboptimal reconstruction performance reduced robustness against measurement noise modeling errors are common issues.This study aims mine deep feature information from voltages, acquired EIT sensor, reconstruct high-resolution...

10.1016/j.cmpb.2023.107861 article EN cc-by-nc-nd Computer Methods and Programs in Biomedicine 2023-10-19

The popularity of smart home devices is growing as consumers begin to recognize their potential improve the quality domestic life. At same time, serious vulnerabilities have been revealed over recent years, which threaten user privacy and can cause financial losses. lack appropriate security protections in these thus increasing concern for Internet Things (IoT) industry, yet manufacturers' ongoing efforts remain superficial. Hence, users continue be exposed weaknesses. In this paper, we...

10.1109/percomw.2019.8730685 article EN 2019-03-01

Machine Learning (ML) techniques are increasingly adopted to tackle ever-evolving high-profile network attacks, including Distributed Denial of Service (DDoS), botnet, and ransomware, due their unique ability extract complex patterns hidden in data streams. These approaches however routinely validated with collected the same environment, performance degrades when deployed different topologies and/or applied on previously unseen traffic, as we uncover. This suggests malicious/benign behaviors...

10.1016/j.comcom.2022.04.020 article EN cc-by Computer Communications 2022-04-30

Neural Architecture Search (NAS) is a powerful tool for automating effective image processing DNN designing. The ranking has been advocated to design an efficient performance predictor NAS. previous contrastive method solves the problem by comparing pairs of architectures and predicting their relative performance. However, it only focuses on rankings between two involved neglects overall quality distributions search space, which may suffer generalization issues. A predictor, namely Ranker...

10.1145/3503161.3548149 article EN Proceedings of the 30th ACM International Conference on Multimedia 2022-10-10

Trajectory prediction is an essential component in autonomous driving, particularly for collision avoidance systems. Considering the inherent uncertainty of task, numerous studies have utilized generative models to produce multiple plausible future trajectories each agent. However, most them suffer from restricted representation ability or unstable training issues. To overcome these limitations, we propose utilizing diffusion model generate distribution trajectories. Two cruxes are be...

10.48550/arxiv.2403.09190 preprint EN arXiv (Cornell University) 2024-03-14

Abstract Modular multilevel converters (MMCs) have been utilized in solid-state transformers (SSTs). With the increasing demand high-voltage power module MMC-SST, press-pack IGBTs are very promising. The poly-ether-ether-ketone (PEEK) frame is submodules of IGBT to withstand high voltage. electric field simulation this paper reveals that concentrates on surface PEEK frame. Thus, partial discharge characteristics under direct current (DC) voltage investigated by developed test bench. results...

10.1007/s00202-024-02394-9 article EN cc-by Electrical Engineering 2024-05-27

10.18653/v1/2024.findings-acl.312 article EN Findings of the Association for Computational Linguistics: ACL 2022 2024-01-01

In this paper we present the first in-depth measurement study looking at data privacy practices of proprietary variants Android OS produced by Samsung, Xiaomi, Huawei and Realme. We address two questions: how are identifiers used in network connections what types transmitted. To answer these, decrypt decode traffic transmitted a range handsets. find that all OEMs make undue use long-lived hardware such as serial number, handset IMEI so fail to follow best practice. Hardware also linked...

10.1371/journal.pone.0279942 article EN cc-by PLoS ONE 2023-01-18

Semi-supervised learning (SSL) has been a fundamental challenge in machine for decades. The primary family of SSL algorithms, known as pseudo-labeling, involves assigning pseudo-labels to confident unlabeled instances and incorporating them into the training set. Therefore, selection criteria are crucial success SSL. Recently, there growing interest development methods that use dynamic or adaptive thresholds. Yet, these typically apply same threshold all samples, class-dependent thresholds...

10.48550/arxiv.2310.18910 preprint EN cc-by arXiv (Cornell University) 2023-01-01

In Taobao, the largest e-commerce platform in China, billions of items are provided and typically displayed with their images. For better user experience business effectiveness, Click Through Rate (CTR) prediction online advertising system exploits abundant historical behaviors to identify whether a is interested candidate ad. Enhancing behavior representations images will help understand user's visual preference improve accuracy CTR greatly. So we propose model jointly ID features However,...

10.48550/arxiv.1711.06505 preprint EN other-oa arXiv (Cornell University) 2017-01-01
Coming Soon ...