Hui Liu

ORCID: 0000-0003-4423-459X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Parallel Computing and Optimization Techniques
  • RFID technology advancements
  • Stock Market Forecasting Methods
  • Time Series Analysis and Forecasting
  • Embedded Systems Design Techniques
  • Antenna Design and Analysis
  • Distributed and Parallel Computing Systems
  • Energy Harvesting in Wireless Networks
  • Speech Recognition and Synthesis
  • Interconnection Networks and Systems
  • Privacy-Preserving Technologies in Data
  • Topic Modeling
  • Cryptography and Data Security
  • Traffic Prediction and Management Techniques
  • Music and Audio Processing
  • Speech and Audio Processing
  • Advanced Image and Video Retrieval Techniques
  • Natural Language Processing Techniques
  • Data Stream Mining Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • UAV Applications and Optimization

Xidian University
2011-2024

Guangdong Polytechnic Normal University
2023-2024

Ministry of Education of the People's Republic of China
2024

Nanjing University of Posts and Telecommunications
2023

Zhejiang University
2023

Central South University
2023

Xiangya Hospital Central South University
2023

National University of Defense Technology
2023

Kunming University of Science and Technology
2023

Southeast University
2022

Recent research has demonstrated the potential of deploying deep neural networks (DNNs) on resource-constrained mobile platforms by trimming down network complexity using different compression techniques. The current practice only investigate stand-alone schemes even though each technique may be well suited for certain types DNN layers. Also, these techniques are optimized merely inference accuracy DNNs, without explicitly considering other application-driven system performance (e.g. latency...

10.1145/3210240.3210337 article EN 2018-06-10

Underwater target detection is an indispensable part of marine environmental engineering and a fast accurate method detecting underwater targets essential. Although many algorithms have achieved great accuracy in daily scenes, there are issues low-quality images due to the complex environment, which makes applying these deep learning directly process tasks difficult. In this paper, we presented algorithm for based on improved You Only Look Once (YOLO) v4 response environment. First,...

10.3389/fmars.2023.1153416 article EN cc-by Frontiers in Marine Science 2023-03-23

In this article, we focus on solving the energy optimization problem for real-time streaming applications multiprocessor System-on-Chip by combining task-level coarse-grained software pipelining with DVS (Dynamic Voltage Scaling) and DPM Power Management) considering transition overhead, inter-core communication discrete voltage levels. We propose a two-phase approach to solve problem. first phase, task parallelization algorithm called RDAG transform periodic dependent graph into set of...

10.1145/1929943.1929946 article EN ACM Transactions on Design Automation of Electronic Systems 2011-03-01

Radar has long been a common sensor on autonomous vehicles for obstacle ranging and speed estimation. However, as robust to all-weather conditions, radar's capability not well-exploited, compared with camera or LiDAR. Instead of just serving supplementary sensor, rich information hidden in the radio frequencies can potentially provide useful clues achieve more complicated tasks, like object classification detection. In this paper, we propose new dataset, named CRUW <sup...

10.1109/cvprw53098.2021.00316 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2021-06-01

Distracted driving behavior is known as a leading factor in road traffic injuries and deaths. Fortunately, rapidly developing deep learning technology has shown its potential distracted detection. Nevertheless, learning-based solutions need to collect large amounts of data captured by camera sensors the vehicle, which will cause serious privacy concerns. As privacy-preserving distributed paradigm, federated (FL) achieved competitive performance many applications recently. Inspired this, we...

10.1109/jiot.2023.3243622 article EN IEEE Internet of Things Journal 2023-02-09

Mobile edge computing introduces a novel paradigm for mobile devices, reducing execution latency and energy consumption by offloading tasks to servers or other idle devices. In this paper, we consider the utility optimization problem of two typical tasks, latency-sensitive latency-tolerant among multiple devices base stations. can choose three modes optimize utility: local computing, task allocation stations, through device-to-device communication. To address problem, formalize it as...

10.1109/jiot.2024.3366194 article EN IEEE Internet of Things Journal 2024-02-15

Recent breakthroughs in deep neural networks (DNNs) have fueled a tremendously growing demand for bringing DNN-powered intelligence into mobile platforms. While the potential of deploying DNNs on resource-constrained platforms has been demonstrated by DNN compression techniques, current practice suffers from two limitations: 1) merely stand-alone schemes are investigated even though each technique only suit certain types layers; and 2) mostly techniques optimized DNNs' inference accuracy,...

10.1109/tmc.2020.2999956 article EN IEEE Transactions on Mobile Computing 2020-06-04

Unmanned aerial vehicles (UAVs) are beginning to make a splash in emergency disaster scenarios owing its excellent air mobility and flexibility. Considering that large base stations often cannot be deployed areas the first place variation of communication links between UAVs, we formulate task scheduling problem for as two-stage Lyapunov optimization propose dispersed computing network consisting UAVs ground mobile devices, which is used collaborative computing. We decouple long-term...

10.1109/jsyst.2021.3139993 article EN IEEE Systems Journal 2022-02-04

In this paper, we focus on joint energy and performance optimization for streaming applications multiprocessor systems-on-chip by combining task-level coarse-grained software pipelining with DVS (dynamic voltage scaling)and DPM power management) techniques the considerations of transition overhead, inter-processor communication discrete levels. We propose a two-phase approach to solve problem. first phase, task parallelization algorithm called RDAG transform periodic dependent graph into set...

10.1109/ecrts.2008.18 article EN Euromicro Conference on Real-Time Systems 2008-07-01

Message authentication is one of the most effective ways to thwart unauthorized messages from being transmitted in wireless ad-hoc networks such as sensor (WSNs) and vehicular (VANETs). For this reason, many message schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Public-key simpler key management are easier scale, thus more suitable for authentication. Among all kinds cryptosystems, identity cryptosystem attractive since public keys can...

10.1109/iccnc.2018.8390287 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2018-03-01

The goal of relational triple extraction is to extract knowledge-rich triples from unstructured text. Although the previous methods obtain considerable performance, there are still some problems, such as error propagation, overlapping problem, and suboptimal subject–object alignment. To address shortcomings above, in this paper, we decompose task into three subtasks a fresh perspective: entity extraction, alignment relation judgement, well propose novel bi-directional translating decoding...

10.3390/app13074447 article EN cc-by Applied Sciences 2023-03-31

In the real world, speaker recognition systems usually suffer from serious performance degradation due to domain mismatch between training and test conditions. To alleviate harmful effect of shift, unsupervised adaptation methods are introduced learn domain-invariant representations, which focus on addressing single-source-to-single-target issue. However, labeled data collected multiple sources, such as different languages, genres devices. The single-domain can not deal with complex...

10.1109/lsp.2022.3154237 article EN IEEE Signal Processing Letters 2022-01-01

This paper proposes a 3D vehicle-detection algorithm based on multimodal feature fusion to address the problem of low accuracy in unmanned system environment awareness. The matches coordinate relationships between two sensors and reduces sampling errors by combining millimeter-wave radar camera calibration. Statistical filtering is used remove redundant points from data reduce outlier interference; module constructed fuse point cloud image information using pixel-by-pixel averaging....

10.3390/app12126198 article EN cc-by Applied Sciences 2022-06-18

In this paper, we focus on designing and developing ProMETheus, an intelligent system for meeting minutes generated from audio data. The first task in ProMETheus is to recognize the speakers noisy Speaker recognition algorithm used automatically identify who speaking according speech Naturally, will transcribe speakers' text so that can generate complete with name chronologically. order show subject of agreed action, use summarization extract meaningful key phrases summary sentences text....

10.1145/3286978.3286995 article EN 2018-11-05
Coming Soon ...