Siyang Yu

ORCID: 0000-0003-4510-0729
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Complex Network Analysis Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Graph Neural Networks
  • Advanced Vision and Imaging
  • Privacy-Preserving Technologies in Data
  • Robotics and Sensor-Based Localization
  • Network Security and Intrusion Detection
  • Video Surveillance and Tracking Methods
  • Graph Theory and Algorithms
  • Zebrafish Biomedical Research Applications
  • Radiomics and Machine Learning in Medical Imaging
  • COVID-19 diagnosis using AI
  • Smart Grid Security and Resilience
  • Cholesterol and Lipid Metabolism
  • Game Theory and Applications
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Bioinformatics and Genomic Networks
  • Automated Road and Building Extraction
  • Adversarial Robustness in Machine Learning
  • Information and Cyber Security
  • Electrostatic Discharge in Electronics
  • Robotic Path Planning Algorithms

Hunan University of Finance and Economics
2020-2025

Hunan University
2013-2024

Changchun University of Technology
2022

Erasmus University Rotterdam
2020-2021

Erasmus MC
2020-2021

Nanjing University of Information Science and Technology
2018-2019

Kunming University of Science and Technology
2011

Animal pose estimation tools based on deep learning have greatly improved animal behaviour quantification. These perform individual video frames, but do not account for variability of body shape in their prediction and evaluation. Here, we introduce a novel multi-frame framework, referred to as OptiFlex. This framework integrates flexible base model (i.e., FlexibleBaseline), which accounts shape, with an OpticalFlow that incorporates temporal context from nearby frames. Pose can be optimised...

10.3389/fncel.2021.621252 article EN cc-by Frontiers in Cellular Neuroscience 2021-05-28

Mobile Edge Computing (MEC) has been successfully applied to smart homes, mobile devices, and other electronic products, offering reduced communication latency alleviating pressure on cloud services. The integration of Federated Learning (FL) MEC provides customized services for enhancing user experiences. However, there are still gaps in combining these technologies: FL is susceptible membership inference attacks, risking privacy; faces limitations energy computational resources,...

10.1109/tce.2024.3372696 article EN IEEE Transactions on Consumer Electronics 2024-01-01

10.1504/ijict.2025.10071260 article EN International Journal of Information and Communication Technology 2025-01-01

Abstract Deep learning based animal pose estimation tools have greatly improved behaviour quantification. However, those all make predictions on individual video frames and do not account for variability of body shape in their model designs. Here, we introduce the first video-based architecture, referred to as OptiFlex, which integrates a flexible base with an optical flow incorporate temporal context from nearby frames. This approach can be combined multi-view information, generating...

10.1101/2020.04.04.025494 preprint EN cc-by-nd bioRxiv (Cold Spring Harbor Laboratory) 2020-04-05

Building the security mechanism for Controller Area Network (CAN) to defend against attack has drawn substantial attention recently. Fingerprinting ECUs provide ability of authentication based on physical characteristics can protect CAN network effectively. The clock skew which is unique and stable be exploited pinpoint attacker detect intrusion. However, a common downside existing clock-skew-based approaches that estimation process affected by message scheduling or arbitration. In our work,...

10.1109/access.2020.3046862 article EN cc-by IEEE Access 2020-12-23

One area of current research on adversarial attacks is how to generate plausible examples when only a small number datasets are available. Current attack algorithms used these black-box systems face challenges, such as difficulty in training convergence, ambiguous sample images, substitute models collapse, unsatisfactory success rates, high query cost, and low defense capability improvement target models. As result, constructing situations few known real-world circumstances remains...

10.1109/tifs.2024.3356812 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

With the fast development of social networks, more and data has been generated. Finding useful information among these is important. Subgraph matching method that can be used in networks for search, recommender systems, so on. In this paper, we choose five typical graph methods which are VF2, SPath, Turbo <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ISO</sub> , BoostIso, RI to value their performance scalability networks. These verified by...

10.1109/access.2018.2875262 article EN cc-by-nc-nd IEEE Access 2018-01-01

Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied Internet-of-Things (IoT) devices with high security requirements. However, due the resource consumption modular IoT face problem insufficient. Fortunately, secure outsourcing scheme offers a new solution for resource-constrained devices. In this article, we apply parallel provide possibility exponentiation operation, which is used After that, task...

10.1109/jiot.2020.3029030 article EN IEEE Internet of Things Journal 2020-10-06

Most unsupervised methods of person re-identification (Re-ID) obtain pseudo-labels through clustering. However, in the process clustering, hard quantization loss caused by clustering errors will make model produce false pseudo-labels. In order to solve this problem, an based on softened labels training method is proposed. The innovation that correlation among image features used find reliable positive samples and train them a smooth manner. To further explore features, some modules are...

10.3390/electronics11050763 article EN Electronics 2022-03-02

Summary With the rise of industrialization, importance industrial Internet Things (IIoT) has increased significantly, and with it comes a variety security threats. Therefore, these networks is critical. Industrial Response Systems (IRSs), as last line security, plays an important role in system Things. In this paper, new IRS model based on non‐cooperative game proposed. First, by combining Partially Observable Markov Decision Process (POMDP) stochastic expanded attack tree, our could...

10.1002/cpe.7826 article EN Concurrency and Computation Practice and Experience 2023-05-31

Learning discriminative features for facial expression recognition (FER) in the wild is a challenging task due to significant intra-class variations, inter-class similarities, and extreme class imbalances. In order solve these issues, contrastive-learning-based extra-contrast affinity network (ECAN) method proposed. The ECAN consists of feature processing two proposed loss functions, namely extra negative supervised contrastive (ENSC loss) multi-view (MVA loss). provides current historical...

10.3390/electronics11152288 article EN Electronics 2022-07-22

SM4 is a block cipher proposed by the Chinese government. Strengthening research and extension of significant to development promotion cryptography standards. To date, relevant rare. Thus, we propose implementation an algorithm resistant t o power analysis. Ideally, secure masking scheme used for cipher, which particularly suited in application specific integrated circuit. Moreover, mask our chip process improved make safer. Simulation results confirm that use counteractive measures analysis...

10.3233/jifs-169011 article EN Journal of Intelligent & Fuzzy Systems 2016-07-22

An active shield is a sensor mesh devised and implemented on top of most secure chips or in embedded system as good protection for circuits sensitive data stored the chips. It one effective annoyances microprobing attackers. But, rerouting attack can defeat by disclosing geometry structure shield, causing short circuit mesh. This paper proposes dynamic to resist attack. A which contains some routing nodes connects metal lines between adjacent nodes. Changing connection statuses results...

10.1504/ijhpcn.2016.080419 article EN International Journal of High Performance Computing and Networking 2016-01-01

In this paper, we apply a protective strategy to the AES encryption algorithm. order reduce power consumption and correlation in process of arithmetic operations, change trigger number location hardware implementation by modifying structure Through simulation platform, our Advanced Encryption Standard algorithm can effectively resist Differential Power Analysis Correlation analysis. Compared with mask dynamic differential logic, policy doesn't increase complexity area.

10.1109/hpcc.and.euc.2013.231 article EN 2013-11-01

Functional verification of large scale circuit design is a basic problem in Very Large Scale Integrated (VLSI) design. With the increasing circuit, it urgent to divide whole into some smaller sub-circuits so as perform parallel functional on multiple hardware processors. The partition hardware-accelerated can be regarded graph problem. However, unlike traditional requirements for minimum cutting, needs reduce simulation depth and improve parallelism simulation. Therefore, combined with...

10.1109/rtas52030.2021.00061 article EN 2021-05-01
Coming Soon ...