Yuhang Ye

ORCID: 0000-0003-4608-1451
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Microplastics and Plastic Pollution
  • Adversarial Robustness in Machine Learning
  • Blockchain Technology Applications and Security
  • Pharmaceutical and Antibiotic Environmental Impacts
  • Advanced Sensor and Energy Harvesting Materials
  • Advanced Data Storage Technologies
  • Image and Video Quality Assessment
  • EEG and Brain-Computer Interfaces
  • Anomaly Detection Techniques and Applications
  • Software Engineering Research
  • Advanced Image Processing Techniques
  • Advanced Vision and Imaging
  • Speech and Audio Processing
  • Gaze Tracking and Assistive Technology
  • IoT and Edge/Fog Computing
  • Recycling and Waste Management Techniques
  • Speech Recognition and Synthesis
  • Covalent Organic Framework Applications
  • Network Security and Intrusion Detection
  • Hydrogels: synthesis, properties, applications
  • Advanced Cellulose Research Studies

Technological University Dublin
2023-2025

Hunan University
2022-2025

Shannon Applied Biotechnology Centre
2022-2024

University of British Columbia
2022-2024

Chinese Academy of Sciences
2024

University of Science and Technology of China
2023-2024

Technological University of the Shannon: Midlands Midwest
2022-2024

University of Pennsylvania
2024

China University of Geosciences
2022

Zhejiang Ocean University
2022

Abstract The adoption of hydrogels in most applications is hampered by their high free water content, which limits mechanical performance and environmental resilience. Herein, this issue simultaneously addressed modulating the state intermolecular interactions polyacrylamide (PAM) hydrogels. Specifically, PAM are toughened sugaring‐out using a monosaccharide (glucose, G). Glucose found to facilitate hydrogen bonding interchain interactions. Meanwhile, hygroscopicity glucose converts some...

10.1002/adfm.202315184 article EN cc-by-nc Advanced Functional Materials 2024-02-27

Interfacial assemblies formed by colloidal complexation are effective in multiphase stabilization, as shown structured liquids and Pickering emulgels. Herein, we demonstrate a type of biobased system that spontaneously stabilizes an organic phase continuous hydrogel phase. Specifically, triterpene extracted from bark (betulin, BE) is added to containing coniferous resin (rosin acid, diterpene). BE take part strong noncovalent interactions with the nanochitin dispersed aqueous (hydrogel)...

10.1021/acsnano.3c09533 article EN ACS Nano 2023-12-11

Payment channel networks (PCNs) are a viable solution to the issue of blockchain scalability by offering off-chain transactions between two untrusted peers, without committing each transaction blockchain. The payment cannot be used when its deposit is depleted, which hinders completion, such as it overly utilized in one direction. However, they migrate from another facilitate completion depletion arises. This limitation arises basic design assumption channels, i.e., independent others. To...

10.1109/access.2025.3527746 article EN cc-by-nc-nd IEEE Access 2025-01-01

Graph Neural Networks (GNNs) play a pivotal role in graph-based tasks for their proficiency representation learning. Among the various GNN methods, spectral GNNs employing polynomial filters have shown promising performance on involving both homophilous and heterophilous graph structures. However, The scalability of large graphs is limited because they learn coefficients through multiple forward propagation executions during propagation. Existing works attempted to scale up by eliminating...

10.48550/arxiv.2501.04570 preprint EN arXiv (Cornell University) 2025-01-08

Future link prediction is a fundamental challenge in various real-world dynamic systems. To address this, numerous temporal graph neural networks (temporal GNNs) and benchmark datasets have been developed. However, these often feature excessive repeated edges lack complex sequential dynamics, key characteristic inherent many applications such as recommender systems ``Who-To-Follow'' on social networks. This oversight has led existing methods to inadvertently downplay the importance of...

10.48550/arxiv.2502.02975 preprint EN arXiv (Cornell University) 2025-02-05

Currently, microservices are trending as the most popular software application design architecture. Software organisations also being targeted by more cyber-attacks every day and newer security measures in high demand. One available measure is of anomaly detection, which defined discovery irregular or unusual activity that occurs to a greater lesser degree than normal occurrences data series. In this paper, we continue existing work where various real-world executed against running...

10.1016/j.cose.2022.102728 article EN cc-by Computers & Security 2022-04-22

Marine microplastics (MPs) contamination has become an enormous hazard to aquatic creatures and human life. For MP identification, many Machine learning (ML) based approaches have been proposed using Attenuated Total Reflection Fourier Transform Infrared Spectroscopy (ATR-FTIR). One major challenge for training identification models now is the imbalanced inadequate samples in datasets, especially when these conditions are combined with copolymers mixtures. To improve ML performance...

10.1016/j.scitotenv.2023.165340 article EN cc-by The Science of The Total Environment 2023-07-04

The significance of synthetic foams as insulative materials stems from their mechanical and water resistance well cost-effectiveness. Broadly, the design building envelopes should also consider fire mold impacts on environment (end life compostability). This study addresses these issues considering ever-increasing demand for sustainable sources to develop highly porous materials. We introduce a versatile strategy based wet-foam laying cellulosic fibers that leads hierarchical structures...

10.1021/acsnano.4c04011 article EN ACS Nano 2024-07-25

Electromyogram (EMG) signal has been long used in human-robot interface literature, especially the area of rehabilitation. Recent rapid development artificial intelligence (AI) provided powerful machine learning tools to better explore rich information embedded EMG signals. For our specific application task this work, i.e. estimate human finger force based on signal, a LightGBM (Gradient Boosting Machine) model used. The main contribution study is an objective and automatic optimal feature...

10.1109/ro-man46459.2019.8956453 article EN 2019-10-01

Evolving computing technologies such as cloud, edge computing, and the Internet of Things (IoT) are creating a more complex, dispersed, dynamic enterprise operational environment. New security architectures those based on concept Zero Trust (ZT) emerging to meet challenges posed by these changes. ZT systems treat internal external networks untrusted subject both same checking control prevent data breaches limit lateral movement. Context awareness is notion from field ubiquitous that used...

10.1155/2022/7026779 article EN cc-by Security and Communication Networks 2022-06-30

Moisture-driven actuators featuring programmable stimuli-responsiveness and a rapid response have garnered substantial research attention. Cellulose-based face challenges, including prolonged unstable responsiveness, along with inadequate interfacial bonding. Herein, we developed bilayer structured moisture actuator by integrating multiscale cellulose fibers chitosan. The protonated chitosan forms strong electrostatic attractions negatively charged nanofibrils (CNF), achieving robust...

10.1021/acs.nanolett.4c04103 article EN Nano Letters 2024-10-28

Ethereum is a promising but revolutionary blockchain approach to support rich computational services enabled by Turing-complete instructions, also known as smart contract. Using contract "back-end", any party can publish its Decentralized Applications (DApps) available all Internet users. In other words, and enable evolving existing applications decentralised versions. With the developments of versatile applications, QoS requirements be very different. For example, new-age such AR/VR quite...

10.1109/ntms49979.2021.9432676 article EN 2021-04-19

Content replication and name-based routing lead to a natural multi-source multipath transmission paradigm in NDN. Due the unique connectionless characteristic of NDN, current end-to-end congestion control schemes (e.g. MPTCP) cannot be used directly on This paper proposes Network Utility Maximization (NUM) model formulate NDN with in-network caches. From this model, family receiver-driven solutions can derived, named as path-specified control. The enables content consumers separate traffic...

10.1109/tnet.2021.3090174 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2021-06-24

Deep learning techniques have been widely adopted for cyber defence applications such as malware detection and anomaly detection. The ever-changing nature of threats has made a constantly evolving field. Smart manufacturing is critical to the broader thrust towards Industry 4.0 5.0. Developing advanced technologies in smart requires enabling paradigm shift manufacturing, while cyber-attacks significantly threaten manufacturing. For example, attack (e.g., backdoor) occurs during model's...

10.1109/access.2023.3306333 article EN cc-by-nc-nd IEEE Access 2023-01-01

Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat communities exist. There general consensus that many challenges remain be overcome achieve fully effective sharing, including concerns about privacy, negative publicity, policy/legal issues expense amongst others. One recent trend undertaken address this the use decentralized blockchain based architectures. However while these platforms can increase effectiveness they do...

10.1109/iotsms48152.2019.8939192 article EN 2019-10-01

Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification vision tasks. However, recent research focuses on exploring these Neural Networks (DNNs) weaknesses as can be vulnerable due to transfer learning outsourced training data. This paper investigates the feasibility of generating a stealthy invisible backdoor attack during phase deep models. For developing poison dataset, an interpolation technique is used corrupt sub-feature space...

10.1109/icce56470.2023.10043484 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2023-01-06

Deep neural networks are susceptible to various backdoor attacks, such as training time where the attacker can inject a trigger pattern into small portion of dataset control model's predictions at runtime. Backdoor attacks dangerous because they do not degrade performance. This paper explores feasibility new type attack, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">data-free</i> backdoor. Unlike traditional that require poisoning data and...

10.1109/tai.2024.3384938 article EN IEEE Transactions on Artificial Intelligence 2024-04-09
Coming Soon ...