Hao Feng

ORCID: 0009-0003-3720-0444
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Water Systems and Optimization
  • Data Mining Algorithms and Applications
  • Network Security and Intrusion Detection
  • Structural Health Monitoring Techniques
  • Advanced Graph Neural Networks
  • Flow Measurement and Analysis
  • Machine Learning in Materials Science
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Technology and Security Systems
  • Cloud Data Security Solutions
  • Embedded Systems Design Techniques
  • Geophysical Methods and Applications
  • Infrastructure Maintenance and Monitoring
  • Artificial Intelligence in Games
  • Web Data Mining and Analysis
  • Oil and Gas Production Techniques
  • Service-Oriented Architecture and Web Services
  • Text and Document Classification Technologies
  • Power Transformer Diagnostics and Insulation
  • Advanced Malware Detection Techniques
  • Topic Modeling

Beijing University of Posts and Telecommunications
2024

Indiana University Bloomington
2024

Tsinghua University
2024

State Grid Corporation of China (China)
2024

Tianjin University
2015-2021

This paper proposes a continuous leakage location method based on the ultrasonic array sensor, which is specific to gas in pressure container with an integral stiffener. collects signals generated from hole through piezoelectric sensor array, and analyzes space-time correlation of every collected signal array. Meanwhile, it combines frequency compensation superposition time domain (SITD), acoustic characteristics stiffener, obtain high-accuracy result stiffener wall. According experimental...

10.3390/s150924644 article EN cc-by Sensors 2015-09-23

Zero Knowledge Proof (ZKP) is a very effective method of preserving privacy as it hides the most confidential information throughout transaction. In this paper, we present security and privacy-preserving approach for blockchain that relies on account multi-data asset models using mechanism. We provide options transferring data assets detecting duplicate expenditures, also develop transaction structures, anonymised addresses metadata assets. To create validate ZKP, use zk-SNARKs algorithm...

10.4018/ijec.349211 article EN cc-by International Journal of e-Collaboration 2024-07-24

In this work, we present DeepEraser, an effective deep network for generic text removal. DeepEraser utilizes a recurrent architecture that erases the in image via iterative operations. Our idea comes from process of erasing pencil script, where area designated removal is subject to continuous monitoring and attenuated progressively, ensuring thorough clean erasure. Technically, at each iteration, innovative module deployed, which not only explicitly aggregates previous progress but also...

10.48550/arxiv.2402.19108 preprint EN arXiv (Cornell University) 2024-02-29

Abstract Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research focused on threats of large language (LLMs), yet comprehensive studies TTI are notably scarce. This paper introduces a systematic tool, named EvilPromptFuzzer, designed to fuzz evil prompts in models. For 15 kinds fine-grained risks, EvilPromptFuzzer employs strong knowledge-mining LLMs construct seed...

10.1186/s42400-024-00279-9 article EN cc-by Cybersecurity 2024-08-26
Coming Soon ...