Kai Yang

ORCID: 0009-0003-5292-554X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Telecommunications and Broadcasting Technologies
  • Parallel Computing and Optimization Techniques
  • Embedded Systems Design Techniques
  • Context-Aware Activity Recognition Systems
  • Explainable Artificial Intelligence (XAI)
  • User Authentication and Security Systems
  • Age of Information Optimization
  • Digital Media Forensic Detection
  • Advanced Computational Techniques and Applications
  • Artificial Intelligence in Healthcare and Education
  • Adversarial Robustness in Machine Learning
  • Data Mining Algorithms and Applications
  • Educational Games and Gamification
  • IoT and Edge/Fog Computing
  • Virtual Reality Applications and Impacts
  • Rough Sets and Fuzzy Logic
  • Advanced Malware Detection Techniques
  • Interconnection Networks and Systems
  • Smart Grid Security and Resilience
  • Evacuation and Crowd Dynamics

Shanghai Electric (China)
2023-2024

China Mobile (China)
2020-2024

Henan University of Technology
2023

China Academy of Safety Sciences and Technology
2023

Samsung (United States)
2022

Research!America (United States)
2022

Tongji University
2022

Verizon (United States)
2022

Ericsson (United States)
2022

University of California, Davis
2022

Recently, with the development of COVID-19 pandemic and next generation telecommunication network (5G), metaverse, in which users interact each other through avatars, has attracted increasingly attention. However, like traditional cyberspace, a three-dimensional (3D) virtual world built on internet, also faces various unexpected security threats. In addition, some forms methods cyberspace threats have undergone further evolution metaverse environment. Consequently, social engineering attacks...

10.1109/cscloud-edgecom58631.2023.00034 article EN 2023-07-01

Concept lattice is an effective tool for knowledge representation and data analysis. It have been successfully applied to many fields. This paper illustrates the theory of compact dependencies in concept lattice, then study approach briefest rules extraction based on dependencies, including decision association with confidence 1. Finally, method example relationship between process parameters aim parameters,as well as other parameters, are discussed. provides a useful support advanced...

10.11591/telkomnika.v11i2.2057 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2013-02-01

With the development of Internet Things (IoT) technology, massive heterogeneous equipment involving all walks life has been connected to networks. However, many current authentication methods have poor robustness and cannot ensure safety access due complexity uncertainty network environment. To deal with this problem, a hierarchical system was proposed in paper. First, an identification method (EIM), using stack denoising autoencoders (SDAs), is developed weaken recognize type equipment....

10.1155/2023/8899697 article EN cc-by International Journal of Intelligent Systems 2023-05-24

In recent years, the proliferation of Internet Things devices in power grids has exposed these critical infrastructure systems to numerous malicious network attacks. These attacks are characterized by their extensive scale, scope, and potential for harm. Concurrently, smart China utilize poor-performing domestic devices, owing policy mandates. Consequently, centralized deep learning techniques commonly leveraged anomaly detection on have limited applicability grids. To address this problem,...

10.1109/cbd63341.2023.00019 article EN 2023-12-18

To cope with rapid increases in both the number of smart devices and amount computation-intensive edge applications on such devices, distributed cross-device computing systems have received much attention Internet-of-Things (IoT) community. The heterogeneity IoT dynamic nature environments make it hard to manage resources a uniform manner that enables collaboration sharing among devices. In this paper, we propose Intelligent Distributed Edge Computing (IDEC) system architecture, which is...

10.1109/iccc51575.2020.9345083 article EN 2020-12-11

RapidIO is an emerging high-performance and point-to-point packetized interconnection technology. In this paper, the design of logical core based on safety arbitration mechanisms described in detail. The packing unpacking I/O Logical, Message Passing Globally Shared Memory transactions are achieved. Excellent average data transfer rates, up to 7.8 bytes per cycle reached certain with 256-byte payloads, meanwhile efficiencies more than 95%. Moreover, maintenance read targeted at local...

10.1109/primeasia.2010.5604940 article EN 2010-09-01
Coming Soon ...