Yuhan Zhang

ORCID: 0009-0005-4737-6958
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Distributed Control Multi-Agent Systems
  • Software-Defined Networks and 5G
  • Remote-Sensing Image Classification
  • Stability and Control of Uncertain Systems
  • Caching and Content Delivery
  • Human Pose and Action Recognition
  • Neonatal Respiratory Health Research
  • Service-Oriented Architecture and Web Services
  • Power Systems and Technologies
  • Privacy, Security, and Data Protection
  • Infrared Target Detection Methodologies
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Age of Information Optimization
  • Satellite Communication Systems
  • Anomaly Detection Techniques and Applications
  • Robotics and Sensor-Based Localization
  • Privacy-Preserving Technologies in Data
  • Inhalation and Respiratory Drug Delivery
  • Advanced Malware Detection Techniques
  • Nanoplatforms for cancer theranostics
  • Gait Recognition and Analysis
  • Access Control and Trust
  • Financial Distress and Bankruptcy Prediction

University of Electronic Science and Technology of China
2013-2025

Shanghai Jiao Tong University
2024

Nanjing University of Aeronautics and Astronautics
2023-2024

Jiangxi Maternal and Child Health Hospital
2024

Washington University in St. Louis
2024

Sichuan University
2024

Nanjing Foreign Language School
2023

Northeastern University
2023

China Telecom
2023

China Telecom (China)
2023

Skeleton-based action recognition has been widely investigated considering their strong adaptability to dynamic circumstances and complicated backgrounds. To recognize different actions from skeleton sequences, it is essential crucial model the posture of human represented by its changes in temporal dimension. However, most existing works treat sequences spatial dimension same way, ignoring difference between data which not an optimal way sequences. The each frame proposed be modeled...

10.1145/3474085.3475473 article EN Proceedings of the 30th ACM International Conference on Multimedia 2021-10-17

10.1109/taes.2025.3553114 article EN IEEE Transactions on Aerospace and Electronic Systems 2025-01-01

The booming growth of the internet things has brought about widespread deployment devices and massive amounts sensing data to be processed. Federated learning (FL)-empowered mobile edge computing, known for pushing artificial intelligence network while preserving privacy in cooperation, is a promising way unleash potential information data. However, FL’s multi-server collaborative operating architecture inevitably results communication energy consumption between servers, which poses great...

10.3390/app14124989 article EN cc-by Applied Sciences 2024-06-07

Cooperative unmanned aerial vehicle (UAV) swarms could expand the mission capability of single UAV and overall combat effectiveness. We consider dynamic scenarios where an swarm confronts multiple maneuvering high-value targets (HVTs) attackers. In such hostile scenarios, each would generally strive to survive through collaboratively offending their opponents self-defense from potential attacks. modeling as biologically inspired mobile adaptive networks imitate confrontations swarms. It is...

10.1109/taes.2023.3288077 article EN IEEE Transactions on Aerospace and Electronic Systems 2023-10-01

Abstract Material stiffness, a significant parameter of contact interface, is investigated to improve the uniformity pressure. A interface material stiffness optimization design algorithm developed based on modified solid isotropic with penalization (SIMP) method. The pressure field represented by its variance and defined as objective. node-to-node frictionless elastic theory adopted perform analysis. effectiveness for improving surface verified two cases. Because relationship between...

10.1115/1.4046172 article EN Journal of Tribology 2020-01-30

Sepsis is defined as a systemic inflammatory response syndrome caused by dysregulated host to bacterial infection and the leading cause of death in intensive care unit at hospitals. At present, despite discovery many potential therapeutic methods for anti-infective treatment immune-suppressing treatment, effective drug treatments sepsis are lacking clinic. Herein, coloaded dual agent liposome (Cip·HCl/Cur@Lip-γ3) nanoplatform was developed enveloping Cip·HCl Cur into pH-responsive...

10.1021/acsanm.3c02758 article EN ACS Applied Nano Materials 2023-08-17

Background: Alzheimer’s Disease (AD) is a highly prevalent form of age-related dementia. However, the underlying mechanisms AD are largely unexplored. Materials and Methods: In this study, bioinformatics analysis was performed to identify possible therapeutic targets for AD. The GEO database used screen Differentially Expressed Genes (DEGs). Enrichment analysis, protein-protein interaction network, LASSO model analyses were successfully performed. Furthermore, an ELISA assay also conducted...

10.2174/0113862073295516240508173238 article EN Combinatorial Chemistry & High Throughput Screening 2024-05-20

With the fast development of wireless sensor network (WSN) and Internet things (IOT), as key technologies both them, security nodes networks is becoming more important. Compared with other protocols, hierarchical topology has advantages in energy saving control, but almost none existing protocols been considered about when join or quit from network, while it will badly threaten network. In this paper, secure mechanism on joining quitting deeply studied, a clustering algorithm proposed to...

10.1109/paccs.2011.5990233 article EN 2011-07-01

Recent decades have witnessed an increasing academic interest in mobile-assisted vocabulary learning. To explore the possible influencing factors on learning outcomes, this study aimed at examining effects of self-regulation and peer scaffolding among undergraduate students using Shanbay App beyond classroom. end, altogether 71 intermediate-level English learners aged 17-19 years were chosen as participants, with 37 experimental group (with scaffolding) 34 control (without scaffolding). Data...

10.3389/fpsyg.2022.993224 article EN cc-by Frontiers in Psychology 2022-10-06

In this correspondence, we consider suppressing non-circular interferences for Global Navigation Satellite Systems (GNSS) receivers utilizing polarization sensitive arrays, regarding high dynamic scenarios. We model the widely linear array receive signal corrupted by potentially interferences. analyze second-order statistics of and extend covariance matrix taper (CMT) methodology to cope with signal. further develop null broadening algorithms suppress high-dynamic Simulation results validate...

10.1109/taes.2023.3267441 article EN IEEE Transactions on Aerospace and Electronic Systems 2023-04-17

An Automated Target Recognition system (ATR) was developed to locate and target small object in images videos. The data is preprocessed sent a grayscale optical correlator (GOC) filter identify possible regionsof- interest (ROIs). Next, features are extracted from ROIs based on Principal Component Analysis (PCA) neural network (NN) be classified. analyzed by the NN classifier indicating if each ROI contains desired or not. ATR found useful identifying boats open sea. However, due "noisy...

10.1117/12.858165 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2010-04-22

Vehicular edge computing servers as a decentralized network extension to offer distributed and proximity services for computation-intensive vehicular applications. For some complex tasks, when they are offloaded from smart vehicles servers, environment needs be established on the which requires extra power brings unprecedented computation delay. To address this problem, we incorporate transfer learning into networks, leveraging existing knowledge experience of similar improve agility...

10.1109/icct56141.2022.10072466 article EN 2022-11-11

Automated Target Recognition (ATR) systems aim to automate target detection, recognition, and tracking. The current project applies a JPL ATR system low-resolution sonar camera videos taken from unmanned vehicles. These images are inherently noisy difficult interpret, pictures underwater were unreliable due murkiness inconsistent lighting. breaks recognition into three stages: 1) Videos of both footage broken frames preprocessed enhance detect Regions Interest (ROIs). 2) Features extracted...

10.1117/12.923482 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2012-03-15

This article investigates the problem of circumnavigation multi-agent system with a second-order integrator dynamic model, and drive agents enclose around moving target desired speed orbit radius. Unlike mostly nowaday researches, this promotes control law rather than first-order to directly agents' accelerated velocity. A fully-actuated approach is applied simplify nonlinear matters, rigorous proof given for validity law. Finally simulation then performed verify feasibility proposed method.

10.1109/isas61044.2024.10552519 article EN 2022 5th International Symposium on Autonomous Systems (ISAS) 2024-05-07

Alzheimer's disease [AD] disproportionately affects our seniors, diminishing their health and life expectancy. As the world population grows older, collective burden of AD has become unsustainable. Globally, there were 43.8 million patients in 2016, with a projection affecting 152 by 2050. Recent discoveries have shown that molecular changes characteristic to manifested 20 years before discernable neurological phenotypes emerge. It is feasible halt or reverse this pathological process...

10.14336/ad.2024.1476 article EN cc-by Aging and Disease 2024-01-01

10.1109/wcsp62071.2024.10826765 article EN 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP) 2024-10-24

This paper analyzes the deficiency of P2DR security model, and proposes a kind new active dynamic model AD-RPPDRRM, in which risk analysis, management recovery are imported.On basis this basic technologies used to implement defense depth system discussed.At last, in-depth typical network is given.

10.2991/isccca.2013.189 article EN cc-by-nc Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation 2013-01-01
Coming Soon ...