Haihui Gao

ORCID: 0009-0005-7612-0564
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Advanced Decision-Making Techniques
  • Security and Verification in Computing
  • Video Surveillance and Tracking Methods
  • Internet Traffic Analysis and Secure E-voting
  • Information and Cyber Security
  • Reproductive Physiology in Livestock
  • Bayesian Methods and Mixture Models
  • Fault Detection and Control Systems
  • Human Pose and Action Recognition
  • Gestational Diabetes Research and Management
  • Probiotics and Fermented Foods
  • Cryptography and Data Security
  • Gait Recognition and Analysis
  • Digital Media Forensic Detection
  • Pregnancy and preeclampsia studies
  • Simulation and Modeling Applications
  • Smart Grid and Power Systems
  • Software Testing and Debugging Techniques
  • Artificial Intelligence in Law
  • Milk Quality and Mastitis in Dairy Cows
  • Human Mobility and Location-Based Analysis

University of Pennsylvania
2024

Ningxia Academy of Agriculture and Forestry Sciences
2022

Shanxi University
2020

Qingdao University
2019

Affiliated Hospital of Qingdao University
2019

Sichuan University
2019

West China Hospital of Sichuan University
2019

China Information Technology Security Evaluation Center
2012-2015

Beijing University of Technology
2008

Network vulnerability can be analyzed automatically by attack graph. Attack graph tools generate paths in network and show users the vulnerabilities analyzing process for security risk analysis. There are some problems such as state space explosion, high complexity of algorithms, being difficult to demonstrate graphically, so on, generation visualization techniques. Therefore, we surveyed technology. We summarized open source like MulVAL, TVA. Graph Toolkit, NetSPA commercial tools, example,...

10.1109/icasid.2013.6825274 article EN 2013-10-01

This paper begins with a discussion of the role and value industrial control system (ICS) test bed which apply universal, controllable, realistic, repeatable experimental platform to SCADA cyber security research. According ICS layered architecture, based on emulation, physical, simulation (EPS-ICS Test bed) is designed implemented. EPS-ICS enables experimenters create experiments varying levels fidelity widely used in vulnerability digging, comprehensive training, facilitate development...

10.1109/iih-msp.2013.111 article EN 2013-10-01

More standardized, networked and intelligentized nature of industry 4.0 has intensified critical infrastructures cyberthreats. According to cyber-physical systems (CPS) layered architecture security requirements in 4.0, a testbed based on cloud computing software defined network (SDN), or CPSTCS is proposed. The uses SDN recreate the cyber elements real-world physical devices for components. helps assess cyberthreats against dimensions infrastructures.

10.1109/iih-msp.2015.50 article EN 2015-09-01

With the rapid development of information and automatic control technology, more industrial system(ICS) like SCADA, is interconnected with Ethernet directly connected to internet, which greatly improve efficiency data sharing introduced in security threats at same time. As important components critical infrastructure, if attacked, will behave abnormal result disasters society countries national economy. one most import protocols applied widely industry field, OPC responsible provide...

10.1109/iih-msp.2013.112 article EN 2013-10-01

The Linear Parameter Varying Dynamical System (LPV-DS) is an effective approach that learns stable, time-invariant motion policies using statistical modeling and semi-definite optimization to encode complex motions for reactive robot control. Despite its strengths, the LPV-DS learning faces challenges in achieving high model accuracy without compromising computational efficiency. To address this, we introduce Directionality-Aware Mixture Model (DAMM), a novel applies Riemannian metric on...

10.1109/lra.2024.3401128 article EN IEEE Robotics and Automation Letters 2024-05-15

The complex etiopathology of retained placenta (RP) and hazards associated with it has made crucial for researchers clinical veterinarians to study pathogenesis, early-warning diagnosis, treatment. This aimed screen the potential prognostic markers RP in dairy cows using plasma metabolomics coupled laboratory indicators. Blood samples were collected from 260 at 21, 14, 7, 0 days before parturition 21 after parturition. Consequently, 10 healthy similar parity, body condition score, age...

10.1080/01652176.2022.2145619 article EN cc-by Veterinary Quarterly 2022-11-12

This paper introduces the gray clustering theory as a method to conduct an information security risk assessment for power substation communication systems using with combination of AHP and Delphi method, improves system model based on theory. Analysis albino by constructing weight function determine level quantification membership functions targets. Use examples prove that this can effectively evaluate risks system, provide theoretical guidance both management establishment protection system.

10.1109/iih-msp.2014.136 article EN 2014-08-01

Stuxnet event in 2010 causes the intense attention all over world about information security problems of industrial control systems, how to assure systems has become a hot topic both industry sectors and academic community. In this paper, we focus on testing devices. We first review existing certifications area analyze features these certifications. Then, describe standards area. Furthermore, compare tools used for Following work, can begin further study emerging field.

10.1109/iih-msp.2013.114 article EN 2013-10-01

Based on Dempster-Shafer (D-S) evidence theory of data fusion technology, a new intrusion detection system (IDS) model with C-SVM classifier is proposed. This consisted three SVM classifiers, which sorted out Normal, DoS, U2R, R2L and Probing behaviors from network connections according to basic TCP features, content features traffic features. Those classified results were obtained through Dempter-Shafer's rule combination, consequently recognitions implemented. The experimental result...

10.1109/icct.2012.6511316 article EN 2012-11-01

Steganalysis is the opposite art to steganography, whose goal detect whether or not seemly innocent objects like image hiding message. With explosive growth of Internet information. Making real time steganalysis online malicious use multimedia documents for covert communication has become more and difficult. Traditional research on mainly focus how improve accuracy Steganalysis, few them pay much attention efficiency Image technology architecture optimizing service providing. Regarding this...

10.1109/iih-msp.2012.107 article EN 2012-07-01

This paper begins with a discussion of the role and value network testbed which apply universal experimental platform to test new theories, technologies, vulnerabilities for cyber security research networked systems. Several common aspects NCR, Emulab, Testbed@TWISC, DETERlab, PlanetLab, SATURN, StarBED GENI are introduced, mainly including: background, techniques, architecture. Finally, we propose trends testbed, on one hand integration cloud computing, software defined (SDN) kits in...

10.1109/iih-msp.2014.139 article EN 2014-08-01

This paper begins with a discussion of the deficiency current algorithms which use number changing points frame-difference as threshold to determine moving object. Based on human morphology, feature body in video surveillance is analyzed. Secondly, "the head and shoulder projection curve"," proportion hair "and "height-width ratio "are extracted three key parameters by mathematical methods. Finally, two are used detect target, replacing existing threshold. DSP-based experimental results show...

10.1109/iih-msp.2012.106 article EN 2012-07-01

Dynamic tracing and trace replay are two main functions in vehicle monitoring system of GIS. Based on the idea line-to-point set, "point-to-point" road matching algorithm "Trace interpolation" designed implemented. The "Point-to-point" is that will be separated into a series discrete set points, then got path matched accordingly. At same time, prediction principle used to solve problems such as miscarriage justice at crossroads; First all, premise applying studied, process introduced. It...

10.1109/mmit.2008.106 article EN International Conference on Multimedia and Information Technology 2008-12-01

Power production control system is very important in the power system. In paper, a new method of risk assessment for based on rough set theory, fuzzy mathematics and Bayesian network(BN) presented. Though cluster influencing factors by using compatibles set, making minimum feature class as BN node, which can effectively reduce complexity structure, At same time, carry probabilistic reasoning BN, achieve rapid risk, then through Anti-fuzzification, obtain exact value risks. Finally, examples...

10.1109/iih-msp.2014.138 article EN 2014-08-01

Designated verifier signature, was proposed by Jakobsson, Sako and Impagliazzo, is an important cryptographic primitive which can be used to convince a single third party, i.e. the designated verifier, only who convinced fact that always construct signature intended for himself indistinguishable from original signature. Since notion of introduced, lot schemes were in literature. In this paper, we propose first scheme circulant matrices. We show secure under computational Diffie-Hellman...

10.1109/iih-msp.2012.108 article EN 2012-07-01

This study was conducted to determine the antimicrobial resistance and virulence traits of 32 Enterococcus faecium isolates from clinical bovine mastitis cases in Ningxia Province, China. In total, E. were taken subclinical on basis morphological characterization biochemical testing, screened for susceptibility. The genes studied using polymerase chain reaction (PCR). disc diffusion assay revealed a high occurrence against tetracycline (78.1%) erythromycin (68.8%) isolates. However, all...

10.24099/vet.arhiv.1439 article EN Veterinarski arhiv 2022-04-29

The Linear Parameter Varying Dynamical System (LPV-DS) is an effective approach that learns stable, time-invariant motion policies using statistical modeling and semi-definite optimization to encode complex motions for reactive robot control. Despite its strengths, the LPV-DS learning faces challenges in achieving a high model accuracy without compromising computational efficiency. To address this, we introduce Directionality-Aware Mixture Model (DAMM), novel applies Riemannian metric on...

10.48550/arxiv.2309.02609 preprint EN cc-by arXiv (Cornell University) 2023-01-01

The intelligent mobile video supervising system based on DSP are introduced in this paper. Based TMS320DM642 embedded platform, capture and processing functions designed. streaming media technology communication technology, relay distribution windows mobile, monitoring control With features, the proves to meet design expectations. Embedded makes enjoy advantage of compact size, high stability, strong mobility application suitability a variety environment. Similarly, Detection algorithm...

10.1109/ccis.2012.6664256 article EN 2012-10-01
Coming Soon ...