Shuyuan Zhao

ORCID: 0000-0002-8732-9786
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Millimeter-Wave Propagation and Modeling
  • Advanced Wireless Network Optimization
  • Digital Media Forensic Detection
  • Visual Attention and Saliency Detection
  • Multimedia Communication and Technology
  • Emotional Intelligence and Performance
  • Context-Aware Activity Recognition Systems
  • Infrared Target Detection Methodologies
  • Privacy-Preserving Technologies in Data
  • Network Packet Processing and Optimization
  • Blind Source Separation Techniques
  • Speech and dialogue systems
  • Simulation and Modeling Applications
  • Recommender Systems and Techniques
  • Action Observation and Synchronization
  • Sustainable Building Design and Assessment
  • Supercapacitor Materials and Fabrication
  • Autonomous Vehicle Technology and Safety

Zhejiang Lab
2022-2024

Institute of Information Engineering
2023-2024

Chinese Academy of Sciences
2023-2024

Beijing Haidian Hospital
2023

University of Chinese Academy of Sciences
2023

Xi'an Jiaotong University
2017-2019

Huaqiao University
2018

Zhongyuan University of Technology
2017

Changsha Normal University
2006

Hunan Normal University
2006

Collaborative perception by leveraging the shared semantic information plays a crucial role in overcoming individual limitations of isolated agents. However, existing collaborative methods tend to focus solely on spatial features information, while neglecting importance temporal dimension. Consequently, potential benefits collaboration remain underutilized. In this article, we propose Select2Col, novel framework that takes into account <underline...

10.1109/tvt.2024.3390414 article EN IEEE Transactions on Vehicular Technology 2024-04-18

Leveraging deep learning to detect malicious network traffic is a crucial technology in management and security. However, security has raised concerns among scholars. In this work, we explore executing targeted adversarial attacks for multi-classification detection with limited interactions. Specifically, constrain the number of interactions employ hop-skip-jump attack (HSJA) generate small samples. These samples are then heuristically used train generative (GAN) substantial quantity...

10.1109/icassp48485.2024.10446008 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Cache-enabled small cell networks have been regarded as a promising approach for network operators to cope with the explosive data traffic growth in future 5G networks. However, user association and resource allocation mechanism has not thoroughly studied under given content placement situation. In this paper, we formulate joint optimization problem of mixed integer nonlinear programming (MINLP) aiming at deriving balance between total utility rates retrieved from caches. To solve problem,...

10.1109/cc.2017.8107635 article EN China Communications 2017-10-01

Privacy information theft traffic is usually detected using classification methods, and deep learning-based detection methods are effective for this task. However, these have complex preprocessing processes as well tend to ignore the features of network traffic, while generalization ability not outstanding. In paper, a model TCCN (Traffic Classification Capsule Network) based on capsule proposed. Meanwhile, PacketCGAN-based data balancing method introduced assist in classification. A new...

10.1109/icc45041.2023.10278688 article EN ICC 2022 - IEEE International Conference on Communications 2023-05-28

Dual connectivity (DC) is a promising solution to boost system capacity and enhance mobility robustness in the fifth generation networks, allowing mobile users (MUs) aggregate radio-frequency resources simultaneously from at least two kinds of serving base stations. In this paper, we focus on novel cache-enabled heterogeneous network, where MUs can flexibly schedule its traffic between traditional sub-6 GHz ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/access.2018.2883155 article EN cc-by-nc-nd IEEE Access 2018-01-01

In the fifth-generation communication system, millimeter wave (mmWave) networks will coexist with traditional micro (μWave) networks, which allows for higher data transmission rate and better user experience. this paper, we give a comprehensive framework of mathematical models analytical methods multi-tier mmWave μWave hybrid caching based on stochastic geometry. We propose an association strategy by assuming average biased-received power Rayleigh fading. Accordingly, using D-ball...

10.1109/access.2018.2869748 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract Cache‐enabled networks are a promising solution to high video traffic, which allows popular files cache at the user equipment (UE) and base stations (BSs). To improve efficiency of file transmission, we adopt full‐duplex (FD) radio technology millimeter‐wave small BSs ( mm SBSs) in our network scenario. In this paper, users can get their required via one self‐communication, FD device‐to‐device (D2D) communication, SBS communication macro BS (MBS) communication. Different modes have...

10.1002/ett.3804 article EN Transactions on Emerging Telecommunications Technologies 2019-12-02

Correntropy has been proved to be effective in eliminating the adverse effects of impulsive noises adaptive filtering. However, correntropy is not desirable when error between two random variables asymmetrically distributed around zero. To address this problem, asymmetric using an Gaussian function as kernel was proposed. always best choice and can further expanded. In paper, we propose a robust filtering based on more flexible definition correntropy, which called generalized that adopts...

10.3390/rs14153677 article EN cc-by Remote Sensing 2022-08-01

Malicious traffic detection is important for the safe operation of cyberspace. Existing methods are difficult to extract discriminative features, leading rate bottleneck. In addition, performance significantly degraded in sample imbalanced scenarios, with poor generalization ability and insufficient scalability. Therefore, this paper proposes a multi-layer malicious model based on multi-branch octave convolution attention mechanism (MLMTD), which adopts multiple modules more diverse feature...

10.1109/icassp48485.2024.10448051 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

10.1109/icme57554.2024.10687610 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2024-07-15

Outlier elimination is an important work for the trajectory data processing in vehicle test. The continuous outliers degrade accuracy of further and analyzing results especially. Kalman filtering least squares B-spline approximation are common method outlier elimination, but often cannot meet requirements. Robust M-estimation can obtain good its too complex. Hereby, a new based on Wright criterion was proposed to eliminate called odd-even extraction. extracted into 2 <sup...

10.1109/icsai48974.2019.9010562 article EN 2019-11-01

In the fifth generation communication system, millimeter wave (mmWave) networks will coexist with traditional micro (μWave) networks, which allows for higher data transmission rate and better user experience. this paper, we give a comprehensive framework of mathematical models analytical methods multi-tier mmWave μWave hybrid caching based on stochastic geometry. We propose an association strategy by assuming average biased-received power Rayleigh fading. Accordingly, using D-ball...

10.20944/preprints201806.0263.v1 preprint EN 2018-06-15

The content retrieval delay is an important performance metric for enhancing user experience in wireless networks. In this paper, by modeling the locations of base stations (BSs) as Matern hard‐core point process type II (MHP), we analyze a typical cache‐enabled device networks under most popular policy. Since it intractable to get size distribution Voronoi cell MHP model, propose approximate formula based on empirical result Poisson and derive cellular load which denotes number devices...

10.1155/2018/2303289 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Cache‐enabled heterogeneous cellular networks (HCNs) have been investigated extensively to alleviate backhaul congestion and reduce content delivery delay. In this paper, we jointly optimize placement user association minimize the average delay in cache‐enabled HCNs based on flow‐level models. This formulation considers (1) different timescales of delivery, (2) locality popularity, (3) heterogeneity spatial traffic distribution, which are often neglected existing researches. The joint...

10.1155/2018/1628283 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

An interpolation method based on bidirectional unequal interval kernel adaptive filtering was proposed to solve the missing data problem of trajectory measurement for vehicle test. The training samples filter are designed by before and after segment measurement. After training, is using predict data. To further improve precision prediction data, sample sampled at different intervals obtain time points. acquired, finely adjusted a higher result. Simulation processing results demonstrate...

10.1109/cisp-bmei48845.2019.8965696 article EN 2021 14th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI) 2019-10-01

Collaborative perception by leveraging the shared semantic information plays a crucial role in overcoming individual limitations of isolated agents. However, existing collaborative methods tend to focus solely on spatial features information, while neglecting importance temporal dimension. Consequently, potential benefits collaboration remain underutilized. In this article, we propose Select2Col, novel framework that takes into account \underline{s}patial-t\underline{e}mpora\underline{l}...

10.48550/arxiv.2307.16517 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Traditional Encrypted Traffic Classification (ETC) methods face a significant challenge in classifying large volumes of encrypted traffic the open-world assumption, i.e., simultaneously known applications and detecting unknown applications. We propose novel Open-World Contrastive Pre-training (OWCP) framework for this. OWCP performs contrastive pre-training to obtain robust feature representation. Based on this, we determine spherical mapping space find marginal flows each class, which are...

10.1109/iscc58397.2023.10218269 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2023-07-09
Coming Soon ...