Yi Hua

ORCID: 0000-0003-0660-7826
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Adaptive Filtering Techniques
  • Target Tracking and Data Fusion in Sensor Networks
  • Blind Source Separation Techniques
  • Distributed Sensor Networks and Detection Algorithms
  • Advanced Computational Techniques and Applications
  • Robotics and Sensor-Based Localization
  • Sparse and Compressive Sensing Techniques
  • Robotic Path Planning Algorithms
  • Indoor and Outdoor Localization Technologies
  • Machine Fault Diagnosis Techniques
  • Computational Drug Discovery Methods
  • Network Security and Intrusion Detection
  • Image and Signal Denoising Methods
  • Innovative Microfluidic and Catalytic Techniques Innovation
  • Software Engineering and Design Patterns
  • Guidance and Control Systems
  • Distributed Control Multi-Agent Systems
  • Educational Technology and Assessment
  • Peer-to-Peer Network Technologies
  • Security in Wireless Sensor Networks
  • Electrical and Bioimpedance Tomography
  • Control and Dynamics of Mobile Robots
  • Underwater Acoustics Research
  • Ultrasonics and Acoustic Wave Propagation
  • Advanced Sensor and Control Systems

Northwestern Polytechnical University
2021-2024

China Pharmaceutical University
2020-2021

Southwest University
2018-2020

Shanghai Center for Brain Science and Brain-Inspired Technology
2019

Wuhan University
2014

PLA Information Engineering University
2011

Rongsheng Petrochemical (China)
2003

Well-known compressed sensing (CS) is widely used in image acquisition and reconstruction. However, accurately reconstructing images from measurements at low sampling rates remains a considerable challenge. In this paper, we propose novel Transformer-based hybrid architecture (dubbed TransCS) to achieve high-quality CS. the module, TransCS adopts trainable matrix strategy that gains better reconstruction by learning structural information training images. inspired powerful long-distance...

10.1109/tip.2022.3217365 article EN IEEE Transactions on Image Processing 2022-01-01

The convolutional neural network (CNN)-based reconstruction methods have dominated the compressive sensing (CS) in recent years. However, existing CNN-based approaches show potential restrictions capturing non-local similarity of images, because intrinsic characteristic layers, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$\mathit{i.e.}$</tex-math></inline-formula> , locality and weight sharing. In...

10.1109/tci.2023.3244396 article EN IEEE Transactions on Computational Imaging 2023-01-01

10.1007/s12555-021-0440-2 article EN International Journal of Control Automation and Systems 2023-02-11

Under false data-injection (FDI) attacks, the data of some agents are tampered with by FDI attackers, which causes that distributed algorithm cannot estimate ideal unknown parameter. Due to concealment malicious many detection algorithms against attacks often have poor results or low efficiencies. To solve these problems, a conveniently diffusion least-mean-square (DLMS) cross-verification (CV) is proposed attacks. The DLMS CV (DLMS-CV) comprised two subsystems: one subsystem provides test...

10.1109/tcyb.2022.3197591 article EN IEEE Transactions on Cybernetics 2022-09-13

In the electronic information era, wireless sensor network (WSN) has always been an essential foundation for collection, processing and communication. WSN with multi-task estimation, distributed cooperation estimation cluster learning attractive topic. When unknown parameters become complex, some algorithms may not work, their performance could degrade. addition, problems of time delay, caused by synchronous data fusion, different sampling rates between types sensors are usually neglected in...

10.1109/taes.2023.3253085 article EN IEEE Transactions on Aerospace and Electronic Systems 2023-01-01

10.1016/j.engappai.2022.105384 article EN Engineering Applications of Artificial Intelligence 2022-09-13

10.1109/taes.2024.3416082 article EN IEEE Transactions on Aerospace and Electronic Systems 2024-06-18

In recent years distributed estimation has attracted much attention. traditional algorithms, each node performs data fusion over synchronous data, which causes lots of time consumptions in the actual situations and performance degradation. To deal with this problem, we propose a new one-step asynchronous strategy algorithms. Moreover, proposed algorithms or without measurement sharing are studied to provide different cooperation strategies. particular, convergence behavior is analyzed, why...

10.1109/lcomm.2021.3049965 article EN IEEE Communications Letters 2021-01-09

With the continuous development of big data processing technology, selection algorithms gradually attract attention researchers. In this paper, a distributed data-selection diffusion least mean square (DLMS) algorithm, which can improve estimation accuracy traditional and also censor packets that do not bring enough innovation in wireless sensor networks, is proposed to valid iterative updates. And adaption-then-combination strategy algorithm obtained. Meanwhile, system, channel attacks are...

10.1109/access.2019.2925009 article EN cc-by IEEE Access 2019-01-01

Semi-supervised encrypted traffic anomaly detection models in zero-positive scenarios are susceptible to human labeling errors or poisoning attacks, thereby compromising the stability and reliability of model. However, existing methods insufficient address challenge reduced inter-class distance caused by attacks inability reconstruction error serve as a reliable criterion. To alleviate these challenges, framework called Poison-Resistant Anomaly Detection (PRAD) is proposed mitigate enhance...

10.1109/tnse.2024.3397719 article EN IEEE Transactions on Network Science and Engineering 2024-09-01

In this paper, we propose an adaptive malicious punishment DLMS algorithm to mitigate the adversarial attack. Two types of attacks are proposed in WSNs. The threshold is designed detect attacks. Then corresponding weight nodes can be reduced, due punishing factor. simulations demonstrate that robust

10.1109/compcomm.2018.8780590 article EN 2018-12-01

Nonlinear approximation is widely used in signal processing. Real-life signals can be modeled as functions of bounded variation. Thus the variable knot approximating function could self- adaptively chosen by balancing total variation target function. In this paper, we adopt continuous piecewise linear instead existing constants approximation. The results experiments show that new method superior to old one.

10.4236/am.2014.54063 article EN Applied Mathematics 2014-01-01

Compressed sensing is a revolutionary signal processing technique, which allows the signals of interest to be acquired at sub-Nyquist rate, meanwhile still permitting from highly incomplete measurements reconstructed perfectly. As well known, construction matrix one key technologies promote compressed theory application. Because Toeplitz can support fast algorithm and corresponds discrete convolution operation, it has essential research significance. However, conventional random matrix, due...

10.7498/aps.70.20201475 article EN Acta Physica Sinica 2021-01-01

Drug-induced cardiotoxicity has become one of the major reasons leading to drug withdrawal in past decades, which is closely related blockade human Ether-a-go-go-related gene (hERG) potassium channel. Developing reliable hERG predicting model and optimizing can greatly reduce risk faced discovery. In this study, we constructed eight classification models, best shows desirable generalization ability on low-similarity clinical compounds, as well advantages perceiving activity gap caused by...

10.26434/chemrxiv.13153112.v1 preprint EN cc-by-nc-nd 2020-10-30

Considering the problem of noise in damage monitoring signal aviation connection structure, a new denoising algorithm based on combination EEMD and wavelet adaptive threshold function is proposed, which can effectively solve shortcomings single de-noising algorithm. In this algorithm, designed, poor continuity constant deviation traditional function. At same time, variable adjustment factor further adopted to realize different decomposition scales. The simulation compared soft hard...

10.1109/phm-nanjing52125.2021.9612901 article EN 2021 Global Reliability and Prognostics and Health Management (PHM-Nanjing) 2021-10-15

With the development of computer technology, importance attached to security application systems is increasing day by day. Access control, as an important has been applied in operating system, database management and network system etc. This paper adopt ideology high cohesion low coupling software engineering, achieve design login component improving RBAC model under .NET platform, increases mechanism direct authorize users shield part users’ authority based on main role, enriches old mode...

10.4028/www.scientific.net/amr.383-390.435 article EN Advanced materials research 2011-11-22

This paper pointed out information resource construction of cartography teaching is the guarantee improving quality, important component course construction; according to characteristics classify resource, laying foundations for integration; Besides, with years experience in system, progress fundamental principle, method and achievements finally it discussed system.

10.4028/www.scientific.net/amr.271-273.1595 article EN Advanced materials research 2011-07-01
Coming Soon ...