Huan Dai

ORCID: 0000-0003-2708-2790
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • User Authentication and Security Systems
  • Speech and Audio Processing
  • graph theory and CDMA systems
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Wireless Networks and Protocols
  • Hand Gesture Recognition Systems
  • Non-Invasive Vital Sign Monitoring
  • Privacy-Preserving Technologies in Data
  • Advanced MIMO Systems Optimization
  • Advanced Neural Network Applications
  • Emotion and Mood Recognition
  • Advanced Wireless Communication Techniques
  • Advanced Data and IoT Technologies
  • Photovoltaic System Optimization Techniques
  • Metaheuristic Optimization Algorithms Research
  • Music Technology and Sound Studies
  • Blockchain Technology Applications and Security
  • Fire Detection and Safety Systems
  • IoT Networks and Protocols
  • Optimization and Packing Problems
  • Gait Recognition and Analysis
  • Automated Road and Building Extraction
  • Human Pose and Action Recognition

Suzhou University of Science and Technology
2018-2025

City University of Macau
2025

Suzhou City University
2025

Research Institute of Wood Industry
2025

Chinese Academy of Forestry
2025

Weatherford College
2021

Flint Institute Of Arts
2021

Beijing University of Posts and Telecommunications
2012

Surface defect detection plays an important role in particleboard quality control. But it still faces challenges detecting coexisting multi-scale defects and weak texture defects. To address these issues, this study proposed PBD-YOLO (Particleboard Defect-You Only Look Once), a lightweight YOLO-based algorithm with feature fusion enhancement capabilities. In order to improve the ability of extract features, SPDDEConv (Space Depth Difference Enhance Convolution) module was introduced study,...

10.3390/app15084343 article EN cc-by Applied Sciences 2025-04-15

10.1049/icp.2024.4550 article EN IET conference proceedings. 2025-01-01

Physical-layer key generation has emerged as a promising avenue for establishing secret keys using reciprocal channel measurements between wireless devices. However, reciprocity may suffer degradation from ambient noise and cause mismatched bits, while existing methods mitigating this issue yet face limitations in efficiency. The root behind such is the heavy reliance on measurements, which can be naturally susceptible to non-reciprocity attributed environmental factors. Instead of direct...

10.1109/tmc.2024.3407062 article EN IEEE Transactions on Mobile Computing 2024-05-30

Abstract Combinatorial optimization problems have very important applications in information technology, transportation, economics, management, network communication, and other fields. Since the problem size real-scenario application is large-scale, demand for real-time efficient solving approaches increases rapidly. The traditional exact methods guarantee optimality of final solution, but these can hardly solve acceptable time due to extremely high computational costs. Heuristic find...

10.1093/jcde/qwad029 article EN cc-by-nc Journal of Computational Design and Engineering 2023-04-14

The emerging smart city is driving massive transformations of modern cities, facing the huge influx sensor data from IoT devices. Edge computing distributes tasks to near-edge end, which greatly enhances service quality applications, that is, ultralow latency, large capacity, and high throughput. However, due constrained resource devices, currently, systems with a centralized model are vulnerable attacks, such as DDoS botnet central database failure, can hardly provide high-confidence...

10.1155/2021/3050953 article EN cc-by Security and Communication Networks 2021-08-28

Personal Identification Number (PIN), as one of the primary means protecting digital properties and privacy on mobile devices, has been suffering from shoulder surfing attacks weak password guessing for long term. Recent years witness growing interest in two-factor authentication that takes advantage two different ways mutual verification, thereby strengthening user authentication's accuracy reliability. Especially with popularity smartwatches, more physiological signals are readily...

10.1109/icdcs57875.2023.00074 article EN 2023-07-01

Summary Electrical fires caused by leakage, short circuit, overload, and other electrical failures occur frequently in residential areas, failure to find locate the fault location time is main reason for evolution of circuit into fire, especially ancient buildings with aging facilities. Different from modern large‐scale buildings, architectural complex composed a large number scattered low inconsistent facility specifications simple structure, so it does not have conditions deploy unified...

10.1002/dac.5329 article EN International Journal of Communication Systems 2022-08-22

A photovoltaic (PV) plant is normally built in a fixed series-parallel configuration and its power-voltage characteristics often get complex with multiple peaks under partial shading scenarios. Therefore, identification of important for monitoring invoking maximum power pint estimation. This paper proposes back-propagation neural network (BPNN) based method which locates shaded modules by using measured voltage data. Optimal sensor placement schemes are introduced to decrease the number...

10.1109/icrera.2018.8566715 article EN 2018-10-01

The physical layer secret key generation exploiting wireless channel reciprocity has demonstrated its viability and effectiveness in various scenarios, such as the Internet of Things (IoT) network, mobile communication industrial control system. Most existing studies rely on quantization technique to convert measurements into bits for confidential communications. However, non-simultaneous packet exchanges time-division duplex systems noise effects usually induce inconsistent results...

10.1109/tmc.2024.3364909 article EN IEEE Transactions on Mobile Computing 2024-02-12

As one of the most common ways for user authentication, Personal Identification Number (PIN), due to its simplicity and convenience, has suffered from plenty side-channel attacks, which pose a severe threat people’s privacy property. The success existing attacks is usually built upon premise no occlusion between attacker victim’s hand gesture, but it increases difficulty launching attack possibility exposure. To overcome such limitation, we propose ArmSpy++, an improved video-assisted PIN...

10.1145/3696418 article EN ACM Transactions on Privacy and Security 2024-09-23

This paper opens up a new pathway of the utility breathing pattern for user verification.We demonstrate that it is possible to capture people's leveraging commodity WiFi devices.While prior solutions biometricsbased recognition usually require dedicated devices (e.g., video cameras or IR sensors), this introduces first general, low-cost breathing-based verification system using devices.The proposed based on fact always keeps consistent same but distinct among different people.Our innovative...

10.23919/jcn.2022.000011 article EN Journal of Communications and Networks 2022-04-01

PIN inference attack leveraging keystroke-induced side-channel information poses a substantial threat to the security of people's privacy and properties. Among various attacks, video-assisted method provide more intuitive robust infer PINs. But it usually requires there is no visual occlusion between attacker victims or their hand gestures, making attackers either easy expose themselves inapplicable scenarios such as ATM POS terminals. In this paper, we present novel practical system,...

10.1109/infocom48880.2022.9796738 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

The popularity of intelligent mobile devices enables users to access various information services anytime and anywhere, which increases people's demand for communication networks. WiFi network is one the main ways smart network. Compared with using cellular network, are more willing connect when there coverage, even automatically crack password connect. In order improve security devices, this paper proposes an Authentication method connection device based on Channel State Information (CSI)....

10.1109/iccc51575.2020.9345065 article EN 2020-12-11

In distributed antenna systems (DAS), multi-user interference was shown to be asynchronous, which had not been paid much attention. this study, the authors compare performances of DAS under condition asynchronous (AI) with four well-known multiple-input multiple-output (MIMO) algorithms namely zero-forcing (ZF), block diagonalisation (BD), signal-to-leakage-plus-noise ratio (SLNR) and dirty paper coding (DPC) algorithms. The simulation results clearly demonstrate significant performance...

10.1049/iet-com.2010.0983 article EN IET Communications 2012-01-01

Similarity search for trajectories, especially the top-k similarity query, has been widely used in different fields, such as personalized travel route recommendation, car pooling, etc. Previous works have studied trajectory query plaintext, but increasing attention to privacy protection makes on data become a challenge. In this paper, we propose privacy-preserving scheme over large-scale based Hilbert curve and homomorphic encryption. Towards end, first define spatio-temporal measure that...

10.1109/mass58611.2023.00070 article EN 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) 2023-09-25

The interest of indoor movement state recognition has been recently extensively evaluated by several research teams. This paper fully explores the signals from all sensors in a smartphone and develops novel deep neural network-based model. In off-line training phase, this firstly proposes matrix to pre-processing raw data overcome its redundancy complexity. second place, managed go through stacked denoising autoencoder network, resulting an output layer with seven different states. trained...

10.1109/icomssc45026.2018.8941962 article EN 2018 International Computers, Signals and Systems Conference (ICOMSSC) 2018-09-01
Coming Soon ...