Haoyu Li

ORCID: 0009-0004-7555-2093
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Ocular Disorders and Treatments
  • User Authentication and Security Systems
  • Advanced Wireless Communication Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Cybersecurity and Cyber Warfare Studies
  • Advanced Battery Materials and Technologies
  • Advanced Malware Detection Techniques
  • HVDC Systems and Fault Protection
  • Chemical Synthesis and Characterization
  • Social Media and Politics
  • Power System Optimization and Stability
  • Chaos-based Image/Signal Encryption
  • Indoor and Outdoor Localization Technologies
  • Bullying, Victimization, and Aggression
  • Psychosocial Factors Impacting Youth
  • Youth Development and Social Support
  • Transportation and Mobility Innovations
  • RFID technology advancements
  • Blockchain Technology Applications and Security
  • Public Relations and Crisis Communication
  • Bluetooth and Wireless Communication Technologies
  • graph theory and CDMA systems
  • Conferences and Exhibitions Management
  • Digital Marketing and Social Media

Southeast University
2023-2025

Sichuan University
2024-2025

Brunel University of London
2024

Guangdong University of Technology
2023

University of California, Los Angeles
2023

Beijing Institute of Technology
2022

Shanghai Jiao Tong University
2019

Virginia Tech
2018

University of Michigan–Dearborn
2013

During recent years, emerging electrochemical energy storage systems beyond lithium-ion batteries have attracted extensive interest, in which large amounts of studies focused on the investigation various electrode materials and where vanadium-based received great attention particularly. In this review, order to systematically understand upstream downstream relationships vanadium, an overview research vanadium resources extraction is presented. Vanadium techniques are classified into three...

10.1021/acs.iecr.3c04208 article EN Industrial & Engineering Chemistry Research 2024-02-16

Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals. This new security technique is expected complement existing cryptographic techniques for key distribution of future networks. In this paper, we present a attack, reconfigurable intelligent surface (RIS) jamming, and show that an attacker can prevent legitimate users from agreeing on the same by deploying malicious RIS break reciprocity....

10.1109/tifs.2024.3389569 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

We develop a microwave-assisted solid-phase synthesis (MASS) for Na₃V₂(PO₄)₂F₃ (NVPF) using NH₄F, NH₄VO₃, and Na₂CO₃ precursors, achieving ultrafast (40 minutes) fractal microstructure with uniform carbon coating. The...

10.1039/d5cc01231g article EN Chemical Communications 2025-01-01

Many RFID tags store valuable information privy to their users that can easily be subject unauthorized reading, leading owner tracking, or impersonation. are also susceptible different forms of relay attacks. This paper presents novel sensing-enabled defenses reading and attacks against systems without necessitating any changes the traditional usage model. Specifically, this proposes use cyber-physical interfaces, on-board tag sensors, (automatically) acquire useful contextual about tag's...

10.1109/tetc.2013.2290537 article EN cc-by IEEE Transactions on Emerging Topics in Computing 2013-11-19

Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals. This new security technique is expected complement existing cryptographic techniques for key distribution of future networks. In this paper, we present a attack, reconfigurable intelligent surface (RIS) jamming, and show that an attacker can prevent legitimate users from agreeing on the same by deploying malicious RIS break reciprocity....

10.48550/arxiv.2303.07015 preprint EN other-oa arXiv (Cornell University) 2023-01-01

In addition to active safety, passive and functional automotive cyber security becomes the fourth largest safety issue in field, triggering extensive researches academia industry. Based on requirements of a domestic vehicle, new type vehicle electronic electrical architecture was designed, considering network topology, controller design, communication data protection. terms security, it can achieve defense-in-depth for entire system. addition, improvement applied finished penetration tests...

10.1109/icite56321.2022.10101381 article EN 2020 IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE) 2022-11-11

This paper explores the impact of target cybersecurity risk on merger outcomes. Using reported data breaches as a proxy for risk, we find strong evidence that breach experience is negatively associated with acquirer and combined entity announcement returns long-run post-merger performance. We further show recognizes greater goodwill impairment loss, takes longer to complete transaction, more likely future breach, when it purchases data-breached firm. The value destruction effect pronounced...

10.2139/ssrn.4710414 preprint EN 2024-01-01

Abstract With the increasing number of electric fast charging stations (FCSs) deployed along roadsides both urban roads and highways, long-distance travel vehicles (EVs) becomes possible. The EV navigation scheme is significant for quality user experience. However, variable conditions power grid traffic networks make it a serious challenge. In this paper, we propose an efficient while considering computation resource sharing. support vehicular edge computing in intelligent transportation...

10.21203/rs.3.rs-2694464/v1 preprint EN cc-by Research Square (Research Square) 2023-03-20

Physical-layer secret key generation (PKG) is an emerging technique to address the distribution problem and precoding matrix index (PMI)-based PKG approaches can thwart eavesdropping attempts. However, existing schemes based on PMI only considered square channel matrices, which restricts practical application. In this paper, we propose a new scheme called NS-PMI-PKG yield keys for non-square matrices in time-division duplex (TDD) mode. Specifically, includes two vital steps, i.e., codebook...

10.1109/iccc57788.2023.10233395 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2023-08-10

The artificial electromagnetic characteristics of reconfigurable intelligent surfaces (RIS) offers new opportunities to increase the secret key rate (SKR) in physical-layer generation (PKG). However, existing literature has primarily focused on continuous phase shift designs for RIS enhance SKR, while practice shifts are discrete due hardware implementations. Hence, extent which practical with can SKR remains uncertain. Moreover, we have observed that optimization methods not directly...

10.1109/vtc2023-fall60731.2023.10333843 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2023-10-10

We analyze the impact of group activities targeting Social-Emotional Learning (SEL) and peer effects on risk protective factors associated with gang involvement among youth participating in Los Angeles Mayor's Office Gang Reduction Youth Development (GRYD) Prevention program. compare targeted non-targeted decreasing Internal Risk, External Family Norms as measured by a standardized questionnaire. show that are effective Risk focusing Emotional Management most beneficial. Since involve...

10.1109/bigdata59044.2023.10386512 article EN 2021 IEEE International Conference on Big Data (Big Data) 2023-12-15
Coming Soon ...