Hao Tang

ORCID: 0009-0006-6814-3456
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • COVID-19 diagnosis using AI
  • Domain Adaptation and Few-Shot Learning
  • Radiomics and Machine Learning in Medical Imaging
  • Imbalanced Data Classification Techniques
  • Topic Modeling
  • Rough Sets and Fuzzy Logic
  • Lung Cancer Diagnosis and Treatment
  • Advanced Computational Techniques and Applications
  • User Authentication and Security Systems
  • Artificial Intelligence in Healthcare
  • Blockchain Technology Applications and Security
  • Medical Image Segmentation Techniques
  • Human Mobility and Location-Based Analysis
  • Deception detection and forensic psychology
  • Fire effects on concrete materials
  • Industrial Vision Systems and Defect Detection
  • Auction Theory and Applications
  • Traffic Prediction and Management Techniques
  • Wireless Networks and Protocols
  • Privacy-Preserving Technologies in Data
  • Bayesian Modeling and Causal Inference
  • Evaluation Methods in Various Fields
  • Information and Cyber Security
  • Digital Imaging for Blood Diseases

Shijiazhuang Tiedao University
2025

Tongji University
2023-2025

Ministry of Education of the People's Republic of China
2023-2024

Shanghai Artificial Intelligence Laboratory
2023-2024

Beijing Academy of Artificial Intelligence
2023-2024

Yale University
2023

University of California, Irvine
2019-2023

Nanjing University of Aeronautics and Astronautics
2023

Shanghai Jiao Tong University
2020

University of Chinese Academy of Sciences
2020

In the context of neuro-pathological disorders, neuroimaging has been widely accepted as a clinical tool for diagnosing patients with Alzheimer’s disease (AD) and mild cognitive impairment (MCI). The advanced deep learning method, novel brain imaging technique, was applied in this study to evaluate its contribution improving diagnostic accuracy AD. Three-dimensional convolutional neural networks (3D-CNNs) were magnetic resonance (MRI) execute binary ternary classification models. dataset...

10.1142/s012906572050032x article EN International Journal of Neural Systems 2020-05-27

Regular crack detection is essential for extending the service life of bridges. However, image data collected during bridge inspections are complex to convert into physical information and construct intuitive comprehensive Three-Dimensional (3D) models incorporating information. An intelligent method surface damage based on Unmanned Aerial Vehicles (UAVs) proposed these challenges, a three-stage detection, quantification, visualization process. This enables automatic localization in 3D...

10.3390/buildings15071117 article EN cc-by Buildings 2025-03-29

Pulmonary lobe segmentation is an important task for pulmonary disease related Computer Aided Diagnosis systems (CADs). Classical methods rely on successful detection of fissures and other anatomical information such as the location blood vessels airways. With success deep learning in recent years, Deep Convolutional Neural Network (DCNN) has been widely applied to analyze medical images like Computed Tomography (CT) Magnetic Resonance Imaging (MRI), which, however, requires a large number...

10.1109/isbi.2019.8759468 article EN 2022 IEEE 19th International Symposium on Biomedical Imaging (ISBI) 2019-04-01

The issues of both system security and safety can be dissected integrally from the perspective behavioral appropriateness . That is, a that is secure or safe judged by whether behavior certain agent(s) appropriate not. Specifically, so-called involves right agent performing actions at time under conditions. Then, according to different levels degrees custodies, authentication graded into three levels, i.e. , Identity Conformity Benignity In broad sense, for issue, not only an innovative...

10.1051/sands/2024003 article EN cc-by Security and Safety 2024-01-01

Segment Anything Model 2 (SAM 2), a prompt-driven foundation model extending SAM to both image and video domains, has shown superior zero-shot performance compared its predecessor. Building on SAM's success in medical segmentation, presents significant potential for further advancement. However, similar SAM, is limited by output of binary masks, inability infer semantic labels, dependence precise prompts the target object area. Additionally, direct application segmentation tasks yields...

10.48550/arxiv.2502.02741 preprint EN arXiv (Cornell University) 2025-02-04

Bayesian network is an effective uncertain knowledge representation and reasoning method. Fuzzy sets can be used for expressing fuzzy events or objectives in some special region. Combining these two theories, this paper discusses the probability of event presents a hybrid inference system with networks which are called "Fuzzy Networks (FBNs) ". Then case demonstrates validity FBNs machinery fault diagnosis.

10.1109/fskd.2007.202 article EN 2007-01-01

Advances in self-supervised learning have drawn attention to developing techniques extract effective visual representations from unlabeled images. Contrastive (CL) trains a model consistent features by generating different views. Recent success of Masked Autoencoders (MAE) highlights the benefit generative modeling learning. The approaches encode input into compact embedding and empower model's ability recovering original input. However, our experiments, we found vanilla MAE mainly recovers...

10.1109/wacv56688.2023.00271 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2023-01-01

Graph neural networks (GNNs) are playing exciting roles in the application scenarios where features hidden information associations. Fraud prediction of online credit loan services (OCLSs) is such a typical scenario. But it has another rather critical challenge, i.e., scarcity data labels. Fortunately, GNNs can also cope with this problem due to their good ability semi-supervised learning by mining structure and feature within graphs. Nevertheless, gain internal often too limited help handle...

10.1145/3623401 article EN ACM Transactions on Intelligent Systems and Technology 2023-09-21

Centralized training and decentralized execution (CTDE) paradigm is widely employed to address the nonstationary partial observability in multiagent reinforcement learning (MARL). One of main challenges that restricts performance CTDE <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">credit assignment.</i> Existing methods cannot sufficiently energize each agent for exploring a broader solution space without compromising or factorization...

10.1109/tcss.2024.3428334 article EN IEEE Transactions on Computational Social Systems 2024-08-07

According to the mass health monitoring data accumulated of bridge structure for a long time, this paper proposes method reconstitute time series in phase space. Since points are regressed by support vector machine (SVM), relevant past behavior patterns established. Then, it could infer future development trend and form basis online security early warning structure. The strain tilt Pian Yan-zi Chongqing analyzed compared with prediction auto regression moving average (ARMA). results show...

10.1109/icnc.2015.7378090 article EN 2015-08-01

Root cause analysis (RCA) of network faults is crucial to wireless operation and management. It, however, challenging, due diverse feature types, lengths time slices, simultaneous occurrences multiple root causes, lack training samples. In this paper, we present our solutions for these problems in ICASSP-SPGC-2022 AIOps Challenge Communication Networks. We first design specific engineering method represent the provided spatial features. Secondly, conduct series on data propose an efficient...

10.1109/icassp43922.2022.9746416 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

Anti-fraud engineering for online credit loan (OCL) platforms is getting more challenging due to the developing specialization of gang fraud. Associations are critical features referring assessing credibility applications OCL fraud prediction. State-of-the-art solutions employ graph-based methods mine hidden associations among effectively. They perform well based on information asymmetry which guaranteed by huge advantage over fraudsters in terms data quantity and quality at their disposal....

10.1109/tdsc.2023.3334281 article EN IEEE Transactions on Dependable and Secure Computing 2023-11-20

In order to make full use of fault historical text data, knowledge graph is used assist diagnosis. Text classification, a fundamental method for constructing graph, prone the overfitting issue when dealing with sparse and small sample data such as domain data. Therefore, an integrated neural network model based on CNN-BiLSTM (convolutional networks bidirectional long short-term memory networks) proposed in this paper. model, CNN layers extract local semantic features while BiLSTM integrate...

10.1109/ccdc58219.2023.10326709 article EN 2022 34th Chinese Control and Decision Conference (CCDC) 2023-05-20

RGB-Thermal Salient Object Detection aims to pinpoint prominent objects within aligned pairs of visible and thermal infrared images. Traditional encoder-decoder architectures, while designed for cross-modality feature interactions, may not have adequately considered the robustness against noise originating from defective modalities. Inspired by hierarchical human visual systems, we propose ConTriNet, a robust Confluent Triple-Flow Network employing Divide-and-Conquer strategy. Specifically,...

10.48550/arxiv.2412.01556 preprint EN arXiv (Cornell University) 2024-12-02

Pulmonary lobe segmentation is an important task for pulmonary disease related Computer Aided Diagnosis systems (CADs). Classical methods rely on successful detection of fissures and other anatomical information such as the location blood vessels airways. With success deep learning in recent years, Deep Convolutional Neural Network (DCNN) has been widely applied to analyze medical images like Computed Tomography (CT) Magnetic Resonance Imaging (MRI), which, however, requires a large number...

10.48550/arxiv.1903.09879 preprint EN cc-by-sa arXiv (Cornell University) 2019-01-01

The issues of both system security and safety can be dissected integrally from the perspective behavioral \emph{appropriateness}. That is, a is secure or safe judged by whether behavior certain agent(s) \emph{appropriate} not. Specifically, so-called \emph{appropriate behavior} involves right agent performing actions at time under conditions. Then, according to different levels appropriateness degrees custodies, authentication graded into three levels, i.e., \emph{Identity},...

10.48550/arxiv.2312.03429 preprint EN other-oa arXiv (Cornell University) 2023-01-01

There are a large amount of complex data in the power grid database. How to use these reasonably and efficiently solve problem operation safety has become an urgent need. Based on principle association rule mining technology, this paper realizes potential information massive database through improved Apriori algorithm., The algorithm innovation introduces two factors efficiency interest, so that strong rules can be screened more accurately. In addition, view number candidate sets algorithm,...

10.1109/iciba52610.2021.9688071 article EN 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) 2021-12-17
Coming Soon ...