Yu Liu

ORCID: 0009-0009-5224-4094
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Reliability and Analysis Research
  • Neural Networks and Applications
  • Face and Expression Recognition
  • Network Traffic and Congestion Control
  • Software Testing and Debugging Techniques
  • Computer Graphics and Visualization Techniques
  • Advanced Authentication Protocols Security
  • Cloud Computing and Resource Management
  • Advanced Computational Techniques and Applications
  • Cryptography and Data Security
  • Advanced Algorithms and Applications
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Reliability and Maintenance Optimization
  • 3D Shape Modeling and Analysis
  • Robotics and Sensor-Based Localization
  • Software System Performance and Reliability
  • Statistical Methods and Inference
  • Vehicular Ad Hoc Networks (VANETs)
  • Video Surveillance and Tracking Methods
  • Time Series Analysis and Forecasting
  • Software Engineering Research
  • Power Systems and Technologies
  • Modular Robots and Swarm Intelligence

Nanjing Tech University
2024

Zhengzhou University
2023-2024

City University of Hong Kong
2015

Tsinghua University
2014

Ministry of Education of the People's Republic of China
2013

University of Electronic Science and Technology of China
2011

Zhejiang University of Science and Technology
2008

With the rapid development of information and communication technology, vehicular AD hoc networks (VANETs) has attracted more attention. In order to provide traffic safety services, vehicles frequently share related road traffic, such as vehicle motion data flow data. Reliable key generation is basis VANET security system construction. Presently, most schemes rely on a trusted third party, so there are risks. Traditional agreement protocols have high overhead, not suitable for...

10.1109/jiot.2023.3286120 article EN IEEE Internet of Things Journal 2023-06-14

Complete coverage path planning is a key problem for autonomous cleaning robots, which concerns not only the efficiency but also adaptability to unstructured environments. But diversity of environments and limited perception ability robot make still unsolved. In this paper, novel strategy combined proposed, combines random local complete planning. The lets run straight until an obstacle encountered. After turning angle, continues run. This mode easy implement can provide with flexibility And...

10.1109/wcica.2008.4594223 article EN 2008-01-01

Vehicle Ad-hoc Network (VANET) plays an important role in improving traffic management and driving safety. Data sharing VANET can be achieved using such communications as Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Cloud (V2C). However, due to the openness of VANET, if adversary access shared data without authorization, it will seriously threaten vehicle safety user privacy, bring great challenges sharing. Therefore, is necessary establish efficient control scheme...

10.1109/jiot.2024.3384753 article EN IEEE Internet of Things Journal 2024-04-09

Abstract We propose an altitude‐adaptive vehicle counting method with attention mechanism and multiscale receptive fields that optimizes the measurement accuracy inference latency of unmanned aerial (UAV) images. An is used to aggregate horizontal vertical feature weights enhance spatial information suppress background noise. The UAV flight altitude shooting depression angle are considered for scale division image segmentation avoid acquiring distance measurements. Based on dilation rate, we...

10.4218/etrij.2023-0426 article EN publisher-specific-oa ETRI Journal 2024-05-27

Software reliability growth modeling plays an important role in software evaluation. To incorporate more information and provide accurate analysis, fault detection correction processes has attracted widespread research attention recently. However, the assumption of stochastic time delay brings difficulties estimating parameters. In practice, other than grouped data, test records often include some detailed information, such as rough when one is detected or corrected. Such semi-grouped...

10.1109/qrs.2015.20 article EN 2015-08-01

10.1016/j.csda.2024.108068 article EN Computational Statistics & Data Analysis 2024-09-01

Network virtualization, as a fundamental technology of Future Internet Architecture, has been used to overcome the ossification current Internet. This paper focuses on virtual nodes splitting for aggregating diverse physical resources in issue network embedding (VNE), which is resource allocation virtualization. A mixed integer programming (MIP) problem proposed by taking both path-splitting and node-splitting into considerations. The feasibility node analyzed corresponding formal expression...

10.1109/icct.2013.6820395 article EN 2013-11-01

In power system, the data synchronization of electronic transformer is precondition and guarantee for protection's correct operation. this paper, origin asynchronization introduced first, common interpolation methods to solve problem are given. Considering most general form sampled signal, error expressions linear, quadratic cubic spline deduced influencing factors discussed. Besides, changing relationships between errors three calculated by simulation, accuracy compared analyzed. The...

10.1049/cp.2015.0346 article EN International Conference on Renewable Power Generation (RPG 2015) 2015-01-01

Trusted computing technology aims to protect the computer or embedded system from tampering. Based on idea of trust chain establishment, it establishes a for whole process power-on application running in operating system. However, uses static measurement scheme before starting each component, so state information recorded by can only reflect program when is started, but not at run time. In view above problems, analyzing credibility theorem operation defined non-interference model, dynamic...

10.1109/icsip57908.2023.10270972 article EN 2022 7th International Conference on Signal and Image Processing (ICSIP) 2023-07-08
Coming Soon ...