Youyang Qu
YOU?
Author Swipe
View article: From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways
From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways Open
The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increase…
View article: LSTM-KAN: Revolutionizing Indoor Visible Light Localization with Robust Sequence Learning
LSTM-KAN: Revolutionizing Indoor Visible Light Localization with Robust Sequence Learning Open
Indoor navigation systems are gaining traction due to their resistance to electromagnetic interference, abundant spectrum resources, and energy efficiency, underscoring the importance of indoor visible light positioning technology. Recent …
View article: Dynamic Batch Processing with FlexiDecode Scheduler for Efficient LLM Inference in IIoT
Dynamic Batch Processing with FlexiDecode Scheduler for Efficient LLM Inference in IIoT Open
Large Language Models (LLMs) are expanding their applications across various fields, including Industrial Internet of Things (IIoT), where they analyze sensor data, automate diagnostics, and enhance predictive maintenance. LLM inference is…
View article: Construction of a deep - learning - based rehabilitation prediction model for lower-limb motor dysfunction after stroke using synchronous EEG-EMG and fMRI
Construction of a deep - learning - based rehabilitation prediction model for lower-limb motor dysfunction after stroke using synchronous EEG-EMG and fMRI Open
Objective Construct a predictive model for rehabilitation outcomes in ischemic stroke patients 3 months post-stroke using resting state functional magnetic resonance imaging (fMRI) images, as well as synchronized electroencephalography (EE…
View article: DEFENDCLI: {Command-Line} Driven Attack Provenance Examination
DEFENDCLI: {Command-Line} Driven Attack Provenance Examination Open
Endpoint Detection and Response (EDR) solutions embrace the method of attack provenance graph to discover unknown threats through system event correlation. However, this method still faces some unsolved problems in the fields of interopera…
View article: Reference-free Adversarial Sex Obfuscation in Speech
Reference-free Adversarial Sex Obfuscation in Speech Open
Sex conversion in speech involves privacy risks from data collection and often leaves residual sex-specific cues in outputs, even when target speaker references are unavailable. We introduce RASO for Reference-free Adversarial Sex Obfuscat…
View article: Subject Information Extraction for Novelty Detection with Domain Shifts
Subject Information Extraction for Novelty Detection with Domain Shifts Open
Unsupervised novelty detection (UND), aimed at identifying novel samples, is essential in fields like medical diagnosis, cybersecurity, and industrial quality control. Most existing UND methods assume that the training data and testing nor…
View article: Decentralized Federated Learning for Private Smart Healthcare: A Survey
Decentralized Federated Learning for Private Smart Healthcare: A Survey Open
This research explores the use of decentralized federated learning (DFL) in healthcare, focusing on overcoming the shortcomings of traditional centralized FL systems. DFL is proposed as a solution to enhance data privacy and improve system…
View article: Achieving superior thermoelectric transport in bismuth antimony telluride thin films via orientation and microstructure regulation
Achieving superior thermoelectric transport in bismuth antimony telluride thin films via orientation and microstructure regulation Open
The electron-phonon transport properties of bismuth telluride-based thermoelectric materials are significantly influenced by crystallographic orientation and microstructure engineering. Thin-film materials are proper candidates for the stu…
View article: Piezoelectric poly(3-hydroxybutyrate-co-3-hydroxyhexanoate) (PHBHHx) microspheres for collagen regeneration and skin rejuvenation
Piezoelectric poly(3-hydroxybutyrate-co-3-hydroxyhexanoate) (PHBHHx) microspheres for collagen regeneration and skin rejuvenation Open
Introduction Skin aging is an inevitable physiological process driven by factors like cellular senescence, ultraviolet radiation (UV) radiation, and environmental pollutants. A key feature is the accelerated collagen degradation in the der…
View article: Federated Transfer Learning for On-Device LLMs Efficient Fine Tuning Optimization
Federated Transfer Learning for On-Device LLMs Efficient Fine Tuning Optimization Open
The proliferation of Large Language Models (LLMs) has catalyzed the growth of various industries. It is therefore imperative to ensure the controlled and beneficial application of LLMs across specific domains for downstream tasks through t…
View article: Identification and Validation of Ferroptosis Related Genes in Ischemic Stroke and Its Effect on the Peripheral Immune Landscape
Identification and Validation of Ferroptosis Related Genes in Ischemic Stroke and Its Effect on the Peripheral Immune Landscape Open
This study successfully identified ferroptosis-related genes in ischemic stroke, offering insights that could contribute to the formulation of future comprehensive treatment approaches.
View article: From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways
From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways Open
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity, supporting more connected devices and seamless experiences within an intelligent digital ecosystem where artificial inte…
View article: A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Open
Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge; however, such emerging edge storage comes with numerous challenging and unique security issues. One of them is the problem of edge data integrity…
View article: Decentralized Privacy Preservation for Critical Connections in Graphs
Decentralized Privacy Preservation for Critical Connections in Graphs Open
Many real-world interconnections among entities can be characterized as graphs. Collecting local graph information with balanced privacy and data utility has garnered notable interest recently. This paper delves into the problem of identif…
View article: Privacy at a Price: Exploring its Dual Impact on AI Fairness
Privacy at a Price: Exploring its Dual Impact on AI Fairness Open
The worldwide adoption of machine learning (ML) and deep learning models, particularly in critical sectors, such as healthcare and finance, presents substantial challenges in maintaining individual privacy and fairness. These two elements …
View article: Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey Open
Due to the greatly improved capabilities of devices, massive data, and increasing concern about data privacy, Federated Learning (FL) has been increasingly considered for applications to wireless communication networks (WCNs). Wireless FL …
View article: Joint Analysis of Crash Frequency by Severity Based on a Random Parameters Approach
Joint Analysis of Crash Frequency by Severity Based on a Random Parameters Approach Open
Unobserved heterogeneity is a major challenge in estimating reliable road safety models. The random parameters approach has been proven to be an effective way to account for unobserved heterogeneity but has rarely been used for crash frequ…
View article: Asynchronous federated learning on heterogeneous devices: A survey
Asynchronous federated learning on heterogeneous devices: A survey Open
Federated learning (FL) is a kind of distributed machine learning framework, where the global model is generated on the centralized aggregation server based on the parameters of local models, addressing concerns about privacy leakage cause…
View article: Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence Open
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks (SHNs). To enhance the precision of diagnosis, different participants in SHNs share health data t…
View article: Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective
Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective Open
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of smart healthcare networks (SHNs). To enhance the precision of diagnosis, different participants in SHNs share health data t…
View article: Learn to Unlearn: A Survey on Machine Unlearning
Learn to Unlearn: A Survey on Machine Unlearning Open
Machine Learning (ML) models have been shown to potentially leak sensitive information, thus raising privacy concerns in ML-driven applications. This inspired recent research on removing the influence of specific data samples from a traine…
View article: Time-Enabled and Verifiable Secure Search for Blockchain-Empowered Electronic Health Record Sharing in IoT
Time-Enabled and Verifiable Secure Search for Blockchain-Empowered Electronic Health Record Sharing in IoT Open
The collection and sharing of electronic health records (EHRs) via the Internet of Things (IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to guarantee the secure search of EHR during the sharing process. The…