Tianhan Gao
YOU?
Author Swipe
View article: Correction: Javeed et al. A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors 2021, 21, 4884
Correction: Javeed et al. A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors 2021, 21, 4884 Open
Affiliation Correction [...]
View article: A Survey of the State of the Art in Monocular 3D Human Pose Estimation: Methods, Benchmarks, and Challenges
A Survey of the State of the Art in Monocular 3D Human Pose Estimation: Methods, Benchmarks, and Challenges Open
Three-dimensional human pose estimation (3D HPE) from monocular RGB cameras is a fundamental yet challenging task in computer vision, forming the basis of a wide range of applications such as action recognition, metaverse, self-driving, an…
View article: EBFA-6D: End-to-End Transparent Object 6D Pose Estimation Based on a Boundary Feature Augmented Mechanism
EBFA-6D: End-to-End Transparent Object 6D Pose Estimation Based on a Boundary Feature Augmented Mechanism Open
Transparent objects, commonly encountered in everyday environments, present significant challenges for 6D pose estimation due to their unique optical properties. The lack of inherent texture and color complicates traditional vision methods…
View article: A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System
A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System Open
The Internet of Things-enabled Smart Healthcare System (IoT-SHS) is a networked infrastructure of intelligent wearables, software applications, health systems, and services that continuously monitors and transmits patient-sensitive data us…
View article: An Intrusion Detection System for Edge-Envisioned Smart Agriculture in Extreme Environment
An Intrusion Detection System for Edge-Envisioned Smart Agriculture in Extreme Environment Open
The deployment of Internet of Things (IoT) systems in Smart Agriculture (SA) operates in extreme environments including wind, snowfall, flooding, landscape, and so on for collecting and processing real-time data. The increased connectivity…
View article: An Explainable and Resilient Intrusion Detection System for Industry 5.0
An Explainable and Resilient Intrusion Detection System for Industry 5.0 Open
Industry 5.0 is a futuristic transformative model that aims to develop a hyperconnected, automated, and data-driven industrial ecosystem. This digital transformation will boost productivity and efficiency throughout the production process …
View article: Mental Pressure Recognition Method Based on CNN Model and EEG Signal under Cross Session
Mental Pressure Recognition Method Based on CNN Model and EEG Signal under Cross Session Open
There is an important application value in assessing an operator’s mental pressure (MP) level in human–computer cooperative tasks through continuous asymmetric electroencephalogram (EEG) signals, which can help predict hidden risks. Due to…
View article: DDRCN: Deep Deterministic Policy Gradient Recommendation Framework Fused with Deep Cross Networks
DDRCN: Deep Deterministic Policy Gradient Recommendation Framework Fused with Deep Cross Networks Open
As an essential branch of artificial intelligence, recommendation systems have gradually penetrated people’s daily lives. It is the active recommendation of goods or services of potential interest to users based on their preferences. Many …
View article: Legal Judgment Prediction via Heterogeneous Graphs and Knowledge of Law Articles
Legal Judgment Prediction via Heterogeneous Graphs and Knowledge of Law Articles Open
Legal judgment prediction (LJP) is a crucial task in legal intelligence to predict charges, law articles and terms of penalties based on case fact description texts. Although existing methods perform well, they still have many shortcomings…
View article: A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries
A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries Open
With the new advancements in Internet of Things (IoT) and its applications in different sectors, such as the industrial sector, by connecting billions of devices and instruments, IoT has evolved as a new paradigm known as the Industrial In…
View article: Brain Activity Recognition Method Based on Attention-Based RNN Mode
Brain Activity Recognition Method Based on Attention-Based RNN Mode Open
Brain activity recognition based on electroencephalography (EEG) marks a major research orientation in intelligent medicine, especially in human intention prediction, human–computer control and neurological diagnosis. The literature resear…
View article: A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)
A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT) Open
The Internet of Things (IoT) has emerged as a new technological world connecting billions of devices. Despite providing several benefits, the heterogeneous nature and the extensive connectivity of the devices make it a target of different …
View article: SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT
SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT Open
The Internet of Things (IoT) has proven to be a billion-dollar industry. Despite offering numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for the development of cyber-attacks. The diversity of the I…
View article: Real-Time Face Mask Detection Method Based on YOLOv3
Real-Time Face Mask Detection Method Based on YOLOv3 Open
The rapid outbreak of COVID-19 has caused serious harm and infected tens of millions of people worldwide. Since there is no specific treatment, wearing masks has become an effective method to prevent the transmission of COVID-19 and is req…
View article: Image Denoise Methods Based on Deep Learning
Image Denoise Methods Based on Deep Learning Open
Image denoising is widely used in image, video, nuclear magnetic imaging and so on. In the application scene, camera jitter, the rapid motion of objects, dark light environment and so on may cause the captured photos to be unclean, so the …
View article: PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs
PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs Open
Due to the advantages of low handover latency and signaling costs, Proxy Mobile IPv6 (PMIPv6), as a localized mobility management protocol for next generation mobile network, can be well combined with vehicular ad-hoc networks. However, th…
View article: Anonymous Communication Scheme for Wireless Mesh Network Based on Network Coding
Anonymous Communication Scheme for Wireless Mesh Network Based on Network Coding Open
Wireless Mesh Network, holding the features of self-organization, strong scalability, low deploymentcost, is considered to be the most competitive technology for broadband wireless access service.However, the security and privacy issues be…