Yu Luo
YOU?
Author Swipe
View article: Detecting Code Vulnerabilities with Heterogeneous GNN Training
Detecting Code Vulnerabilities with Heterogeneous GNN Training Open
Detecting vulnerabilities in source code is a critical task for software security assurance. Graph Neural Network (GNN) machine learning can be a promising approach by modeling source code as graphs. Early approaches treated code elements …
View article: HALURust: Exploiting Hallucinations of Large Language Models to Detect Vulnerabilities in Rust
HALURust: Exploiting Hallucinations of Large Language Models to Detect Vulnerabilities in Rust Open
As an emerging programming language, Rust has rapidly gained popularity and recognition among developers due to its strong emphasis on safety. It employs a unique ownership system and safe concurrency practices to ensure robust safety. Des…
View article: Detecting Code Vulnerabilities with Heterogeneous GNN Training
Detecting Code Vulnerabilities with Heterogeneous GNN Training Open
Detecting vulnerabilities in source code is a critical task for software security assurance. Graph Neural Network (GNN) machine learning can be a promising approach by modeling source code as graphs. Early approaches treated code elements …
View article: Cross brain reshaping in congenital visual or hearing impairment: triple-network dysfunction
Cross brain reshaping in congenital visual or hearing impairment: triple-network dysfunction Open
This research examines how congenital visual or hearing impairment reshapes brain function using EEG. The study involved 40 children with congenital visual impairment, 40 with hearing impairment and 42 age and gender-matched normal childre…
View article: Application of Remote Sensing and Explainable Artificial Intelligence (XAI) for Wildfire Occurrence Mapping in the Mountainous Region of Southwest China
Application of Remote Sensing and Explainable Artificial Intelligence (XAI) for Wildfire Occurrence Mapping in the Mountainous Region of Southwest China Open
The ecosystems in the mountainous region of Southwest China are exceptionally fragile and constitute one of the global hotspots for wildfire occurrences. Understanding the complex interactions between wildfires and their environmental and …
View article: Adaptive Mixed-Scale Feature Fusion Network for Blind AI-Generated Image Quality Assessment
Adaptive Mixed-Scale Feature Fusion Network for Blind AI-Generated Image Quality Assessment Open
With the increasing maturity of the text-to-image and image-to-image generative models, AI-generated images (AGIs) have shown great application potential in advertisement, entertainment, education, social media, etc. Although remarkable ad…
View article: Enabling near-real-time safety glove detection through edge computing and transfer learning: comparative analysis of edge and cloud computing-based methods
Enabling near-real-time safety glove detection through edge computing and transfer learning: comparative analysis of edge and cloud computing-based methods Open
Purpose Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety…
View article: Generation and applications of synthetic computed tomography images for neurosurgical planning
Generation and applications of synthetic computed tomography images for neurosurgical planning Open
OBJECTIVE CT and MRI are synergistic in the information provided for neurosurgical planning. While obtaining both types of images lends unique data from each, doing so adds to cost and exposes patients to additional ionizing radiation afte…
View article: Site Engineering of Covalent Organic Frameworks for Regulating Peroxymonosulfate Activation to Generate Singlet Oxygen with 100 % Selectivity
Site Engineering of Covalent Organic Frameworks for Regulating Peroxymonosulfate Activation to Generate Singlet Oxygen with 100 % Selectivity Open
Singlet oxygen ( 1 O 2 ) is an excellent reactive oxygen species (ROSs) for the selective conversion of organic matter, especially in advanced oxidation processes (AOPs). However, due to the huge dilemma in synthesizing single‐site type ca…
View article: Unrolling a rain-guided detail recovery network for singleimage deraining
Unrolling a rain-guided detail recovery network for singleimage deraining Open
Owing to the rapid development of deep networks, single image deraining tasks have achieved significant progress. Various architectures have been designed to recursively or directly remove rain, and most rain streaks can be removed by exis…
View article: iTRAQ-based proteomic analysis of imiquimod in the treatment of ulcerative colitis.
iTRAQ-based proteomic analysis of imiquimod in the treatment of ulcerative colitis. Open
IMQ might ameliorate colitis by suppressing the complement and coagulation cascades pathway, which might serve as new therapeutic strategies for the treatment of patients with UC.
View article: Spatiotemporal Adaptive Fusion Graph Network for Short-Term Traffic Flow Forecasting
Spatiotemporal Adaptive Fusion Graph Network for Short-Term Traffic Flow Forecasting Open
Traffic flow forecasting is challenging for us to analyze intricate spatial–temporal dependencies and obtain incomplete information of spatial–temporal connection. Existing frameworks mostly construct spatial and temporal modeling based on…
View article: Automatic Modulation Recognition Method Based on Hybrid Model of Convolutional Neural Networks and Gated Recurrent Units
Automatic Modulation Recognition Method Based on Hybrid Model of Convolutional Neural Networks and Gated Recurrent Units Open
With the application of various wireless communication technologies, the electromagnetic environment has become more complex, and the recognition of signal modulation has become increasingly difficult.In this paper, a hybrid model based on…
View article: Spatio-Temporal Federated Learning for Massive Wireless Edge Networks
Spatio-Temporal Federated Learning for Massive Wireless Edge Networks Open
This paper presents a novel approach to conduct highly efficient federated learning (FL) over a massive wireless edge network, where an edge server and numerous mobile devices (clients) jointly learn a global model without transporting the…
View article: Fe(III)-Activated Sulfite Revisited: The Overlooked Role of High-Valent Iron(IV)-Oxo Complex (Fe(IV)) in Water Treatment
Fe(III)-Activated Sulfite Revisited: The Overlooked Role of High-Valent Iron(IV)-Oxo Complex (Fe(IV)) in Water Treatment Open
Sulfate radical (SO 4 •− ) and its secondary radical (hydroxyl radical, • OH) are commonly recognized as the primary reactive intermediates formed by Fe(III)/sulfite system. However, it still remains unknown whether Fe(IV) is involved in t…
View article: Quantitative phase imaging in digital holographic microscopy based on image inpainting using a two-stage generative adversarial network
Quantitative phase imaging in digital holographic microscopy based on image inpainting using a two-stage generative adversarial network Open
Based on the hologram inpainting via a two-stage Generative Adversarial Network (GAN), we present a precise phase aberration compensation method in digital holographic microscopy (DHM). In the proposed methodology, the interference fringes…
View article: An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit
An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit Open
With the development of computer and network technologies, the original security of industrial control systems (ICSs) has been compromised, and security issues have become increasingly prominent. Effective intrusion detection methods for I…
View article: A new two‐stage method for single image rain removal
A new two‐stage method for single image rain removal Open
Compared with video de‐raining, single image de‐raining is more technically difficult due to the lack of temporally redundant information. This paper proposes a new two‐stage method for single image de‐raining. In the first stage, the auth…
View article: Time to positive culture can differentiate post‐neurosurgical coagulase‐negative<i>Staphylococci</i>other than<i>S epidermidis</i>meningitis from contamination: A case‐control observational study
Time to positive culture can differentiate post‐neurosurgical coagulase‐negative<i>Staphylococci</i>other than<i>S epidermidis</i>meningitis from contamination: A case‐control observational study Open
Objective To explore the characteristics of coagulase‐negative Staphylococci other than Staphylococci epidermidis (Nse‐CoNS) meningitis and to apply cerebrospinal fluid (CSF) times to positivity culture (TTPC) for the precise differentiati…
View article: Statistical learning enables implicit subadditive predictions
Statistical learning enables implicit subadditive predictions Open
The visual system readily detects statistical relationships where multiple cues jointly predict a specific outcome (e.g., two co-authors publishing a paper, or two co-founders starting a company). What is less known is how the visual syste…
View article: Pilot evaluation of Collection API with PID Kernel Information
Pilot evaluation of Collection API with PID Kernel Information Open
As digital data become increasingly available for research, there is a growing awareness of the value of domain agnostic Persistent Identifiers (PIDs) for data. A PID is a globally unique reference to a digital object, which in our case is…
View article: Automatic prospective and retrospective activation of object representations during statistical learning
Automatic prospective and retrospective activation of object representations during statistical learning Open
Although the visual system detects statistical relationships between objects with remarkable efficiency, it is unclear how statistical learning occurs. Here we examine how object representations are activated during statistical learning. I…
View article: DTER: Schedule Optimal RF Energy Request and Harvest for Internet of Things
DTER: Schedule Optimal RF Energy Request and Harvest for Internet of Things Open
We propose a new energy harvesting strategy that uses a dedicated energy source (ES) to optimally replenish energy for radio frequency (RF) energy harvesting powered Internet of Things. Specifically, we develop a two-step dual tunnel energ…