Peng Liu - IEEE Xplore Author Profile

Showing 1-25 of 148 results

Results

Membership inference (MI) attacks pose a significant threat to user privacy in machine learning. While numerous attacks have been proposed, the lack of standardized evaluation parameters and metrics has led to inconsistent and even conflicting comparison results. To address this issue and facilitate a systematic analysis of these disparate findings, we introduce MIBench, a comprehensive benchmark ...Show More
Log anomaly detection aims to discover abnormal events from massive log data to ensure the security and reliability of software systems. However, due to the heterogeneity of log formats and syntaxes across different systems, existing log anomaly detection methods often need to be designed and trained for specific systems, lacking generalization ability. To address this challenge, we propose LogDLR...Show More
The two-scale model (TSM) has been widely used to calculate scattering from surfaces with multiple roughness scales. In our study, we derived an improved TSM based on the angular composite model (ACM), which expresses the calculation of the scattering coefficient as an integral over the surface angles, making it possible to accelerate the process by combining with Monte Carlo integration. In addit...Show More
For advanced autonomous driving (AD) systems, localization is highly critical for safety. Recent results show that GPS is vulnerable to spoofing attacks, and it is not clear whether the current localization is secure enough against advanced GPS spoofing attacks. In this paper, a systematic study regarding the security of the localization under GPS spoofing is explored for safe and reliable AD. Fir...Show More
The “sharing” feature provided by smart home platforms enables multiple users to access the device simultaneously with different roles and permissions, but it also presents new security challenges for the design and implementation of the permission management. The key issue is that the platform adopts two different permission assignments on the app side and the cloud side, and these two assignment...Show More
This study addresses the challenge of accurately forecasting the energy consumption of electric vehicles (EVs), which is crucial for reducing range anxiety and advancing strategies for charging and energy optimization. Despite the limitations of current forecasting methods, including empirical, physics-based, and data-driven models, this article presents a novel machine learning (ML)-based predict...Show More
This paper proposes an innovative vector control method for single-phase differential Buck inverters, advancing beyond the limitations of traditional control strategies. Unlike previous methods that require a T/4 delay for additional control freedom, the proposed vector control exploits the dual symmetrical DC-DC converter topology, inherently providing the necessary two degrees of freedom. This e...Show More
In modern military operations, as camouflage technology advances, soldiers, weaponry, and other military materials have become highly similar to their surroundings, making it difficult for traditional optical target recognition techniques to effectively identify camouflaged targets. Polarization imaging technology captures the polarization characteristics of light reflected from object surfaces, e...Show More
Aiming at the polarized light transmission characteristics under complex sea fog environment, the sea fog is divided into two layers of salt fog layer and water fog layer. Firstly, the simulation model of the corresponding layer is established based on Monte Carlo and T-matrix method, and the scattering characteristics of the particles between the two layers are linked by the multiple addition cum...Show More
Speckle noise, a common artifact inherent in synthetic aperture radar (SAR) imagery, significantly degrades image quality. This deterioration in quality impedes critical tasks, such as segmentation, object recognition, and other related applications. This article introduces an innovative iterative trilateral filtering approach for SAR imagery enhancement, which is distinct in its use of Haar wavel...Show More
Ship detection in synthetic aperture radar (SAR) images is crucial for various applications in both civilian and military domains. In recent years, there has been substantial progress in SAR ship detection, largely driven by advancements in deep learning-based methods. However, some issues still exist that need to be addressed. First, most current ship detection methods are anchor-based. These met...Show More
In recent years, driver distraction behaviors, such as eating, drinking, and making phone calls, have become more and more frequent, especially during continuous driving. This results in a significant increase in traffic accidents caused by those behaviors. Therefore, it is crucial to recommend driver breaks when frequent instances of driver distraction are detected. Despite numerous single modal-...Show More
The widespread adoption of electric vehicles (EVs) with fast-charging capability has presented significant challenges to the safe operation of power distribution networks. Issues such as node overvoltage and frequency fluctuations should be addressed to ensure power quality while maximizing charging quality-of-service (QoS) for EV users. This challenge is particularly crucial for fast-charging eve...Show More
Hundreds of electric vehicle (EV) battery thermal runaway accidents resulting from untreated defects restrict further development of EV industry. Battery defect detection based on the abnormality of external parameters is a promising way to reduce this kind of thermal runaway accidents and protect EV consumers from fire danger. However, the influence of temperature and EV states, i.e., charging an...Show More
The safety evaluation of battery systems is crucial to prevent thermal runaway (TR) in electric vehicles (EVs) and ensure their safe and efficient operation. This article proposed a data-driven approach that utilizes real-world operational data to evaluate the safety risk of EV battery systems. Five key parameters related to voltage and temperature were selected from the lifecycle data of normal a...Show More
Accurately predicting the battery’s aging trajectory is required to ensure the safe and reliable operation of electric vehicles (EVs) and is also the fundamental technique toward residual value assessment. As a critical enabler for mainstreaming EVs, fast charging has presented formidable challenges to health prognosis technology. This study systematically compares the performance of features extr...Show More
Recently, total variation based image deconvolution has shown its superior performance. The restoration quality is generally sensitive to the value of regularization parameter. In this work, we develop a data-driven optimization scheme based on minimization of Stein's unbiased risk estimate (SURE)—statistically equivalent to mean squared error (MSE). Based on a typical alternating direction method...Show More
The Proportional Navigation Guidance (PNG) law is not suitable for maneuvering targets interception as the accuracy will sharply degrade., in this paper, a modified augmented proportional navigation (MAPN) guidance law is proposed which adds an target maneuvering acceleration compensation to overcome the effect of the degradation of guidance accuracy. Aiming at modeling and filtering errors introd...Show More
Many crowd abnormal motion detection methods in video surveillance have been proposed in resent years. However, most of them are based on low semantic features, such gray value, velocity and gradient. Usually, low semantic features contain weak discriminative information of the scene. In addition, these methods often ignore important information in time and space dimension. In this work, a high se...Show More
We demonstrated a high speed atmospheric laser communication system based on a two channels dense wavelength division multiplexing, and 10Gb/s non return to zero sequence and 10GHz sine wave are modulated on the channels respectively. The channel spacing is 100GHz and the experimental distance is over 1km. The experimental results show that this dense wavelength division multiplexing system can re...Show More
The underground coal mine is dangerous environment with gas1. In long term operation, the insulation resistance of cable decreases, and then leads to leakage. This can result in a threat to human and production safety. The leakage fault signal is weak, and the protection methods have no selectivity. The improvement of the protection method for additional DC source is proposed in this paper. The le...Show More
Graphene oxide, a kind of nano-fillers with desirable thermal and electrical properties, could be added to epoxy resin and achieve satisfactory dispersion status due to its hydrophilicity, which lend great help to the preparation of samples. Graphene oxide could be mixed with water since its functional groups, O-H is in harmony with water's functional groups. Furthermore, epoxy resin, flexibilizer...Show More
In order to study the effect of the glass transition temperature (Tg) on space charge behavior of epoxy resin under polarity reversal voltage, the epoxy resin samples with low Tg were casted in vacuum condition. The dielectric spectra of the samples were measured over the frequency range of 10-1 to 106 Hz at different temperatures. At different temperatures the negative poling field of -30 kV/mm w...Show More
In this work, two electro-optic (EO) modulation schemes based on the Pockels effect - the quasi-linear and nonlinear EO modulation are compared and analyzed. Then, we find that the modulation efficiencies with these two schemes are at the same level relation of Vπ and L, but the quasi-linear scheme has to face the critic limitation in the realistic EO modulation implementation process. Thereby, wi...Show More
In this work, a strategic deep trenching with theoretical optimization is adopted to reach a successful reflective effect of WTC structure. The experimental results are within the reasonable range. We select the SOS refractive index difference of 0.75%, waveguide core size of 5.5 μm × 5.5 μm. We know, only the trench bottom is at the same depth as the waveguide core, the side-wall can reflect the ...Show More