Alert button
Picture for Hao Dai

Hao Dai

Alert button

CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series

Add code
Bookmark button
Alert button
Apr 01, 2024
Tien-Yu Chang, Hao Dai, Vincent S. Tseng

Viaarxiv icon

Open Set Dandelion Network for IoT Intrusion Detection

Add code
Bookmark button
Alert button
Nov 19, 2023
Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang

Figure 1 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 2 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 3 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 4 for Open Set Dandelion Network for IoT Intrusion Detection
Viaarxiv icon

Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection

Add code
Bookmark button
Alert button
Mar 25, 2023
Jiashu Wu, Yang Wang, Hao Dai, Chengzhong Xu, Kenneth B. Kent

Figure 1 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 2 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 3 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 4 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Viaarxiv icon

Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach

Add code
Bookmark button
Alert button
Jan 24, 2023
Jiashu Wu, Hao Dai, Yang Wang, Kejiang Ye, Chengzhong Xu

Figure 1 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 2 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 3 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 4 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Viaarxiv icon

Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach

Add code
Bookmark button
Alert button
Nov 10, 2022
Jiashu Wu, Hao Dai, Yang Wang, Zhiying Tu

Figure 1 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 2 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 3 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 4 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Viaarxiv icon

Joint Semantic Transfer Network for IoT Intrusion Detection

Add code
Bookmark button
Alert button
Oct 28, 2022
Jiashu Wu, Yang Wang, Binhui Xie, Shuang Li, Hao Dai, Kejiang Ye, Chengzhong Xu

Figure 1 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 2 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 3 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 4 for Joint Semantic Transfer Network for IoT Intrusion Detection
Viaarxiv icon

PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation

Add code
Bookmark button
Alert button
Aug 09, 2022
Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu

Figure 1 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 2 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 3 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 4 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Viaarxiv icon