Yuansong Qiao

Yuansong Qiao
Technological University of the Shannon: Midlands Midwest · Software Research Institute

PhD

About

179
Publications
77,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,054
Citations
Introduction
Yuansong Qiao currently works at the Software Research Institute, Athlone Institute of Technology. Yuansong does research in Computer Networks, Edge Computing, Blockchain System, Smart Manufacturing.

Publications

Publications (179)
Article
Full-text available
Deep neural networks are susceptible to various backdoor attacks, such as training time attacks, where the attacker can inject a trigger pattern into a small portion of the dataset to control the model’s predictions at runtime. Backdoor attacks are dangerous because they do not degrade the model’s performance. This paper explores the feasibility of...
Article
Full-text available
A digital twin (DT) is a virtual/digital model of any physical object (physical twin), interconnected through data exchange. In the context of Industry 4.0, DTs are integral to intelligent automation driving innovation at scale by providing significant improvements in precision, flexibility, and real-time responsiveness. A critical challenge in dev...
Article
Full-text available
This research study represents a polydexterous deep reinforcement learning-based pick-and-place framework for industrial clutter scenarios. In the proposed framework, the agent tends to learn the pick-and-place of regularly and irregularly shaped objects in clutter by using the sequential combination of prehensile and non-prehensile robotic manipul...
Article
Full-text available
In video streaming, bandwidth constraints significantly affect client-side video quality. Addressing this, deep neural networks offer a promising avenue for implementing video super-resolution (VSR) at the user end, leveraging advancements in modern hardware, including mobile devices. The principal challenge in VSR is the computational intensity in...
Poster
Full-text available
This poster harnesses the Trusted Execution Environment (TEE) to build a trustworthy ROS 2 platform with remote attestation. The proposed solution not only verifies the identity but also ensures the integrity of ROS 2 nodes before they provide/consume data and/or collaborate with each other. Our design establishes trust between communication partie...
Article
Full-text available
Uncertainty quantification of cybersecurity anomaly detection results provides critical guidance for decisionmakers on whether or not to accept the results. Improving the trustworthiness of anomaly predictions canreduce the amount of alert false positives that security teams have to process. In this work we investigatethe use of Bayesian Autoencode...
Article
This article presents the results of an empirical study that aimed to investigate the influence of various types of audio (spatial and non-spatial) on the user quality of experience (QoE) of and visual attention in 360° videos. The study compared the head pose, eye gaze, pupil dilations, heart rate and subjective responses of 73 users who watched t...
Conference Paper
Video Super Resolution (VSR) model based on deep convolutional neural network (CNN) uses multiple Low-Resolution (LR) frames as input and has a strong ability to recover High-Resolution (HR) frames and maintain video temporal information. However, to realize the above advantages, VSR must consider both spatial and temporal information to improve th...
Article
Full-text available
Recent breakthroughs in hierarchical multi-agent deep reinforcement learning (HMADRL) are propelling the development of sophisticated multi-robot systems, particularly in the realm of complex coordination tasks. These advancements hold significant potential for addressing the intricate challenges inherent in fast-evolving sectors such as intelligen...
Article
Full-text available
The probabilistic Bayesian neural network(BNN) is good at providing trustworthy outcomes that is important, e.g. in intrusion detection. Due to the complex of probabilistic BNN, it is looks like a ’black box’. The explanation of its prediction is needed for improving its transparency. However, there is no explanatory method to explain the predictio...
Article
Full-text available
Large Language Models (LLMs) empowered agents are effective across various tasks and demonstrate outstanding performance, which can be further enhanced through collaboration with multiple LLM agents. The current approaches for collaboration with multiple LLM agents are static approaches, which adopt a fixed set of agents to interact with each other...
Article
Full-text available
Closed-circuit television (CCTV) systems have become pivotal tools in modern urban surveillance and traffic management, contributing significantly to road safety and security. This paper introduces an effective solution that capitalizes on CCTV video analytics and an event-driven framework to provide real-time updates on road traffic events, enhanc...
Conference Paper
The surge in surveillance camera deployment in the era of Big Data and the Internet of Things (IoT) has emphasized the paramount importance of safeguarding the privacy of individuals, objects, and locations they record. Therefore, this paper proposes VidSearch — a secure system designed for storing, searching, and retrieving videos captured by CCTV...
Article
Full-text available
The Ripple network is one typical blockchain‐based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing...
Article
Full-text available
The escalating consumption of superior quality streaming videos among digital users has intensified the exploration of Video Super-Resolution (VSR) methodologies. Implementing VSR on the user end enhances video resolution without the need for additional bandwidth or capitalising on localised or edge computing resources. In the contemporary digital...
Article
Full-text available
Exactly-once data processing/delivery can be guaranteed in traditional big data processing systems, e.g. Apache Flink. Checkpoint is commonly used as the solution. Each operator in these systems can restart from the last successfully saved state whenever a failure happens. It is not necessary to restore the logical job graph onto the same device(s)...
Article
Marine microplastics (MPs) contamination has become an enormous hazard to aquatic creatures and human life. For MP identification, many Machine learning (ML) based approaches have been proposed using Attenuated Total Reflection Fourier Transform Infrared Spectroscopy (ATR-FTIR). One major challenge for training MP identification models now is the i...
Article
Full-text available
The purpose of smart surveillance systems for automatic detection of road traffic accidents is to quickly respond to minimize human and financial losses in smart cities. However, along with the self-evident benefits of surveillance applications, privacy protection remains crucial under any circumstances. Hence, to ensure the privacy of sensitive da...
Article
Full-text available
In this study, we develop a framework for an intelligent and self-supervised industrial pick-and-place operation for cluttered environments. Our target is to have the agent learn to perform prehensile and non-prehensile robotic manipulations to improve the efficiency and throughput of the pick-and-place task. To achieve this target, we specify the...
Conference Paper
Workflow is a well-known and widely used technology in business management. Traditional workflow solutions are designed for humans and generally use a graphical representation of workflow elements that reflect the involvement of human factors. Additionally, in a situation where workflow execution is not possible, human intervention is necessary. Th...
Article
Full-text available
Deep learning techniques have been widely adopted for cyber defence applications such as malware detection and anomaly detection. The ever-changing nature of cyber threats has made cyber defence a constantly evolving field. Smart manufacturing is critical to the broader thrust towards Industry 4.0 and 5.0. Developing advanced technologies in smart...
Conference Paper
Full-text available
On the journey of true autonomous robotics, applying deep reinforcement learning (DRL) techniques to solve complex robotics tasks has been a growing interest in academics and the industry. Currently, numerous simulation frameworks exist for evaluating DRL algorithms with robots, and they usually come with prebuilt tasks or provide tools to create c...
Preprint
Full-text available
Immersive technologies are rapidly gaining traction across a variety of application domains. 360° video is one such technology, which can be captured with an omnidirectional multi-camera arrangement. With a Virtual Reality (VR) Head Mounted Display (HMD), users have the freedom to look in any direction they wish within the scene. While there is a p...
Article
Full-text available
One of the most promising technologies that is driving digitalization in several industries is Digital Twin (DT). DT refers to the digital replica or model of any physical object (physical twin). What differentiates DT from simulation and other digital or CAD models is the automatic bidirectional exchange of data between digital and physical twins...
Article
Microplastics (MPs) (size< 5 mm) marine pollution have been investigated and monitored by many researchers and found in many coasts around the world. These toxic chemicals make their way into human diet through food chain when aquatic organisms ingest MPs. Attenuated Total Reflection Fourier transform infrared spectroscopy (ATR-FTIR) is a very effe...
Article
The world is heading in the wrong direction on carbon emissions where we are not on track to limit global warming to 1.5 °C; Ireland is among the countries where overall emissions have continued to rise. The development of wettable peatland products and services (termed ‘Paludiculture’) present significant opportunities for enabling a transition aw...
Article
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high demand. One available measure is the application of anomaly detection, which is defined as the discovery of irregular or unusual ac...
Conference Paper
The declaration of COVID-19 as pandemic affected almost all public and private functionaries by enforcing them to operate remotely, and the judiciary is no exception. The trend seems to continue for the foreseeable future. The judicial proceedings where a piece of evidence, particularly the digital one, holds undisputed importance. Its preservation...
Conference Paper
Full-text available
With video surveillance through Closed Circuit Television (CCTV) cameras becoming increasingly ubiquitous, maintaining the integrity of such videos assumes significance to guarantee compliance with privacy protection laws. Recently adopted European General Data Protection Regulation (EU-GDPR) suggests encryption as a reversible safeguard for all ty...
Conference Paper
Full-text available
In the context of Industry 4.0 and digital factory, digital twin technology is emerging as a key enabling technology to simulate, optimize, maintain, and predict processes and production systems. Digital Twin (DT) refers to the virtual copy or model of any physical entity (physical twin), both interconnected via real-time data exchange. Conceptuall...
Article
Full-text available
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Conference Paper
Full-text available
Deep learning algorithms outperform the machine learning techniques in various fields and are widely deployed for recognition and classification tasks. However, recent research focuses on exploring these deep learning models’ weaknesses as these can be vulnerable due to outsourced training data and transfer learning. This paper proposed a rudimenta...
Article
Content replication and name-based routing lead to a natural multi-source and multipath transmission paradigm in NDN. Due to the unique connectionless characteristic of NDN, current end-to-end multipath congestion control schemes (e.g. MPTCP) cannot be used directly on NDN. This paper proposes a Network Utility Maximization (NUM) model to formulate...
Article
Full-text available
Digital Twin (DT) refers to the virtual copy or model of any physical entity (physical twin) both of which are interconnected via exchange of data in real time. Conceptually, a DT mimics the state of its physical twin in real time and vice versa. Application of DT includes real-time monitoring, designing/planning, optimization, maintenance, remote...
Article
Full-text available
Pollution attacks are one of the major concerns facing P2P networks. They have a tremendous impact on push-based fully connected overlays, in which each peer receives an exclusive chunk from the source and is also the only one responsible for relaying it to the rest of the peers. In this study, we propose a novel technique to identify and expel mal...
Article
Full-text available
This paper provides a fundamental research review of Reconfigurable Manufacturing Systems (RMS), which uniquely explores the state-of-the-art in distributed and decentralized machine control and machine intelligence. The aim of this review is to draw objective answers to two proposed research questions, relating to: (1) reconfigurable design and in...
Article
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Article
Full-text available
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Article
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Preprint
Full-text available
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Preprint
Full-text available
With the continuous emergence of new mobile devices which support new communication paradigms such as D2D and V2V, Internet users can take advantage of these devices to achieve better Internet connectivity and improve service quality. Meanwhile, packet forwarding brings extra costs to devices (e.g. electricity consumption), that hinders the realisa...
Article
Full-text available
This conceptual paper overviews how blockchain technology is involving the operation of multi-robot collaboration for combating COVID-19 and future pandemics. Robots are a promising technology for providing many tasks such as spraying, disinfection, cleaning, treating, detecting high body temperature/mask absence, and delivering goods and medical s...
Conference Paper
Full-text available
Real world virtual world communication and interaction will be a cornerstone of future intelligent manufacturing ecosystems. Human robotic interaction is considered to be the basic element of factories of the future. Despite the advancement of different technologies such as wearables and Augmented Reality (AR), human-robot interaction (HRI) is stil...
Article
Full-text available
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy protected, sometimes along with the locations of the surveillance and other sensitive information. Wi...
Preprint
Full-text available
Serving as a potential future Internet architecture, Named Data Network (NDN) offers superior information-centric architectural support for mobile ad-hoc networking. Using NDN as an underlying protocol, end-user devices (e.g. IoT device and smart phone) formulate a multi-hop (mesh) network, in which certain devices play a role of forwarding packets...
Conference Paper
Full-text available
Human-Robot Interaction (HRI) will be a crucial component of smart factories of the future (FoF). This demo presents a reliable and cost-effective HRI system based on Augmented Reality (AR). In this demonstration, we offer concepts and methods currently being developed to enable high-level human-robot collaboration and interaction. The user interac...
Conference Paper
Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly , surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design can be helpful in terms of making a captured video immutable, as such...
Article
Full-text available
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. Similarly, video sharing from closed-circuit television video recording or in...
Chapter
Full-text available
Rapid growth in the amount of data produced by IoT sensors and devices has led to the advent of edge computing wherein the data is processed at a point at or near to its origin. This facilitates lower latency, as well as data security and privacy by keeping the data localized to the edge node. However, due to the issues of resource-constrained hard...