
Yudao Sun- Doctor of Engineering
- PostDoc Position at Peng Cheng Laboratory
Yudao Sun
- Doctor of Engineering
- PostDoc Position at Peng Cheng Laboratory
AI security
About
10
Publications
1,114
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
66
Citations
Introduction
Current institution
Additional affiliations
February 2022 - February 2023
Publications
Publications (10)
In the industry domain, maintenance tasks and resources need to be allocated to industrial systems to avoid unplanned downtime. We explore the dynamic condition-based maintenance strategy for systems comprising multiple components, in which each component undergoes external shocks along with time and is maintained individually. For each component,...
Neural network language models (LMs) are confronted with significant challenges in generalization and robustness. Currently, many studies focus on improving either generalization or robustness in isolation, without methods addressing both aspects simultaneously, which presents a significant challenge in developing LMs that are both robust and gener...
Residual Network (ResNet) is a distinguished network structure in deep learning, and its layers can be profound. We theoretically explore the mathematics characteristics of the ResNet, in particular, to pay attention to the gradient information, which is a powerful and straightforward mathematical tool for analysing the properties of ResNet, such a...
Popular topics in the field of countermeasures include feature engineering and neural-network-based models, which involve neural network architectures and loss criteria. This study focuses on Res2Net and its variant models to examine the impact of model generalization on countermeasure performance in the ASVspoof 2019 logical access and physical ac...
Reliability analysis for k-out-of-n systems has received much attention in the field of reliability due to its practical importance. In this work, models for linear and circular k-out-of-n: F systems with shared components, consisting of m subsystems, are discussed. The finite Markov chain imbedding approach can not be used directly to derive relia...
The security demands in humanization should be considered as important, because artificial intelligence is developing rapidly in this area. Recent studies have shown the vulnerability of many deep learning models to adversarial examples; however, only a few studies on facial expression adversarial examples have been conducted. Thus, in this paper,...
Artificial intelligence is developing rapidly in the direction of intellectualization and humanization. Recent studies have shown the vulnerability of many deep learning models to adversarial examples, but there are fewer studies on adversarial examples attacking facial expression recognition systems. Human–computer interaction requires facial expr...