Jian Wang

ORCID: 0000-0001-6043-6971
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Chinese history and philosophy
  • UAV Applications and Optimization
  • Vehicular Ad Hoc Networks (VANETs)
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Anomaly Detection Techniques and Applications
  • Domain Adaptation and Few-Shot Learning
  • Cryptography and Data Security
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Signal Modulation Classification
  • Speech and Audio Processing
  • Higher Education and Teaching Methods
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Data Management and Algorithms
  • Privacy, Security, and Data Protection
  • Distributed Control Multi-Agent Systems
  • Speech Recognition and Synthesis
  • Advanced Malware Detection Techniques
  • Cloud Computing and Resource Management
  • Cloud Data Security Solutions
  • Smart Agriculture and AI
  • Advanced Decision-Making Techniques

University of Tennessee at Martin
2022-2025

Qingdao University of Science and Technology
2011-2025

Chongqing University of Science and Technology
2025

State Grid Corporation of China (China)
2025

Beijing Jiaotong University
2009-2024

Lanzhou University of Technology
2020-2024

Dalian University of Technology
2017-2024

China Southern Power Grid (China)
2023-2024

Beijing Transportation Research Center
2021-2024

Beijing University of Technology
2023-2024

Transfer learning (TL) has been successfully applied to many real-world problems that traditional machine (ML) cannot handle, such as image processing, speech recognition, and natural language processing (NLP). Commonly, TL tends address three main of learning: (1) insufficient labeled data, (2) incompatible computation power, (3) distribution mismatch. In general, can be organized into four categories: transductive learning, inductive unsupervised negative learning. Furthermore, each...

10.1109/tai.2021.3054609 article EN publisher-specific-oa IEEE Transactions on Artificial Intelligence 2020-10-01

Unmanned aircraft systems (UAS), or unmanned aerial vehicles (UAVs), often referred to as drones, have been experiencing healthy growth in the United States and around world. The positive uses of UAS potential save lives, increase safety efficiency, enable more effective science engineering research. However, are subject threats stemming from increasing reliance on computer communication technologies, which place public safety, national security, individual privacy at risk. To promote safe,...

10.1109/maes.2020.3015537 article EN IEEE Aerospace and Electronic Systems Magazine 2021-03-01

The Internet of Things (IoT) is becoming an indispensable part everyday life, enabling a variety emerging services and applications. However, the presence rogue IoT devices has exposed to untold risks with severe consequences. first step in securing detecting identifying legitimate ones. Conventional approaches use cryptographic mechanisms authenticate verify devices' identities. protocols are not available many systems. Meanwhile, these methods less effective when can be exploited or...

10.1109/jiot.2021.3099028 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-07-21

The advancement of the micro-electro-mechanical sensory industry and open source autopilot stacks, have dramatically reduced cost difficulty making highly maneuverable UAVs. Such ease in flying drones has caused concerns about privacy, public safety, security. One major threats is inadequate control small over sensitive areas. In this research, we address problem through a dual approach: detection eviction. We propose distributed system to identify appearance approximate position unwelcome...

10.1109/mcom.2018.1700423 article EN IEEE Communications Magazine 2018-04-01

Medical image processing is one of the most important topics in Internet Things (IoMT). Recently, deep learning methods have carried out state-of-the-art performances on medical imaging tasks. In this paper, we propose a novel transfer framework for classification. Moreover, apply our method COVID-19 diagnosis with lung Computed Tomography (CT) images. However, well-labeled training data sets cannot be easily accessed due to disease's novelty and privacy policies. The proposed has two...

10.1109/jbhi.2021.3051470 article EN publisher-specific-oa IEEE Journal of Biomedical and Health Informatics 2021-01-15

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature IoT make it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens existing radio communications then mimic legitimate devices conduct malicious activities. Existing solutions employ cryptographic signatures verify trustworthiness received information. In prevalent IoT, secret keys for cryptography can...

10.1109/jiot.2020.3018677 article EN IEEE Internet of Things Journal 2020-08-21

10.1016/j.comcom.2020.11.008 article EN publisher-specific-oa Computer Communications 2020-11-18

Bitcoin combines a peer-to-peer network and cryptographic algorithm to implement distributed digital currency system, which keeps all transaction history on public blockchain. Since transactions recorded the blockchain are everyone, users face threat of leaking financial privacy. Many analysis deanonymization approaches have been proposed link records real identities. To eliminate this threat, we present an unlinkable coin mixing scheme that allows mix their bitcoins without trusting third...

10.1109/access.2018.2827163 article EN cc-by-nc-nd IEEE Access 2018-01-01

Wireless communication involving unmanned aerial vehicles (UAVs) is expected to play an important role in future wireless networks. However, different from conventional terrestrial systems, UAVs typically have rather limited onboard energy on one hand, and require additional flying consumption the other hand. This renders energy-efficient UAV with smart expenditure of paramount importance. In this paper, via extensive flight experiments, we aim firstly validate recently derived theoretical...

10.23919/jcc.2021.07.020 article EN China Communications 2021-07-01

Deep learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application DL IoT is device identification from wireless signals, namely, noncryptographic (NDI). However, components NDI systems have to evolve adapt operational variations, such a paradigm termed as incremental (IL). Various IL algorithms proposed and many them require dedicated space store increasing amount historical data, therefore, they are not suitable for or mobile applications. Besides,...

10.1109/jiot.2021.3078407 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-05-08

Autonomous ultrasound (US) acquisition is an important yet challenging task, as it involves interpretation of the highly complex and variable images their spatial relationships. In this work, we propose a deep reinforcement learning framework to autonomously control 6-D pose virtual US probe based on real-time image feedback navigate towards standard scan planes under restrictions in real-world scans. Furthermore, confidence-based approach encode optimization quality process. We validate our...

10.1109/icra48506.2021.9561295 preprint EN 2021-05-30

The sewage treatment system based on particle swarm optimization algorithm to improve energy efficiency is analyzed. Firstly, this paper takes and activated sludge method as the research object, with help of experimental analysis method, has achieved good results. From results system, it plays an important role in realizing effective improving economic social benefits treatment. Then, can play system. Therefore, actively promoting application Finally, optimal control solution improved...

10.1016/j.egyr.2022.06.053 article EN cc-by-nc-nd Energy Reports 2022-07-06

Privacy preserving becomes an important issue in the development progress of data mining techniques. has become increasingly popular because it allows sharing privacy-sensitive for analysis purposes. So people have unwilling to share their data, frequently resulting individuals either refusing or providing incorrect data. In turn, such problems collection can affect success mining, which relies on sufficient amounts accurate order produce meaningful results. recent years, wide availability...

10.1109/dbta.2009.147 article EN 2009-04-01

Benefited from cloud storage services, users can save their cost of buying expensive and application servers, as well deploying maintaining applications. Meanwhile they lost the physical control data. So effective methods are needed to verify correctness data stored at which research issues Provable Data Possession (PDP) faced. The most important features in PDP are: 1) supporting for public, unlimited numbers times verification; 2) dynamic update; 3) efficiency space computing. In mobile...

10.4304/jnw.6.7.1033-1040 article EN Journal of Networks 2011-07-01

10.1016/j.compeleceng.2012.05.001 article EN Computers & Electrical Engineering 2012-06-27

To protect sensitive information in mined data, researchers need a way to organize variety of ongoing work. The Rampart framework categorizes protection approaches and encourages interdisciplinary solutions the growing privacy problems associated with knowledge discovery from data.

10.1109/mc.2016.43 article EN Computer 2016-02-01

The inland aquaculture environment is an artificial ecosystem, where the water quality a key factor which closely related to economic benefits of and aquatic products. Compared with marine aquaculture, normally smaller susceptible pollution, poor self-purification capacity. Considering its low cost large-scale monitoring ability, many researches have developed spectrum sensor on-board satellite platforms allow remote surface. However, there remain problems, such as image resolution, flexible...

10.3390/rs12030402 article EN cc-by Remote Sensing 2020-01-26

The ubiquitous deployment of 5G New Radio (5G NR) accelerates the evolution in many fields. With enhancement NR, unmanned aerial vehicle (UAV) swarm networking can gain more flexibility, reliability, and elasticity to assist residents or workers finish missions high complexity risks remotely. beamforming NR improve accuracy flexibility connections between mobile devices. a throughput guaranteed UAV networking, remote deliver specific instructions with requirement. Further, reliable volume...

10.1109/jmass.2021.3067861 article EN publisher-specific-oa IEEE Journal on Miniaturization for Air and Space Systems 2021-03-22

The semantic segmentation of high-resolution remote sensing images (HRRSIs) is a basic task for image processing and has wide range applications. However, the abundant texture information imaging HRRSIs lead to complex distribution ground objects unclear boundaries, which bring huge challenges HRRSIs. To solve this problem, in paper we propose an improved squeeze excitation residual network (SERNet), integrates several modules (SERMs) refine attention module (RAM). SERM can recalibrate...

10.3390/rs14194770 article EN cc-by Remote Sensing 2022-09-23

Freezing the pre-trained backbone has become a standard paradigm to avoid overfitting in few-shot segmentation. In this paper, we rethink and explore new regime: {\em fine-tuning small part of parameters backbone}. We present solution overcome problem, leading better model generalization on learning novel classes. Our method decomposes into three successive matrices via Singular Value Decomposition (SVD), then only fine-tunes singular values} keeps others frozen. The above design allows...

10.48550/arxiv.2206.06122 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Generative models based on Variational Autoencoders (VAEs) represent an important area of research in Controllable Text Generation (CTG). However, existing approaches often do not fully exploit the potential latent variables, leading to limitations both diversity and thematic consistency generated text. To overcome these challenges, this paper introduces a new framework Hierarchical Latent Modulation (HLM). The incorporates hierarchical space modulation module for generation embedding...

10.3390/math13050713 article EN cc-by Mathematics 2025-02-22
Coming Soon ...