Huijiao Wang

ORCID: 0000-0001-8174-608X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Rough Sets and Fuzzy Logic
  • Security in Wireless Sensor Networks
  • Face and Expression Recognition
  • Wireless Signal Modulation Classification
  • Imbalanced Data Classification Techniques
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Face recognition and analysis
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Integrated Circuits and Semiconductor Failure Analysis
  • Data Mining Algorithms and Applications
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing

Guilin University of Electronic Technology
2021-2023

Source location privacy, one of the core contents Wireless Sensor Network (WSN) security, has a significant impact on extensive application WSNs. In this paper, novel privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) is proposed by using multibranch and fake sources. This three phases. first place, data source are randomly sent to certain intermediate node. Then, minimum hop (MHR) from node base station formed. branch paths with sources generated dynamically some...

10.1155/2021/6654427 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Currently, deep learning has provided an important means to solve problems in various fields. Intelligent computing will bring a new solution the security analysis of lightweight block cipher as its becomes more and intelligent automatic. In this study, novel multiple differential distinguishers round-reduced SIMECK32/64 based on are proposed. Two kinds SIMECK32/64’s 6–11 rounds designed by using neural network simulate case input differences output cryptanalysis. The general models two...

10.1155/2022/7564678 article EN cc-by Security and Communication Networks 2022-09-14

The vulnerability of deep neural networks to adversarial perturbations has been demonstrated in a large body research. Compared image-dependent perturbations, universal perturbations(UAPs) is more challenging for indiscriminately attacking the model inputs. However, there are few studies on generating data-free targeted UAPs and attack success rate latest method remains unsatisfactory. Not only that, fewer have implemented their approach Transformers its efficacy uncertain. Therefore, novel...

10.1109/access.2023.3335094 article EN cc-by-nc-nd IEEE Access 2023-01-01

High-utility itemset mining is to mine high profit itemsets from transaction databases. But if there are some with negative utility values in the database, high-utility may be pruned incorrectly and subset of low-utility itemsets. In this paper, an improved algorithm items (IHUMN) proposed. A novel utility-list buffer structure unit profits proposed efficiently store retrieve utility-list, reduce memory consumption during process. Moreover, Transitive Extension Negative formula constructed...

10.1145/3579654.3579766 article EN 2022-12-23
Coming Soon ...