Hong Xiao

ORCID: 0000-0002-0823-0877
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Neural Networks and Applications
  • Quantum Information and Cryptography
  • Quantum-Dot Cellular Automata
  • Advanced Computational Techniques and Applications
  • Fault Detection and Control Systems
  • Industrial Vision Systems and Defect Detection
  • Topic Modeling
  • Data Management and Algorithms
  • Neural Networks and Reservoir Computing
  • IoT and Edge/Fog Computing
  • Advanced Database Systems and Queries
  • Digital Transformation in Industry
  • Image and Object Detection Techniques
  • Text and Document Classification Technologies
  • Security in Wireless Sensor Networks
  • Advanced Decision-Making Techniques
  • Sentiment Analysis and Opinion Mining
  • Terahertz technology and applications
  • Higher Education and Teaching Methods
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Education and Work Dynamics
  • Machine Fault Diagnosis Techniques
  • Blockchain Technology Applications and Security

University of Mississippi
2025

Guangdong University of Technology
2015-2024

Chongqing University of Posts and Telecommunications
2016-2024

Second Affiliated Hospital of Chongqing Medical University
2024

Dalian Medical University
2024

Chongqing Medical University
2024

Southwest Hospital
2024

Southern Medical University
2024

University of South China
2023

Northeast Petroleum University
2013-2023

Sentiment analysis on Chinese microblogs has received extensive attention recently. Most previous studies focus identifying sentiment orientation by encoding as many word properties possible while they fail to consider contextual features (e.g., the long-range dependencies of words), which are, however, essentially important in analysis. In this paper, we propose a method incorporating word2vec model and stacked bidirectional long short-term memory (Stacked Bi-LSTM) model. We first employ...

10.1109/access.2019.2905048 article EN cc-by-nc-nd IEEE Access 2019-01-01

Millimeter-wave and terahertz imaging systems have been used for security checks of human bodies, small postal packages, industrial nondestructive evaluation. The image resolution is one the key factors affecting accuracy contraband detection inner defect analysis. We propose a super-resolution reconstruction algorithm based on multi-scale channel attention (MS-CA) residual network to enhance images, which are acquired through homemade real-time system inspection. generalized block was...

10.1364/oe.554438 article EN cc-by Optics Express 2025-02-21

The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation activities. This paper proposes an analytical model investigate eavesdropping attacks in networks. Our framework considers impacts various channel conditions (such as signal frequency, spreading factor wind speed) different hydrophones (isotropic array hydrophones) terms network nodes eavesdroppers. We also conduct simulations evaluate effectiveness accuracy our...

10.3390/s16050721 article EN cc-by Sensors 2016-05-18

10.1007/s11128-018-1826-9 article EN Quantum Information Processing 2018-01-24

Abstract The problem of real-time detection welding defects is a difficult in resistance spot welding. It found that the dynamic has strong connection with growth nugget. signals are significantly different from those normal welding, and between show characteristics, same kind may also differ each other. most common practice today to realize resistive by extracting time-domain features signal waveforms. However, this approach highly subjective, so article proposes double-size mesh division...

10.1088/1361-6501/ad457b article EN cc-by-nc-nd Measurement Science and Technology 2024-04-30

Aiming at the problems of high manual cost, low efficiency, and precision mechanical axis health management in industrial robot applications, this paper proposes a assessment state prediction algorithm based on hidden Markov model (HMM) temporal convolutional networks (TCN). First, MPdist similarity comparison is used to construct index. Then trained with observable sensor data. After that, convolution neural network predict transition time iteratively, predicted results are decoded by HMM....

10.1002/int.22621 article EN International Journal of Intelligent Systems 2021-08-21

The blockchain technology becomes a key facilitator for Intelligent Manufacturing as it enables intelligent nodes to participate in global manufacturing networks with secure ledgers and smart contracts features. However, Traditional centralized storage cannot meet performance security requirements fully distributed consumes large amount of computing, network resources, which is inefficient difficult implement. In this paper, we propose clustering strategy on node community by constructing...

10.1109/blockchain.2019.00025 article EN 2019-07-01

Abstract Background Cancer threat is relevant to age, and the of a foreshortened life coupled with lengthy treatment process negatively affects middle‐aged older adults. Understanding coping throughout cancer experience in survivors will help develop supportive care promote their physiological psychological effects. Objectives To explore experiences adults aged 40–59 over 60. Design A descriptive phenomenological study was employed. Methods Face‐to‐face, in‐depth, semistructured interviews...

10.1111/hex.14048 article EN cc-by Health Expectations 2024-04-01

10.1007/s10773-017-3533-1 article EN International Journal of Theoretical Physics 2017-09-17

To create an intelligent surface region of interests (ROI) 3D quantitative inspection strategy a reality in the continuous casting (CC) production line, improved laser image scanning system (3D-LDS) was established based on binocular imaging and deep-learning techniques. In 3D-LDS, firstly, to meet requirements industrial application, CCD method optimized high-temperature experiments secondly, we proposed novel proposal ROI initial depth location for effectively suppressing redundant...

10.3390/s20040980 article EN cc-by Sensors 2020-02-12

In the past decades, due to low design cost and easy maintenance, text-based CAPTCHAs have been extensively used in constructing security mechanisms for user authentications. With recent advances machine/deep learning recognizing CAPTCHA images, growing attack methods are presented break CAPTCHAs. These machine learning/deep learning-based attacks often rely on training models massive volumes of data. The poorly constructed data also leads accuracy attacks. To investigate this issue, we...

10.1155/2021/9930608 article EN Security and Communication Networks 2021-06-15

10.1007/s10773-017-3561-x article EN International Journal of Theoretical Physics 2017-10-09

10.1007/s10773-018-3841-0 article EN International Journal of Theoretical Physics 2018-08-04

The optimal control of denitrification system in coal-fired power plants China has recently received widespread attention. accurate prediction efficiency and formulate strategy can guide the operation better. Meanwhile, it achieve effect energy conservation Nitrogen oxides (NOx) reduction. In this paper, we take a domestic 1000 MW unit as an example, consider each major factors that affect selective catalytic reduction (SCR). We put forward deep reinforcement learning (DRL) model by...

10.1109/access.2020.2985233 article EN cc-by IEEE Access 2020-01-01

To enhance the approximation and generalization ability of classical artificial neural network (ANN) by employing principles quantum computation, a quantum-inspired neuron based on controlled-rotation gate is proposed. In proposed model, discrete sequence input represented qubits, which, as control qubits after being rotated rotation gates, target qubit for rotation. The model output described probability amplitude state |1〉 in qubit. Then with (QNNSI) designed neurons to hidden layer layer....

10.1007/s10489-013-0447-3 article EN cc-by Applied Intelligence 2013-05-29

One of recent proposals on standardizing quality user experience (QoE) video streaming over mobile network is Mean Opinion Score (vMOS), which can model QoE in 5 discrete grades. However, there are few studies quantifying vMOS and investigating the relationship between other service (QoS) parameters. In this paper, we address concern by proposing a novel data analytical framework based data. particular, our consists K-means clustering logistic regression. This integrates benefits both these...

10.1186/s13638-018-1180-8 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2018-07-09

Open banking brings both the opportunities and challenges to banks all over world. Due different economic development levels of each country gaps among financial environment maturity, countries have strategies regulations towards privacy protection data in scenes, such as General Data Protection Regulation (GDPR) by European Union (EU). A blockchain a continuously growing list records managed peer-to-peer network is widely used various application scenarios, can protect data. However, still...

10.1109/i-span.2018.00021 article EN 2018-10-01

Because of the high putrescibility body, in general condition, only part or fragmentary bones can be found when victim body was discovered. Therefore, first step criminal investigation is to reconstruct facial features order find victim. wrinkle most remarkable and intuitionistic feature human skin, generation method for reconstructed face an important reconstruction. Three improvements based on Bando's classic algorithm are represented basis analyzing special need craniofacial...

10.1109/icig.2007.96 article EN 2007-08-01
Coming Soon ...