Yujie Shen

ORCID: 0000-0002-2384-253X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Surveillance and Tracking Methods
  • Advanced Vision and Imaging
  • Quantum Computing Algorithms and Architecture
  • Advanced Fiber Optic Sensors
  • Optical Wireless Communication Technologies
  • Quantum Information and Cryptography
  • Face recognition and analysis
  • Quantum Mechanics and Applications
  • Face and Expression Recognition
  • Optical measurement and interference techniques
  • PAPR reduction in OFDM
  • Anomaly Detection Techniques and Applications
  • Digital Imaging for Blood Diseases
  • Vehicular Ad Hoc Networks (VANETs)
  • Quantum-Dot Cellular Automata
  • Wireless Body Area Networks
  • Machine Learning and ELM
  • Image Processing Techniques and Applications
  • Chaos-based Image/Signal Encryption
  • Cryptography and Residue Arithmetic
  • Cryptography and Data Security
  • Advanced Power Amplifier Design
  • Metaheuristic Optimization Algorithms Research
  • Coal Combustion and Slurry Processing
  • Semiconductor Lasers and Optical Devices

Chang'an University
2023-2025

Xidian University
2023-2024

Chengdu University of Information Technology
2024

National Taiwan University of Science and Technology
2021

Tongji Zhejiang College
2021

Shanghai University
2011-2013

Peking University
2011-2012

Future mobile communication technology will be used to build an integrated global coverage network. Unmanned aerial vehicles (UAVs) are the first choice for low-altitude networks due their low cost, flexibility, and ease of operation. The characteristics UAVs also bring new challenges networks, such as short flight time, complex networking, unstable quality. Therefore, it has become urgent problem reasonably plan location UAV Base Stations (UAV-BSs), reduce power consumption, optimize...

10.3390/app15041971 article EN cc-by Applied Sciences 2025-02-13

Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is difficult to analyze. We propose a model characterize Gaussian source through introducing neutral party (Fred) who induces with general unitary transformation. Without knowing Fred's exact state, we derive bounds for both reverse direct reconciliations show that bound reconciliation tight.

10.1103/physreva.83.052304 article EN Physical Review A 2011-05-06

The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, Lloyd and L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against collective attack on condition of tomography quantum channels. We propose a family new CV-QKD prove their entangling cloner attacks without simulation result indicates that maintain same advantage as whose tolerable excess noise surpasses one-way protocol. also show all sub-protocols within have higher...

10.1142/s0219749912500591 article EN International Journal of Quantum Information 2012-08-01

In this paper, a new method of human detection based on depth map from 3D sensor Kinect is proposed. First, the pixel filtering and context are employed to roughly repair defects due information inaccuracy captured by Kinect. Second, dataset consisting maps with various indoor poses constructed as benchmark. Finally, introducing Kirsch mask three-value codes Local Binary Pattern, novel Ternary Direction Pattern (LTDP) feature descriptor extracted used for SVM classifier. The performance...

10.1109/cvprw.2013.85 article EN 2013-06-01

An improved face detection and recognition method based on information of skin color depth obtained by binocular vision system was proposed in this paper. With method, the area detected firstly using Adaboost algorithm. Afterwards, real distinguished from fake one data. Then, PCA algorithm, a specific can be recognized comparing principal components current to those known individuals facial database built advance. This applied service robot equipped with camera for real-time experiment,...

10.1109/cecnet.2011.5768500 article EN 2011-04-01

Depth map contains the space information of objects and is almost free from influence light, it attracts many research interests in field machine vision used for human detection. Therefore, hunting a suitable image feature detection on depth rather attractive. In this paper, we evaluate performance typical features map. A dataset containing various indoor scenes with constructed by using Microsoft's Kinect camera as quantitative benchmark study methods The smoothed pixel filtering context so...

10.1142/s1793962314500032 article EN Advances in Complex Systems 2013-12-23

3D reconstruction has been recognised as an important cue for tasks like active computer vision and image understanding. However, most existing techniques need to calibrate the intrinsic extrinsic parameters of projector, making calculation very complex. This paper presents method multicolour pseudo–random encoded projected recovering shape surface from one calibrated image, based on projection ray intersecting location. combines geometric photometric information in order reconstruct only...

10.1504/ijcat.2012.045837 article EN International Journal of Computer Applications in Technology 2012-01-01

A binocular vision system and its application to face detection tracking in robot is introduced this paper. With the system, can do detection, identification, recognition tracking. The area detected realtime by using AdaBoost algorithm. And a method proposed with which real be distinguished from picture one skin color information depth data. specific recognized comparing principal components of current those known individuals database built advance. Finally, track specified according...

10.1117/12.918122 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2011-10-19

Abstract With the continuous development of wireless network technology, heterogeneous networks with multiple fusions and overlapping coverage have been formed. In process vehicles passing through different types areas at high speed, there are frequent inefficient switching behaviors. Aiming this situation, a linkage selection strategy based on attractor profit prediction is proposed in vehicle network. By analyzing correlation between transmission rate position, location update was found to...

10.1088/1742-6596/2530/1/012010 article EN Journal of Physics Conference Series 2023-06-01

The post-distortion algorithm is necessary for visible light communication (VLC) systems, which aiming at reducing the nonlinear interference caused by LED transmitter. In this paper, BP neural network investigated to remove nonlinearity receiver, improved genetic (GA) aided particle swarm optimization (PSO) enhancing training process. As compared with conventional BP, GA-PSO-BP has been proved be faster convergence and high approximate accuracy. Computer simulations are carried out...

10.1109/ucom59132.2023.10257650 article EN 2023-07-07

Machine learning is a important part of the field artificial intelligence. Principal component analysis (PCA) classical linear dimensionality reduction algorithm in machine learning, which usually solved by gradient ascending method. As traditional method requires convexity objective function, it easy to be trapped into local maximum value. Therefore, order solve limitation being optimal solution, meaningful study performance optimization for principal analysis. In this paper, novel hybrid...

10.1109/iaeac50856.2021.9390901 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2021-03-12
Coming Soon ...