Ling Wang

ORCID: 0000-0002-4846-5160
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Image Fusion Techniques
  • Image and Signal Denoising Methods
  • Chaos-based Image/Signal Encryption
  • Opportunistic and Delay-Tolerant Networks
  • Quantum Computing Algorithms and Architecture
  • Mobile Ad Hoc Networks
  • Advanced Neural Network Applications
  • Quantum Information and Cryptography
  • Vehicular Ad Hoc Networks (VANETs)
  • Anomaly Detection Techniques and Applications
  • Advanced Image Processing Techniques
  • Advanced Steganography and Watermarking Techniques
  • Wireless Networks and Protocols
  • Optical measurement and interference techniques
  • Human Pose and Action Recognition
  • Medical Image Segmentation Techniques
  • Neural Networks and Applications
  • Gait Recognition and Analysis
  • Adversarial Robustness in Machine Learning
  • CCD and CMOS Imaging Sensors
  • Image Retrieval and Classification Techniques
  • Photoacoustic and Ultrasonic Imaging
  • Seismic Imaging and Inversion Techniques
  • Industrial Vision Systems and Defect Detection
  • Image Processing and 3D Reconstruction

Tsinghua University
2024

Changchun University of Science and Technology
2023-2024

State Key Laboratory on Integrated Optoelectronics
2024

Anhui University
2019-2024

Huaiyin Institute of Technology
2024

Nanjing University of Information Science and Technology
2022

Harbin Institute of Technology
2005-2021

Yanshan University
2021

Shanghai University
2011-2019

Dalian University
2016

10.1007/s11042-019-08514-z article EN Multimedia Tools and Applications 2019-12-17

10.1007/s11128-024-04327-8 article EN Quantum Information Processing 2024-03-25

YOLOv7 is one of the most effective algorithms for one‐stage detectors. However, when it applied to pedestrian detection tasks in industrial scene, still challenging complex environments and multi‐scale changes pedestrians. This paper proposes a new detector scene based on improved YOLOv7‐tiny named as GP‐YOLO. First, neck replaced by RepGFPN structure, make full use features enhance accuracy objects with large‐scale changes. Second, g n conv branch added feature fusion module, high‐order...

10.1002/tee.24075 article EN IEEJ Transactions on Electrical and Electronic Engineering 2024-04-23

In the paper, a cross chaotic map using Logistic and Chebyshev is presented. With exceptionally desirable properties of non-periodical motion non-convergence chaos, scheme for image encryption has suggested new efficient way to deal with intractable problem fast highly secure image. order realize encryption, every pixel randomly changed according matrix in process grayscale substitution; simultaneously scrambling transformation technique (row rotation column technique) used position...

10.1109/cisp.2008.129 article EN Congress on Image and Signal Processing 2008-01-01

Recent advances in human action recognition are focusing on fine-grained categories large video collections. With this current trend, one of the major issues is how to handle these collections effectively and also efficiently. In paper, we introduce a novel method based mid-level components directed acyclic graphs (DAGs). DAGs, taken from different videos, efficiently processed order extract collection spatio-temporal sub-patterns, increasing complexities, referred as daglets. The latter...

10.1109/icip.2014.7025310 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2014-10-01

Since the concept of cryptographic accumulators was first proposed in 1993, it has received continuous attention from researchers. The application accumulator is also more extensive. This paper makes a systematic summary accumulator. Firstly, descriptions and characteristics are given, one-way accumulator, collision-free dynamic universal introduced, respectively. Cryptographic can be divided into two types: symmetric asymmetric In three different schemes were classified based on security...

10.1155/2022/5429195 article EN cc-by Security and Communication Networks 2022-03-07

Abstract Many important problems in engineering and science are well‐modeled by Poisson noise, the noise of medical X‐ray images is noise. In this paper, we propose a method for removal degraded using improved preprocessing an BayesShrink (IBS) wavelet domain. First, preprocess image. Second, apply Daubechies (db) transform to acquire scaling coefficients. Third, proposed IBS process Finally, compute inverse threshold Experimental results show that always outperforms traditional methods. ©...

10.1002/eej.20486 article EN Electrical Engineering in Japan 2008-02-12

Asymmetric spectroscopic prism of a Michelson white-light interference- microscope objective introduces additional dispersion. The tilt reference mirror influences the dispersion and measurement accuracy interference-based 3D reconstruction system. In this paper, we first numerically analyzed performances Michelson-type interference-microscope by measuring step structure at different angles mirror. It showed that height errors were within range ±15nm when 0°, 0.13°, 0.26°, 0.39° 0.52 ° ,...

10.1117/12.3013137 article EN 2024-04-30

When the signal is embedded in an additive Gaussian noise, its estimation often done by finding a wavelet basis that concentrates energy over few coefficients and thresholding noisy coefficients. However, many practical problems such as medical X-ray image, astronomical low-light recorded data are not modeled noise but realization of Possion process. In this paper, we propose new approach to remove Poisson from image domain. This method improves conventional BayesShrink based on...

10.1109/icit.2005.1600606 article EN 2006-03-10

The performance of a dual-hop mixed radio frequency (RF)/free space optical (FSO) system with co-channel interferences (CCIs) is studied for both fixed-gain and variable-gain amplify-and-forward(AF) relaying scenarios. RF link interference undergo the <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$\kappa$</tex-math></inline-formula> - notation="LaTeX">$\mu$</tex-math></inline-formula> shadowed fading FSO...

10.1109/jphot.2023.3238205 article EN cc-by IEEE photonics journal 2023-02-01

An ad hoc network is a multi-hop wireless network. Its limited bandwidth and frequently changing topology require that its protocol should be robust, simple, energy conserving. We have proposed PoolODMRP to reduce control overhead greatly by one-hop local route maintenance. However, still has some shortcomings. In this paper, we propose PDAODMRP (passive data acknowledgement ODMRP) extend PoolODMRP. Compared with PoolODMRP, the following contributions: (1) It knows status of downstream...

10.1109/jcn.2004.6596837 article EN Journal of Communications and Networks 2004-12-01

In encryption technology, image scrambling is a common processing operation. This paper proposes quantum version of the 3D Mobius transform based on QRCI model, which changes not only position pixels but also gray values. The corresponding circuits are devised. Furthermore, an scheme combining with hyper-chaotic Henon map suggested to protect security information. To facilitate subsequent processing, RGB color first represented QRCI. Then, achieve pixel-level permutation effect, applied...

10.3390/e25121629 article EN cc-by Entropy 2023-12-06

Many important problems in engineering and science are well-modeled by Poisson noise, the noise of medical X-ray image is noise. In this paper, we propose a method removal for degraded using improved preprocessing BayesShrink (IBS) wavelet domain. Firstly, pre-process image, Secondly, apply Daubechies (db) transform to acquire scaling coefficients. Thirdly, proposed IBS process Finally, compute inverse thresholded coefficeints. Experimental results show that always outperforms traditional methods.

10.1541/ieejeiss.126.237 article EN IEEJ Transactions on Electronics Information and Systems 2006-01-01
Coming Soon ...