Xiaomei Liu

ORCID: 0000-0002-4918-4993
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • Robotic Path Planning Algorithms
  • Network Security and Intrusion Detection
  • Adaptive Control of Nonlinear Systems
  • Neural Networks and Applications
  • Caching and Content Delivery
  • Higher Education and Teaching Methods
  • Advanced Steganography and Watermarking Techniques
  • Biometric Identification and Security
  • Network Traffic and Congestion Control
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Digital Media Forensic Detection
  • Advanced Decision-Making Techniques
  • Advanced Numerical Methods in Computational Mathematics
  • Neural Networks Stability and Synchronization
  • Numerical methods for differential equations
  • Quantum Computing Algorithms and Architecture
  • Chaos-based Image/Signal Encryption
  • AI and Big Data Applications
  • Quantum Information and Cryptography
  • Face recognition and analysis
  • Advanced Computational Techniques and Applications

Jiujiang University
2022-2024

Shandong Normal University
2022-2023

Weifang University of Science and Technology
2023

Kunming Children's Hospital
2022

Shanghai University
2022

University of International Relations
2020-2022

Nanjing University of Aeronautics and Astronautics
2022

Shanghai Polytechnic University
2016-2021

Beijing Information Science & Technology University
2020

Hefei National Center for Physical Sciences at Nanoscale
2015-2019

The fundamental principle of artificial intelligence is the ability machines to learn from previous experience and do future work accordingly. In age big data, classical learning often require huge computational resources in many practical cases. Quantum machine algorithms, on other hand, could be exponentially faster than their counterparts by utilizing quantum parallelism. Here, we demonstrate a algorithm implement handwriting recognition four-qubit NMR test bench. learns standard...

10.1103/physrevlett.114.140504 article EN Physical Review Letters 2015-04-08

Peer-to-peer (P2P) computing has emerged as a popular model aiming at further utilizing Internet information and resources, complementing the available client-server services. However, mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause serious mismatching between P2P overlay network network. The problem brings great stress in infrastructure greatly limits performance gain from various search or routing techniques....

10.1109/infcom.2004.1354645 article EN 2005-02-22

Iris is claimed to be one of the best biometrics. We have collected a large data set iris images, intentionally sampling range quality broader than that used by current commercial recognition systems. re-implemented Daugman-like algorithm developed Masek. also and implemented an improved segmentation eyelid detection stage algorithm, experimentally verified improvement in performance using dataset. Compared Masek's original approach, our leads increase over 6% rank-one rate.

10.1109/autoid.2005.21 article EN 2006-10-11

Peer-to-peer (P2P) computing has emerged as a popular model aiming at further utilizing Internet information and resources. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause serious mismatch between P2P overlay network network. The problem brings great stress in infrastructure. It greatly limits performance gain from various search or routing techniques. Meanwhile, due to inefficient topology, flooding-based...

10.1109/tpds.2005.21 article EN IEEE Transactions on Parallel and Distributed Systems 2005-01-04

This paper describes the Iris Challenge Evaluation (ICE) 2005. The ICE 2005 contains a dataset of 2953 iris images from 132 subjects. data is organized into two experiments: right and left eye. recognition performance presented for twelve algorithms nine groups that participated in For top performers, verification rate on above 0.995 at false accept 0.001. iris, corresponding rates are between 0.990 results challenge problem were first to observe correlations irises match non-match scores,...

10.1109/btas.2008.4699333 article EN 2008-01-01

In this paper, formation tracking control based on potential field is studied. The objective to a group of agents track desired trajectory while maintaining given in nonomniscient constrained space. Aiming at purpose, the average all agents' positions viewed as virtual leader, and task translated into that controlling leader center formation. situation where may not have global environmental information will lead they avoid collisions with unexpected spatial constraints. By introducing...

10.1109/tcst.2015.2472959 article EN IEEE Transactions on Control Systems Technology 2015-09-11

In this paper, the formation tracking control is studied for a multiagent system (MAS) with communication limitations. The objective to group of agents track desired trajectory while maintaining given in nonomniscient constrained space. role switching triggered by detection unexpected spatial constraints facilitates efficiency event-triggered bandwidth, energy consumption, and processor usage. A coordination mechanism proposed based on novel "coordinator" indirectly spread environmental...

10.1109/tcyb.2018.2794139 article EN IEEE Transactions on Cybernetics 2018-01-30

This paper investigates the event-triggered-based adaptive bipartite finite-time tracking control problem of nonlinear nonstrict-feedback coopetition multi-agent systems (MASs) with time-varying disturbances. First, major design difficulties generated by entirely unknown functions containing all states are solved utilizing approximation property radial basis function neural networks (RBF NNs) and structural feature Gaussian functions. Then in backstepping procedure, issue "explosion...

10.1109/tase.2023.3297253 article EN IEEE Transactions on Automation Science and Engineering 2023-07-31

In this brief, a vision-based tracking scheme is studied for the leader-follower formation control of multiagent system under visibility constraints without communication among agents. A kinect sole sensor installed on each agent to estimate pose, including relative orientations and positions local leader. dipolar vector field established generate maintain desired given displacement The are converted into input constrains pose leader, an auxiliary designed analyze effect constraints....

10.1109/tcst.2018.2790966 article EN IEEE Transactions on Control Systems Technology 2018-01-25

Traditional sports information processing methods often rely on manual observation and recording. This method is not only inefficient, but also susceptible to subjective bias, which affects the accuracy reliability of data. In this paper, a physiological condition monitoring system based multimedia computer constructed, deeply integrates technology, technology biomedical sensing technology. Through integration advanced processors variety biosensors, can collect, process analyze data...

10.62617/mcb994 article EN Molecular & cellular biomechanics 2025-02-13

In this paper, a novel Formation Potential Field method is proposed for the multi-agent formation control. The objective to control group of agents automatically generate and maintain specific while avoiding internal collisions with spatial constraints. A designed combining multiple local attractive potential fields repulsive fields. To further relax requirements agents' initial positions enhance robustness, global field added outside influence range Field. optimality scheme in time analysed...

10.1080/00207179.2016.1237044 article EN International Journal of Control 2016-09-20

It is difficult to calculate the energy levels and eigenstates of a large physical system on classical computer because exponentially growing size Hilbert space. In this work, we experimentally demonstrate quantum algorithm which could solve problem via simulated resonant transitions. Using four-qubit simulator in two qubits are used as ancillas for control measurement, obtain spectrum 2-qubit low-energy effective Hamiltonian water molecule. The transitions allow state transform access...

10.1103/physrevlett.122.090504 article EN Physical Review Letters 2019-03-08

Overlay networks provide base infrastructures for many areas including multimedia streaming and content distributions. Since most overlay are highly decentralized self-organized, cut vertices may exist in such systems due to the lack of centralized management. A vertex is defined as a network node whose removal increases number components. Failure these nodes can break an into large disconnected components greatly downgrade upper layer services like media streaming. We propose here...

10.1145/1378191.1378213 article EN 2006-05-26

In this paper, we present a novel approach for tracking control with switching formation in nonomniscient constrained space multiagent system (MAS). The introduction of results from the situation where MAS is maneuvering restricted path which often case real world application. preplanned trajectory may be inaccurate due to lack sufficient environmental information. case, agents have rapidly avoid collisions unexpected obstacles or even switch guarantee passability. A concept avoidless...

10.1109/tsmc.2017.2732679 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2017-08-15

Iris is an important biometric method with high reported accuracy. However, current iris recognition systems require substantial user cooperation in the image acquisition. Relatively little known about how might perform less stringent control of quality. We have re-implemented a Daugman-like matchingmethod, and evaluated its performance on dataset over 12,000 images from 300 persons, different qualities. find overall rank-one rate using 89.64%. Poor quality account for most instances...

10.1109/cvpr.2005.576 article EN 2006-01-05

Multihoming technology can be traced back to the 1980s or even earlier, but it seldom drew much attention from research community. Recently, with explosive deployment of multihoming on Internet, researchers have started investigate issues that were raised by networks. This article draws an overall picture technology, presents current networks, and discusses must studied in future

10.1109/mnet.2007.364256 article EN IEEE Network 2007-05-01

Analysis of mouse-interaction behaviors for identifying individual computer users has experienced growing interest from information security and biometric researchers. This paper presents a simple efficient user verification system by modeling behavior, which is accurate competent future deployment. For each mouse-operation sample, holistic attributes mouse trajectories are first analyzed using power transformation method, to derive schematic representation behavior eigenspace. Then,...

10.1109/thms.2016.2558623 article EN publisher-specific-oa IEEE Transactions on Human-Machine Systems 2016-05-24

Due to the randomness and time dependence of factors affecting software reliability, most reliability models are treated as stochastic processes, non-homogeneous Poisson process (NHPP) is used one. However, failure behavior does not follow NHPP in a statistically rigorous manner, pure random method might be enough describe behavior. To solve these problems, this paper proposes new integrated approach that combines grey system theory software. A model put forward discrete form, grey-based for...

10.23919/jsee.2022.000038 article EN Journal of Systems Engineering and Electronics 2022-04-01

Use cases are widely used to describe requirements be validated by users and builders drive the software development process. However, use only define functional requirements, leaving out global properties that affect whole or part of system. Furthermore, crosscutting nature some is not handled. This approach based on we map non-functional into function architectures through scenario template. It improves modularity in which make it possible begin tackling problem tangling, scattering...

10.1109/iccea.2010.174 article EN 2010-01-01

In previous implementations of adiabatic quantum algorithms using spin systems, the average Hamiltonian method with Trotter's formula was conventionally adopted to generate an effective instantaneous that simulates passage. However, this approach had issues precision and adiabaticity evolution. order address these, we here propose experimentally demonstrate a novel scheme for computation by intrinsic realistic system represent problem while adiabatically driving extrinsic directly induced...

10.48550/arxiv.1706.08061 preprint EN other-oa arXiv (Cornell University) 2017-01-01

A cut vertex is defined as a network node whose removal increases the number of components. Failure disconnects component and downgrades performance. Overlay networks are resilient to failure random nodes, but vertices that have been observed in real-world overlay traces make very vulnerable well-constructed targeted attacks. Traditional methods detecting centralized difficult, if not impossible, be applied large-scale highly dynamic networks. We aim provide practical solution by proposing...

10.1109/tc.2011.139 article EN IEEE Transactions on Computers 2011-08-03

Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous multicasting and such not available yet. Since fundamental differences between multicast unicast, the solutions proposed for in unicast communications cannot be directly applied to In this paper, we define system, propose mutual (MAM) protocol including design construction optimization an tree. MAM is self...

10.5555/1898953.1898982 article EN International Parallel and Distributed Processing Symposium 2006-04-25
Coming Soon ...