Fangzheng Liu

ORCID: 0000-0002-7421-8606
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Software Reliability and Analysis Research
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Wireless Signal Modulation Classification
  • Target Tracking and Data Fusion in Sensor Networks
  • Wireless Communication Security Techniques
  • IoT Networks and Protocols
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Caching and Content Delivery
  • Age of Information Optimization
  • Digital Media Forensic Detection
  • Advanced Wireless Communication Technologies
  • Radar Systems and Signal Processing
  • Multi-Criteria Decision Making
  • Direction-of-Arrival Estimation Techniques
  • Advanced Electrical Measurement Techniques
  • Wireless Body Area Networks
  • Green IT and Sustainability
  • Spam and Phishing Detection

National University of Defense Technology
2018-2024

Henan University of Technology
2021-2024

China University of Petroleum, Beijing
2021-2024

Human Media
2023

Shandong Academy of Sciences
2023

Qilu University of Technology
2023

Huazhong University of Science and Technology
2023

École de management de Normandie
2021

Université Le Havre Normandie
2021

Sichuan University
2016

With more computational intensive applications deployed involving mobile edge computing (MEC), the collaboration among devices, and cloud servers becomes an effective mechanism to fully utilize all available distributed resources. However, two main challenges have yet be addressed enable this three-way for securing necessary resources further guaranteeing quality of service (QoS) task handling. The first challenge is related partitioning application into several dependent subtasks schedule...

10.1109/tcc.2023.3251561 article EN IEEE Transactions on Cloud Computing 2023-03-02

Multiaccess edge computing (MEC) provides services for resource-sensitive and delay-sensitive Internet of Things (IoT) applications by extending the capabilities cloud to networks. However, high mobility IoT devices (e.g., vehicles) limited resources servers (ESs) affect service continuity access latency. Service migration reasonable resource (re-)allocation consequently become needed ensure Quality (QoS). results in additional In addition, different mobile users have requirements allocation...

10.1109/jiot.2023.3332421 article EN IEEE Internet of Things Journal 2023-11-14

It is a tough problem to jointly detect and track weak target, it becomes even more challenging when the target maneuvering. The above formulated by using Bayesian theory multiple model (MM) based filter proposed. presented uses MM method accommodate motions that maneuvering may travel under adding random variable representing motion state. To strengthen efficiency performance of filter, existence separated from state probability calculated in efficient way. examine approach, typical...

10.23919/jsee.2020.000040 article EN Journal of Systems Engineering and Electronics 2020-08-01

Joint detection and tracking weak target is a challenging problem whose complexity intensified when there are multiple targets present at the same time. Some Probability Hypothesis Density (PHD) based track-before-detect (TBD) particle filters (PHD-TBD) proposed to solve this issue; however, performance unsatisfactory especially number of large because some assumptions in PHD violated. We propose modify general PHD-TBD filter two aspects make processing available for TBD scenarios. First,...

10.1109/access.2019.2945558 article EN cc-by IEEE Access 2019-01-01

Humanity's burgeoning crewed and uncrewed presence in space is creating increasing opportunity for ideas approaches gestated terrestrial use to be adapted deployed applications. To illustrate this from the perspective of Pervasive Community, article overviews a selection recent ongoing space-oriented projects MIT Media Lab's Responsive Environments Group, chronicles roots that most them had our prior Computing research program. These involve wearables, smart fabrics, sensor networks,...

10.1109/mprv.2023.3242667 article EN IEEE Pervasive Computing 2023-03-15

In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in dynamic or static feature space. Aiming at this problem, an integrative extraction algorithm based on simhash was proposed, which combines information e.g., API (Application Programming Interface) calls (such as file, registry network behaviors) of samples to form features. The experiment extracts features some information, then compares classification, time...

10.3390/a11080124 article EN cc-by Algorithms 2018-08-14

10.1007/s12204-022-2514-6 article EN Journal of Shanghai Jiaotong University (Science) 2022-11-12

Adversarial examples have aroused great attention during the past years owing to their threat deep neural networks (DNNs). Recently, they been successfully extended video models. Compared with image cases, sparse adversarial perturbations in videos can not only reduce computation complexity, but also guarantee crypticity of examples. In this paper, we propose an efficient attack generate large sparsity both temporal (inter-frames) and spatial (intra-frames) domains. Specifically, select key...

10.3390/s22103686 article EN cc-by Sensors 2022-05-12

Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods AE generation use two optimization models: (1) taking successful attack as objective function and limiting perturbations constraint; (2) minimum target constraint. These all involve fundamental problems AEs: boundary constructing AEs whether that is reachable. The reachability means models exist equal to boundary. Previous have no complete answer problems....

10.3390/e24030396 article EN cc-by Entropy 2022-03-12

  The precise point positioning (PPP) timing service has been proposed in recent years and demonstrated to achieve sub-nanosecond accuracy. As an integral part of BDS-3, the PPP services via b2b signals (hereafter referred as PPP-B2b) are provided by BDS-3 GEO satellites with better than decimeter-level accuracy for users around China. In this research, a high-precision receiver based on PPP-B2b established, which obtains local clock offset respect Beidou Time (BDT) through time...

10.5194/egusphere-egu24-9955 preprint EN 2024-03-08

Due to the explosive growth of software quantity and mixed ability developers, a large number defects emerge during later stages maintenance. The search method based on genetic programming is one most popular in algorithms, but it also has some issues. single-objective approach validate select offspring patches without considering other constraints can affect efficiency patch generation. To address this issue, paper proposes an automatic repair Multi-objective Genetic Programming...

10.3390/app14188550 article EN cc-by Applied Sciences 2024-09-23

Gas pipeline leakage can cause adverse social impacts such as waste of resources and environmental pollution. Existing detection methods ignore the practical problem that aging or damaged sensors affect accuracy. In this paper, we propose a method for gas using multichannel acoustic signals. We consider signals acquired by outliers. First, Local outlier factor is used to calculate degree each channel signal, channels with outliers are removed. Dynamic time warping barycenter averaging then...

10.1109/iceemt59522.2023.10263263 article EN 2023-07-21

The security issue on the physical layer is of significant challenge yet paramount importance for 5G communications. In some previous works, transmit power allocation has already been studied orthogonal frequency division multiplexing (OFDM) secure communication with Gaussian channel inputs both a single user and multiple users. Facing peak transmission constraints, we adopt discrete (e.g., QPSK) in practical system, instead inputs. Discrete impose more as compared conventional multiuser...

10.1109/eltech.2019.8839391 article EN 2019 IEEE 2nd International Conference on Electronics Technology (ICET) 2019-05-01

Automatic program repair is a cutting-edge research direction in software engineering recent years. The existing techniques based on genetic programming suffer from requiring verification of large number candidate patches, which consume lot computational resources. We instead propose Random search via Code Similarity automate Repair (RCSRepair). First, we use test filtering and case prioritization fault localization to reduce restructure cases. Second, combination random code similarity used...

10.1109/qrs-c55045.2021.00075 article EN 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2021-12-01

The security issue on the physical layer is of significant challenge yet paramount importance for 5G communications. In some previous works, transmit power allocation has already been studied orthogonal frequency division multiplexing (OFDM) secure communication with Gaussian channel inputs both a single user and multiple users. Faced peak transmission constraints, we adopt discrete (e.g., equiprobable Quadrature Phase Shift Keying (QPSK) symmetry) in practical system, instead inputs....

10.3390/sym11070855 article EN Symmetry 2019-07-02

A multitude of equipment in an identical platform causes many problems, such as the degradation system performance and increase electromagnetic interference. As a solution, integrated communication interference (ICCI) with orthogonal frequency division multiplexing (OFDM) waveform is proposed. The different limitations designing are investigated. Several numerical results given to obtain suitable modulation types.

10.1109/eltech.2019.8839524 article EN 2019 IEEE 2nd International Conference on Electronics Technology (ICET) 2019-05-01
Coming Soon ...