Zhicheng Zhang

ORCID: 0000-0002-8067-3648
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Metaheuristic Optimization Algorithms Research
  • Human Pose and Action Recognition
  • Image Enhancement Techniques
  • Advanced Image and Video Retrieval Techniques
  • Network Security and Intrusion Detection
  • Hand Gesture Recognition Systems
  • 3D Shape Modeling and Analysis
  • Face and Expression Recognition
  • Adversarial Robustness in Machine Learning
  • Face recognition and analysis
  • Evolutionary Algorithms and Applications
  • Computer Graphics and Visualization Techniques
  • Remote Sensing and LiDAR Applications
  • Artificial Immune Systems Applications
  • Gait Recognition and Analysis
  • Anomaly Detection Techniques and Applications

Beijing University of Posts and Telecommunications
2020-2025

Multi-level thresholding is one of the essential approaches for image segmentation. Determining optimal thresholds multi-level needs exhaustive searching which time-consuming. To improve efficiency, a novel population based bee foraging algorithm (BFA) presented in this paper. The proposed provides different flying trajectories types bees and takes both single-dimensional multi-dimensional search aiming to maintain proper balance between exploitation exploration. swarm divided into number...

10.1109/access.2020.2966665 article EN cc-by IEEE Access 2020-01-01

Scene graphs of point clouds help to understand object-level relationships in the 3D space. Most graph generation methods work on 2D structured data, which cannot be used for unstructured cloud data. Existing point-cloud-based generate scene with an additional structure that needs labor-intensive manual annotation. To address these problems, we explore a method convert into data and without given structures. Specifically, cluster points similar augmented features groups establish their...

10.26599/tst.2023.9010002 article EN Tsinghua Science & Technology 2023-08-21

Human motion prediction has achieved a brilliant performance with the help of convolution-based neural networks. However, currently, there is no work evaluating potential risk in human when facing adversarial attacks. The attack will encounter problems against naturalness and data scale. To solve above, we propose new method that generates worst-case perturbation by maximizing predictor's error physical constraints. Specifically, introduce novel adaptable scheme facilitates to suit scale...

10.48550/arxiv.2306.11990 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Intrusion detection system (IDS) is a security solution to detect the anomalies of Internet Thing (IoT) network and raise alerts. Feature selection one essential preprocess steps build an efficient intelligent intrusion (IDS), which helpful reduce number features (NF) that are used classify attacks. The meta-heuristic algorithm-based approaches has been widely solve feature problems in past few years. However, as data dimension increases, dramatically expanded search space challenges...

10.1109/jiot.2023.3317089 article EN IEEE Internet of Things Journal 2023-09-20
Coming Soon ...