Gang Wang

ORCID: 0000-0002-8195-365X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Military Defense Systems Analysis
  • Target Tracking and Data Fusion in Sensor Networks
  • Guidance and Control Systems
  • Advanced Decision-Making Techniques
  • Distributed Control Multi-Agent Systems
  • Neural Networks and Applications
  • Blind Source Separation Techniques
  • Reinforcement Learning in Robotics
  • Spectroscopy and Chemometric Analyses
  • Advanced Measurement and Detection Methods
  • Advanced Malware Detection Techniques
  • UAV Applications and Optimization
  • Hate Speech and Cyberbullying Detection
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Speech and Audio Processing
  • Infrared Target Detection Methodologies
  • Distributed Sensor Networks and Detection Algorithms
  • Simulation and Modeling Applications
  • Opinion Dynamics and Social Influence
  • Complex Network Analysis Techniques
  • Fire Detection and Safety Systems
  • Algorithms and Data Compression
  • Imbalanced Data Classification Techniques
  • Optimization and Search Problems
  • Adversarial Robustness in Machine Learning

Air Force Engineering University
2015-2025

Tianjin University of Technology and Education
2024

Tiangong University
2024

Civil Aviation University of China
2024

Wenzhou Medical University
2022

Zhejiang Taizhou Hospital
2022

China Telecom (China)
2017

Intelligent Fusion Technology (United States)
2014

Chengdu University of Technology
2014

Dalian University
2007

The scale of ground-to-air confrontation task assignments is large and needs to deal with many concurrent random events. Aiming at the problems where existing assignment methods are applied confrontation, there low efficiency in dealing complex tasks, interactive conflicts multiagent systems. This study proposes a architecture based on one-general agent multiple narrow agents (OGMN) reduce conflicts. Considering slow speed traditional dynamic algorithms, this paper proximal policy...

10.1016/j.dt.2022.04.001 article EN cc-by-nc-nd Defence Technology 2022-04-10

Fraud detection has increasingly become a prominent research field due to the dramatically increased incidents of fraud. The complex connections involving thousands, or even millions nodes, present challenges for fraud tasks. Many researchers have developed various graph-based methods detect from these intricate graphs. However, those neglect two distinct characteristics graph: non-additivity certain attributes and distinguishability grouped messages neighbor nodes. This paper introduces...

10.1609/aaai.v38i10.29067 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by scarcity of available spectrum, which turn significantly limits communication performance. Additionally, openness wireless channel poses a serious threat, such as wiretapping jamming. Therefore, it necessary to improve security performance system. Recently,...

10.3390/electronics14030541 article EN Electronics 2025-01-29

This study addresses the challenge of intelligent decision‐making for command‐and‐control systems in air defense combat operations. Current autonomous suffer from limited rationality and insufficient intelligence during operation processes. Recent studies have proposed methods based on deep reinforcement learning (DRL) to address these issues. However, DRL typically face challenges related weak interpretability, lack convergence guarantees, high‐computing power requirements. To issues, a...

10.1002/aisy.202300151 article EN cc-by Advanced Intelligent Systems 2023-08-18

Unmanned Aerial Vehicles (UAVs) have gained popularity due to their low lifecycle cost and minimal human risk, resulting in widespread use recent years. In the UAV swarm cooperative decision domain, multi-agent deep reinforcement learning has significant potential. However, current approaches are challenged by multivariate mission environment time constraints. light of this, present study proposes a meta-learning based approach that provides viable solution this problem. This paper presents...

10.3389/fnbot.2023.1243174 article EN cc-by Frontiers in Neurorobotics 2023-09-21

Splitting and combination are two important events of group target motion. However, the existing tracking approaches for splitting suffer problems high-computational cost low accuracy. Under random finite set framework, with extent modeled by matrix, algorithms based on <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$\delta $ </tex-math></inline-formula> -generalized labeled multi-Bernoulli filter...

10.1109/access.2019.2923757 article EN cc-by IEEE Access 2019-01-01

The multi-agent system is the optimal solution to complex intelligent problems. In accordance with game theory, concept of loyalty introduced analyze relationship between agents' individual income and global benefits build logical architecture system. Besides, verify feasibility method, cyclic neural network optimized, bi-directional coordination built as training for deep learning, specific scenes are simulated background. After a certain number iterations, model can learn simple strategies...

10.23919/jsee.2020.000006 article EN Journal of Systems Engineering and Electronics 2020-04-01

Deep Reinforcement Learning (DRL) methods are inefficient in the initial strategy exploration process large-scale complex scenarios. This is becoming one of bottlenecks their application to game adversarial paper proposes a Safe reinforcement learning combined with Imitation for Task Assignment (SITA) method representative red-blue confrontation scenario. Aiming at problem difficult sampling (IL), this combines human knowledge rules build rule base; We propose Decoupled Network (ILDN)...

10.1109/access.2022.3217654 article EN cc-by-nc-nd IEEE Access 2022-01-01

In this paper, quantum technology is introduced with three key topics, including computing, communication, and devices. Using these dimensions of techniques we briefly introduce their contributions to aerospace applications. The paper will help readers understand the basic concepts potential applications in space, air, ground such as highly accurate target positioning.

10.1117/12.2050032 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2014-06-03

With the rapid development of information technology, network-centric warfare (NCW) has become main operational style now and even in future, destruction resistance networks one most important issues field. Based on complex theory, command control (C2) network is constructed, topology characteristics are analyzed. Aiming at deliberate attack random attack, C2 analyzed optimized. The simulation results show that conforms to small-world free-scale characteristics, it sensitive attack. strategy...

10.3390/electronics12051180 article EN Electronics 2023-02-28

Focusing on nonlinear/non-Gaussian filters and based analysis of the sampling-importance-resampling algorithm, this paper examines principles application particle filter (PF) in satellite orbit determination. There may be large error initial estimation non-Gaussian distribution state measurement To solve two problems, an improved PF algorithm is put forward paper. Depending data features, a multinomial re-sampling strategy used for filtering self-adaptively determines optimal number...

10.1109/cisp.2008.361 article EN Congress on Image and Signal Processing 2008-01-01

As target splitting is not considered in the initial development of <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><mml:mi>δ</mml:mi></mml:math>-generalized labeled multi-Bernoulli (<mml:math id="M3"><mml:mi>δ</mml:mi></mml:math>-GLMB) filter, scenarios where new targets appearing conditioned on preexisting one are readily addressed by this filter. In view this, we model group as gamma Gaussian inverse Wishart (GGIW) distribution and derive a...

10.1155/2019/9278725 article EN cc-by Journal of Sensors 2019-05-19

Firstly, the risk assessment system of terrorist attacks is established, and relevant indexes events are screened, combined quantified. This paper gets index weights by AHP method, degree damage calculated. Then it uses DBSCAN method to cluster sample data optimize parameters Eps MinPts. The results show that potential organizations or individuals predicted, this can be applied other similar analysis problems.

10.1088/1742-6596/1168/3/032029 article EN Journal of Physics Conference Series 2019-02-01

Spatial crowdsourcing is a mode that uses distributed artificial computing power to solve specific function sets through Internet outsourcing. It has broad application value in the networked command and control of current joint air defense operations. In this paper, we introduce spatial theory into field target allocation for operations establish weapon-target assignment model based on mode, which more appropriate real situation highlights system cooperation capability To model, propose...

10.3390/electronics11111779 article EN Electronics 2022-06-03

Threshold choosing is critical in wavelet speech enhancement. In the paper, a novel packet enhancement algorithm presented based on time-frequency (TF) threshold. Different from conventional methods threshold choosing, e.g. invariant and time-variant threshold, proposed modulated according to TF details other than rough envelops adopted recent algorithms eager energy operator (TEO) adaptive noise estimation (ANE). new algorithm, information obtained frequency-based pre-estimate, with...

10.1109/icicic.2007.72 article EN 2007-09-01

&lt;abstract&gt;&lt;p&gt;Codebooks with small cross-correlation amplitude have extensive applications in many fields including code division multiple access (CDMA) communications systems, space-time codes, and compressed sensing. In this paper, a class of asymptotically optimal codebooks was constructed, the maximum inner-product these presented determined by using properties character sums over finite fields. Furthermore, provided new parameters.&lt;/p&gt;&lt;/abstract&gt;

10.3934/math.2024471 article EN cc-by AIMS Mathematics 2024-01-01

Intelligent decision‐making in air defense operations has attracted wide attention from researchers. Facing complex battlefield environments, existing algorithms fail to make targeted decisions according the hierarchical characteristics of operational command and control. What’s worse, process problem‐solving, these are beset by defects such as dimensional disaster poor real‐time performance. To address problems, a new reinforcement learning algorithm named Hierarchy Asynchronous Advantage...

10.1155/2024/7777050 article EN cc-by International Journal of Intelligent Systems 2024-01-01

Our society increasingly benefits from Artificial Intelligence (AI). Unfortunately, more and evidence shows that AI is also used for offensive purposes. Prior works have revealed various examples of use cases in which the deployment can lead to violation security privacy objectives. No extant work, however, has been able draw a holistic picture potential AI. In this SoK paper we seek lay ground systematic analysis heterogeneous capabilities particular (i) account risks both humans systems...

10.48550/arxiv.2412.18442 preprint EN arXiv (Cornell University) 2024-12-24

Abstract To explore the feasibility of collaborative guidance for small tactical air-to-ground missiles and enhance their ability to cope with future complex battlefield systems, this article first elaborated on principle multi missile guidance. Then, based operational mission missiles, several combat modes were proposed. For specific modes, time angle laws suitable designed developed. Overcoming problems short flight time, fast speed inability adjust completing mathematical simulation...

10.1088/1742-6596/2891/12/122024 article EN Journal of Physics Conference Series 2024-12-01

In the past, way to manage and control satellite operations was mainly accomplished by planning mission plan in advance through ground.However, current missions are becoming more complex, it is necessary face sudden emergency situations changes operating environment.The management model presents many challenges.This paper takes single-satellite collaborative as satelliteting point, summarizes forecasts research of algorithm, which focuses on status autonomous task scheduling planning,...

10.18178/ijfcc.2020.9.1.557 article EN International Journal of Future Computer and Communication 2020-03-01

Nonlinear independent component analysis (NICA) is a generalization of basic (ICA), and many methods have been proposed to recover signals from nonlinear mixtures. The work performed on post-nonlinear model, the emphasis focused method self-organizing map (SOM). Two issues are addressed, (1) factor rotation crucial step in process inverse transform, (2) density distortion introduced by transform. As SOM homeomorphism input space maps, it cannot perform remove distortion. Experiments show...

10.1109/wcica.2004.1340492 article EN 2004-11-08
Coming Soon ...