Junan Yang

ORCID: 0000-0002-9336-2152
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Algorithms and Applications
  • Wireless Signal Modulation Classification
  • Blind Source Separation Techniques
  • Face and Expression Recognition
  • Topic Modeling
  • Neural Networks and Applications
  • Text and Document Classification Technologies
  • Adversarial Robustness in Machine Learning
  • Speech and Audio Processing
  • Sparse and Compressive Sensing Techniques
  • Natural Language Processing Techniques
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Machine Learning and ELM
  • Robotic Path Planning Algorithms
  • Advanced Data Compression Techniques
  • Distributed Control Multi-Agent Systems
  • Ultra-Wideband Communications Technology
  • UAV Applications and Optimization
  • Music and Audio Processing
  • Domain Adaptation and Few-Shot Learning
  • Microwave Imaging and Scattering Analysis
  • Advanced Text Analysis Techniques
  • Advanced Wireless Communication Techniques
  • Underwater Acoustics Research

National University of Defense Technology
2011-2025

Second Affiliated Hospital of Nanchang University
2021

Nanchang University
2021

PLA Electronic Engineering Institute
2008-2017

Tsinghua University
2015

Bentham Science Publishers (United Arab Emirates)
2014

Bentham Science Publishers (China)
2014

University of Science and Technology of China
2002-2013

Wuhan University
2013

State Key Laboratory of Pulsed Power Laser Technology
2011-2012

Radio frequency fingerprints (RFFs) refer to the unique characteristics of signals transmitted by each emitter, which are valuable for physical layer security. Despite fact that deep learning based methods have shown significant advantages RFF extraction, they generally require large amount data avoid overfitting. To improve performance extraction with limited training samples, we propose an unsupervised pre-training method on masked autoencoding (MAE) learning. Specifically, neural network...

10.1109/lwc.2022.3184674 article EN IEEE Wireless Communications Letters 2022-06-21

Technology determines tactics, and tactics promote the development of technology. Artificial intelligence technology is a multiplier that accelerates innovation military theory. In this paper, we first list different levels by introducing their corresponding applications. Then review technical classification based on related concepts, Finally, discuss practical difficulties give some solutions from aspects strengthening knowledge engineering, building simulation systems, accumulating data...

10.1109/access.2020.3009840 article EN cc-by IEEE Access 2020-01-01

This paper first proposes a novel multi-universe parallel quantum genetic algorithm (MPQGA). Then it puts forward new blind source separation (BSS) method based on the combination of MPQGA and independent component analysis (ICA). The simulation result shows that efficiency BSS is obviously higher than conventional (CGA) (QGA).

10.1109/icnnsp.2003.1279292 article EN 2003-01-01

Canna edulis Ker starch was modified by heat-moisture treatment at moisture levels ranging from 18 to 27 g/100 g and its physicochemical properties were investigated. Amylose content, swelling power, solubility as well water oil absorption capacity in native higher than all treated starches. However, alkaline retention acid susceptibility of lower, along with different extent amylose leaching. The result the X-ray diffraction measurement revealed that crystalline type gradually changed...

10.1080/10942910903061828 article EN International Journal of Food Properties 2010-06-13

Chaotic signals show many advantages in the application of radar systems. The technique described this study focuses on chaotic behaviour chaotic-based frequency- and phase-modulated signals. Chaotic-based are introduced analysed. Theoretical analysis points out that initial map's phase structure is destroyed by frequency or modulation, which may be direct reason induces uncertain behaviours modulated based chaos. Furthermore, a sufficient condition for maps to ensure...

10.1049/iet-spr.2010.0096 article EN IET Signal Processing 2011-01-01

The goal of relational triple extraction is to extract knowledge-rich triples from unstructured text. Although the previous methods obtain considerable performance, there are still some problems, such as error propagation, overlapping problem, and suboptimal subject–object alignment. To address shortcomings above, in this paper, we decompose task into three subtasks a fresh perspective: entity extraction, alignment relation judgement, well propose novel bi-directional translating decoding...

10.3390/app13074447 article EN cc-by Applied Sciences 2023-03-31

Specific Emitter Identification (SEI) is a key research problem in the field of information countermeasures. It one technologies required to be solved urgently target reconnaissance system. has ability distinguish between different individual radiation sources according varying characteristics emitter hardware within transmitted signals. In response lack scarcity among labeled samples specific identification, this paper proposes method combining multi-domain feature fusion and integrated...

10.3390/sym13081481 article EN Symmetry 2021-08-12

The Internet of Things (IoT) is promising to transform a wide range fields. However, the open nature IoT makes it exposed cybersecurity threats, among which identity spoofing typical example. Physical layer authentication, identifies devices based on physical characteristics signals, serves as an effective way counteract spoofing. In this paper, we propose deep learning-based framework for open-set authentication devices. Specifically, additive angular margin softmax (AAMSoftmax) was...

10.3390/s22072662 article EN cc-by Sensors 2022-03-30

In an electronic warfare-type scenario, optimal jamming strategy is vital important for a jammer who has restricted power and how to make the strategies quickly accurately put on agenda. this paper, we developed cognitive could learn with proposed algorithm-Greedy Bandits (GB). By interacting transmitter-receiver pairs continually, which also advantage of reinforcement learning theory, obtains physical layer parameters like signaling scheme, level on-off/pulsing. After constructing model,...

10.1109/iccsn.2017.8230289 article EN 2017-05-01

Specific emitter identification (SEI) is the process of identifying individual emitters by analyzing radio frequency emissions, based on fact that each device contains unique hardware imperfections.While majority previous research focuses obtaining features are discriminative, reliability rarely considered.For example, since characteristics same vary when it operating at different carrier frequencies, performance SEI approaches may degrade training data and test collected from with...

10.24425/bpasts.2021.136737 article EN cc-by-nc-nd Bulletin of the Polish Academy of Sciences Technical Sciences 2021-03-02

Specific emitter identification (SEI) refers to distinguishing emitters using individual features extracted from wireless signals. The current SEI methods have proven be accurate in tackling large labeled data sets at a high signal-to-noise ratio (SNR). However, their performance declines dramatically the presence of small samples and significant noise environment. To address this issue, we propose complex self-supervised learning scheme fully exploit unlabeled samples, comprised pretext...

10.3390/e24070851 article EN cc-by Entropy 2022-06-21

The relational triple extraction is a fundamental and essential information task. existing approaches of relation achieve considerable performance but still suffer from 1) treating the between entities as meaningless label while ignoring semantic itself 2) interdependence inseparability three elements triple. To address these problems, this paper proposes Relational Prompt approach, based on which constructs Single-module Single-step model (RPSS). In particular, proposed prompt approach...

10.1016/j.jksuci.2023.101748 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2023-09-19

Reinforcement learning (RL) has the advantage of interaction with an environment over time, which is helpful in cognitive jamming research, especially electronic warfare-type scenario, communication parameters and effect are unknown to a jammer. In this paper, algorithm for strategy using orthogonal matching pursuit (OMP) multi-armed bandit (MAB) proposed. We construct dictionary each atom represents symbol error rate (SER) curve can be obtained known noise distribution deterministic...

10.1186/s13638-019-1414-4 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-04-02

Transfer learning extracts useful information from the related source domain and leverages it to promote target learning. The effectiveness of transfer was affected by relationship among domains. In this paper, a novel multi-source based on multi-similarity proposed. method could increase chance finding sources closely reduce "negative transfer" also import more knowledge multiple for explored between metric. Then, transferred smoothness assumption, which enforced that classifier shares...

10.1587/transinf.2016edl8008 article EN IEICE Transactions on Information and Systems 2016-01-01

Stochastic resonance is a new type of weak signal detection method. Compared with traditional noise suppression technology, stochastic uses to enhance information, and there mechanism for the transfer energy energy. The purpose this paper study theory application based on mechanism. This studies characteristics bistable circuit conducts an experimental simulation its in Multisim environment. It verified that can achieve function very well, it provides strong support actual production...

10.1155/2021/5553490 article EN Security and Communication Networks 2021-04-07
Coming Soon ...