- Advanced Algorithms and Applications
- Wireless Signal Modulation Classification
- Blind Source Separation Techniques
- Face and Expression Recognition
- Topic Modeling
- Neural Networks and Applications
- Text and Document Classification Technologies
- Adversarial Robustness in Machine Learning
- Speech and Audio Processing
- Sparse and Compressive Sensing Techniques
- Natural Language Processing Techniques
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Machine Learning and ELM
- Robotic Path Planning Algorithms
- Advanced Data Compression Techniques
- Distributed Control Multi-Agent Systems
- Ultra-Wideband Communications Technology
- UAV Applications and Optimization
- Music and Audio Processing
- Domain Adaptation and Few-Shot Learning
- Microwave Imaging and Scattering Analysis
- Advanced Text Analysis Techniques
- Advanced Wireless Communication Techniques
- Underwater Acoustics Research
National University of Defense Technology
2011-2025
Second Affiliated Hospital of Nanchang University
2021
Nanchang University
2021
PLA Electronic Engineering Institute
2008-2017
Tsinghua University
2015
Bentham Science Publishers (United Arab Emirates)
2014
Bentham Science Publishers (China)
2014
University of Science and Technology of China
2002-2013
Wuhan University
2013
State Key Laboratory of Pulsed Power Laser Technology
2011-2012
Radio frequency fingerprints (RFFs) refer to the unique characteristics of signals transmitted by each emitter, which are valuable for physical layer security. Despite fact that deep learning based methods have shown significant advantages RFF extraction, they generally require large amount data avoid overfitting. To improve performance extraction with limited training samples, we propose an unsupervised pre-training method on masked autoencoding (MAE) learning. Specifically, neural network...
Technology determines tactics, and tactics promote the development of technology. Artificial intelligence technology is a multiplier that accelerates innovation military theory. In this paper, we first list different levels by introducing their corresponding applications. Then review technical classification based on related concepts, Finally, discuss practical difficulties give some solutions from aspects strengthening knowledge engineering, building simulation systems, accumulating data...
This paper first proposes a novel multi-universe parallel quantum genetic algorithm (MPQGA). Then it puts forward new blind source separation (BSS) method based on the combination of MPQGA and independent component analysis (ICA). The simulation result shows that efficiency BSS is obviously higher than conventional (CGA) (QGA).
Canna edulis Ker starch was modified by heat-moisture treatment at moisture levels ranging from 18 to 27 g/100 g and its physicochemical properties were investigated. Amylose content, swelling power, solubility as well water oil absorption capacity in native higher than all treated starches. However, alkaline retention acid susceptibility of lower, along with different extent amylose leaching. The result the X-ray diffraction measurement revealed that crystalline type gradually changed...
Chaotic signals show many advantages in the application of radar systems. The technique described this study focuses on chaotic behaviour chaotic-based frequency- and phase-modulated signals. Chaotic-based are introduced analysed. Theoretical analysis points out that initial map's phase structure is destroyed by frequency or modulation, which may be direct reason induces uncertain behaviours modulated based chaos. Furthermore, a sufficient condition for maps to ensure...
The goal of relational triple extraction is to extract knowledge-rich triples from unstructured text. Although the previous methods obtain considerable performance, there are still some problems, such as error propagation, overlapping problem, and suboptimal subject–object alignment. To address shortcomings above, in this paper, we decompose task into three subtasks a fresh perspective: entity extraction, alignment relation judgement, well propose novel bi-directional translating decoding...
Specific Emitter Identification (SEI) is a key research problem in the field of information countermeasures. It one technologies required to be solved urgently target reconnaissance system. has ability distinguish between different individual radiation sources according varying characteristics emitter hardware within transmitted signals. In response lack scarcity among labeled samples specific identification, this paper proposes method combining multi-domain feature fusion and integrated...
The Internet of Things (IoT) is promising to transform a wide range fields. However, the open nature IoT makes it exposed cybersecurity threats, among which identity spoofing typical example. Physical layer authentication, identifies devices based on physical characteristics signals, serves as an effective way counteract spoofing. In this paper, we propose deep learning-based framework for open-set authentication devices. Specifically, additive angular margin softmax (AAMSoftmax) was...
In an electronic warfare-type scenario, optimal jamming strategy is vital important for a jammer who has restricted power and how to make the strategies quickly accurately put on agenda. this paper, we developed cognitive could learn with proposed algorithm-Greedy Bandits (GB). By interacting transmitter-receiver pairs continually, which also advantage of reinforcement learning theory, obtains physical layer parameters like signaling scheme, level on-off/pulsing. After constructing model,...
Specific emitter identification (SEI) is the process of identifying individual emitters by analyzing radio frequency emissions, based on fact that each device contains unique hardware imperfections.While majority previous research focuses obtaining features are discriminative, reliability rarely considered.For example, since characteristics same vary when it operating at different carrier frequencies, performance SEI approaches may degrade training data and test collected from with...
Specific emitter identification (SEI) refers to distinguishing emitters using individual features extracted from wireless signals. The current SEI methods have proven be accurate in tackling large labeled data sets at a high signal-to-noise ratio (SNR). However, their performance declines dramatically the presence of small samples and significant noise environment. To address this issue, we propose complex self-supervised learning scheme fully exploit unlabeled samples, comprised pretext...
The relational triple extraction is a fundamental and essential information task. existing approaches of relation achieve considerable performance but still suffer from 1) treating the between entities as meaningless label while ignoring semantic itself 2) interdependence inseparability three elements triple. To address these problems, this paper proposes Relational Prompt approach, based on which constructs Single-module Single-step model (RPSS). In particular, proposed prompt approach...
Reinforcement learning (RL) has the advantage of interaction with an environment over time, which is helpful in cognitive jamming research, especially electronic warfare-type scenario, communication parameters and effect are unknown to a jammer. In this paper, algorithm for strategy using orthogonal matching pursuit (OMP) multi-armed bandit (MAB) proposed. We construct dictionary each atom represents symbol error rate (SER) curve can be obtained known noise distribution deterministic...
Transfer learning extracts useful information from the related source domain and leverages it to promote target learning. The effectiveness of transfer was affected by relationship among domains. In this paper, a novel multi-source based on multi-similarity proposed. method could increase chance finding sources closely reduce "negative transfer" also import more knowledge multiple for explored between metric. Then, transferred smoothness assumption, which enforced that classifier shares...
Stochastic resonance is a new type of weak signal detection method. Compared with traditional noise suppression technology, stochastic uses to enhance information, and there mechanism for the transfer energy energy. The purpose this paper study theory application based on mechanism. This studies characteristics bistable circuit conducts an experimental simulation its in Multisim environment. It verified that can achieve function very well, it provides strong support actual production...