Junjian Zhang

ORCID: 0000-0003-0083-1384
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Face and Expression Recognition
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Video Surveillance and Tracking Methods
  • Remote-Sensing Image Classification
  • Speech Recognition and Synthesis
  • Interactive and Immersive Displays
  • Advanced Graph Neural Networks
  • Advanced Steganography and Watermarking Techniques
  • Gene expression and cancer classification
  • Sparse and Compressive Sensing Techniques
  • Statistical Distribution Estimation and Applications
  • Augmented Reality Applications
  • Speech and Audio Processing
  • Wireless Signal Modulation Classification
  • Chaos-based Image/Signal Encryption
  • Bayesian Methods and Mixture Models
  • Virtual Reality Applications and Impacts
  • Bacillus and Francisella bacterial research
  • Soil Moisture and Remote Sensing
  • Nutrition and Health in Aging
  • Advanced Measurement and Detection Methods
  • Internet Traffic Analysis and Secure E-voting
  • Civil and Geotechnical Engineering Research

Chinese Academy of Sciences
2024

Peng Cheng Laboratory
2023-2024

Xinjiang Institute of Ecology and Geography
2024

Guangzhou University
2022-2023

Beijing University of Posts and Telecommunications
2016-2019

Dalian University
2019

University of Tsukuba
2018-2019

Dalian University of Technology
2019

Wuhan University
2013

Beijing University of Technology
2010

Subspace clustering methods based on data self-expression have become very popular for learning from that lie in a union of low-dimensional linear subspaces. However, the applicability subspace has been limited because practical visual raw form do not necessarily such On other hand, while Convolutional Neural Network (ConvNet) demonstrated to be powerful tool extracting discriminative features data, training ConvNet usually requires large amount labeled which are unavailable applications. To...

10.1109/cvpr.2019.00562 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances in deep learning have considerably boosted development of speech signal processing techniques. or has been widely adopted such applications as smart locks, vehicle-mounted systems, and financial services. However, neural network-based systems (SRSs) are susceptible to adversarial attacks, which fool system make wrong decisions by small perturbations, this drawn attention researchers security...

10.3390/electronics11142183 article EN Electronics 2022-07-12

Deep neural networks (DNNs) can improve the image analysis and interpretation of remote sensing technology by extracting valuable information from images, has extensive applications such as military affairs, agriculture, environment, transportation, urban division. The DNNs for object detection identify analyze objects in images through fruitful features which improves efficiency processing enables recognition large-scale images. However, many studies have shown that deep are vulnerable to...

10.3390/rs15040885 article EN cc-by Remote Sensing 2023-02-05

Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, SHA-3 algorithm used to calculate hash value of initial password, which as chaotic system. Second, sequence are scramble plaintext, sorting for secondary scrambling. Then, rules change plaintext pixel values, makes ciphertext more random resistant attacks, thus ensures that encrypted secure. Finally, we add statistics pixel-level diffusion ensure sensitivity. The...

10.1088/1674-1056/28/4/040504 article EN Chinese Physics B 2019-04-01

High dimensional data often lie approximately in low subspaces corresponding to multiple classes or categories. Segmenting the high into their is referred as subspace clustering. State of art methods solve this problem two steps. First, an affinity matrix built from based on self-expressiveness model, which each point expressed a linear combination other points. Second, segmentation obtained by spectral However, solving dependent steps separately still suboptimal. In paper, we propose joint...

10.1109/vcip.2016.7805514 article EN 2016-11-01

AbstractAbstract<title/> Background and aims: Stroke is the number one cause of death in China. Although effective management has reduced mortality lengthened survival, little attention been paid to nutritional issues patients with stroke This study aimed assess premorbid nutrition status dying acute cerebral infarction. Methods: In this study, a total 185 ischemic within 30 days were recruited from medical records. Characteristics assessed on admission, serum biochemical parameters...

10.1179/016164111x13007856084160 article EN Neurological Research 2011-06-01

Most existing deep neural networks (DNNs) are inexplicable and fragile, which can be easily deceived by carefully designed adversarial example with tiny undetectable noise. This allows attackers to cause serious consequences in many DNN-assisted scenarios without human perception. In the field of speaker recognition, attack for recognition system has been relatively mature. works focus on white-box attacks that assume information DNN is obtainable, only a few study gray-box attacks. this...

10.1109/dsc55868.2022.00029 article EN 2022-07-01

Subspace clustering refers to the problem of segmenting high dimensional data drawn from a union subspaces into respective subspaces. In some applications, partial side-information indicate "must-link" or "cannot-link" in is available. This leads task subspace with side-information. However, prior work supervision value for has not been fully exploited. To this end, paper, we present an enhanced approach constrained side-information, termed Constrained Sparse Clustering plus (CSSC+), which...

10.1109/icpr.2018.8545800 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2018-08-01

Standard methods of subspace clustering are based on self-expressiveness in the original data space, which states that a point can be expressed as linear combination other points. However, real raw form usually not well aligned with model. Therefore, it is crucial to obtain proper feature space for performing high quality clustering. Inspired by success Convolutional Neural Networks (CNN) extraction powerful features from visual and block diagonal prior learning good affinity matrix...

10.1109/access.2019.2963279 article EN cc-by IEEE Access 2019-12-31

Live video streaming is becoming increasingly popular as a form of interaction in social applications. One its main advantages an ability to immediately create and connect community remote users on the spot. In this paper we discuss how feature can be used for crowdsourced completion simple visual search tasks (such finding specific objects libraries stores, or navigating around live events) interactions through mobile mixed reality telepresence interfaces. We present prototype application...

10.1145/3272973.3274100 article EN 2018-10-30

Adversarial examples pose a security threat to Autopilot's speech command recognition module, which attracted widespread attention from researchers. Previous works purify the malicious adversarial perturbations through pre-processing data time and frequency domain information. However, these methods either have weak purification capacity or require significant cost. To tackle this problem, we propose real-time efficient purification-based defense method DualPure, combines two aspects in for...

10.21437/interspeech.2024-855 article EN Interspeech 2022 2024-09-01

10.1109/jstars.2024.3461165 article EN cc-by-nc-nd IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2024-01-01

This paper presents EXController, a new controller-mounted finger posture recognition device specially designed for VR handheld controllers. We seek to provide additional input through real-time vision sensing by attaching near infrared (NIR) camera onto the controller. and implemented an exploratory prototype with HTC Vive The NIR is modified from traditional webcam applied data-driven Convolutional Neural Network (CNN) classifier. 12 different gestures trained CNN classifier dataset 20...

10.1145/3281505.3283385 article EN 2018-11-28

10.4156/aiss.vol5.issue5.148 article EN INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 2013-03-15

Based on the teaching reform model of University Chicago School Medicine,Wuhan Medicine firstly integrates Neuroscience course for undergraduated medical students,which combining basic theory courses nervous system with neurological clinical cases,the aim which is to reduce duplication.In order deepen students understand and master neuroscience course,the case-based method were introduced.After two years experiences,teachers all reflect good.This article introduces this used. Key words:...

10.3760/cma.j.issn.1673-677x.2013.01.027 article EN Chinese Journal of Medical Education 2013-02-01

Deep neural networks (DNNs) have greatly improved speaker recognition performance. However, DNNs are vulnerable to imperceptible adversarial example, which has attracted the attention in both academic and industrial areas recent years. Although many elegant attack methods been proposed, few of them studied Universal Adversarial Perturbation (UAP) against recognition. In this paper, we propose a novel algorithm from perspective dominant features generate UAP mislead DNNs. Our method uses...

10.1109/dsc59305.2023.00031 article EN 2023-08-18
Coming Soon ...