Xinjie Bi

ORCID: 0000-0003-0116-6945
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Machine Fault Diagnosis Techniques
  • Coding theory and cryptography
  • Gear and Bearing Dynamics Analysis
  • Chaos-based Image/Signal Encryption
  • Engineering Diagnostics and Reliability
  • Cryptographic Implementations and Security
  • Optical Systems and Laser Technology
  • Hand Gesture Recognition Systems
  • Image Processing Techniques and Applications
  • Advanced Neural Network Applications
  • Human Pose and Action Recognition

Shandong University
2021-2024

Beijing Electronic Science and Technology Institute
2023-2024

Civil Aviation University of China
2021

10.1016/j.jisa.2023.103696 article EN Journal of Information Security and Applications 2024-01-17

LSS (Low, Small and Slow) targets have characteristics of low cost, simple operation, easy to carry, take-off requirements, strong sudden takeoff, difficult find handle. With the development aviation industry, cases flying illegally used in terrorist attacks are increasing day by day. It will not only cause great negative effects on economy, but also serious influence national security normal economy. In order eliminate threat illegal flight UAV airport clearance area safe operation airport,...

10.1109/icbaie52039.2021.9389908 article EN 2021-03-26

Abnormal changes in the early state of rolling bearings usually appears weak and inapparent. To enhance expression for bearing state, a graph model based on positioning entropy measurement is introduced into condition monitoring this paper. First, short-time Fourier transform (STFT) adopted to convert collected original signal time-frequency domain, then power spectrum generated by period-graph method construction extract relevant information hidden spectrum. The following process extracted...

10.1109/phm-hangzhou58797.2023.10482507 article EN 2023-10-12

SM4, as a block cipher standard in China, has received extensive attention since the date of its publication. Its implementation correctness and security have rapidly become research hotspot. With popularity cryptographic algorithms network security, attack methods such key whitening attack, software static analysis, reverse engineering environment are also constantly developing. In order to resist these methods, white-box algorithm is required. Common schemes add large number linear or...

10.1145/3650400.3650612 article EN Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering 2023-10-20

In the vibration signal of rolling bearing, there are correlations between different frequency components, which is an important information for bearing fault diagnosis. this paper, in order to extract correlation effectively, visibility graph based feature extraction introduced. Firstly, power spectrum extracted by welch method, therefore converted into domain. Then, through (VG) modeling spectrum, components obtained. After that, eight representative features will be from VG, i.e., edge...

10.1109/phm-nanjing52125.2021.9613128 article EN 2021 Global Reliability and Prognostics and Health Management (PHM-Nanjing) 2021-10-15
Coming Soon ...