Hongbo Sun

ORCID: 0000-0003-0260-5663
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Advanced Vision and Imaging
  • Chaos-based Image/Signal Encryption
  • Image Enhancement Techniques
  • Cellular Automata and Applications
  • Video Surveillance and Tracking Methods
  • 3D Surveying and Cultural Heritage
  • Software-Defined Networks and 5G
  • Biometric Identification and Security
  • Computer Graphics and Visualization Techniques
  • Face recognition and analysis
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Infrared Target Detection Methodologies
  • Remote Sensing and LiDAR Applications
  • Digital Media Forensic Detection
  • Advanced Neural Network Applications
  • Advanced Malware Detection Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Brain Tumor Detection and Classification
  • Cognitive Computing and Networks
  • Computability, Logic, AI Algorithms
  • Coding theory and cryptography

Zhuhai Institute of Advanced Technology
2024

Beijing Institute of Technology
2024

Nanjing University of Posts and Telecommunications
2021-2023

Beijing Electronic Science and Technology Institute
2017-2021

In recent years, with the improvement of living standards and economic development, urban car ownership has increased year by year. This put pressure on carrying capacity roads, leading to traffic congestion. However, for traditional means vehicle detection, there are problems such as small detection range, poor flexibility low efficiency, so that it is not possible obtain real-time convenient flow data. this paper, YOLOv5-OBB used a research object, three experiments conducted using...

10.1117/12.3035492 article EN 2024-08-16

It is difficult and challenging to evaluate the aesthetics quality of images from multiple angles. Since humans' perception comes many factors, integrated image aesthetic assessment cannot be easily summarized by few attributes. A comprehensive evaluation supposed predict attributes across not only one dataset. This requires model have high accuracy, but also strong generalization ability, resulting in a better prediction on models datasets. Recent work shows that deep convolution neural...

10.1109/access.2019.2958119 article EN cc-by IEEE Access 2019-01-01

Traditional routing scheme cannot be applied in the dynamic and complex network environment directly. Thus resulting degraded performance. This paper proposes one Deep Graph Learning (DGL) algorithm based on Convolution Network (GCN) Actor-Critic architecture. The GCN is selected as policy order to update link weight of whole network. trained by critic traffic allocated proportionally according total reachable path. Finally, realizes optimization global Simulation results demonstrate that...

10.1109/iccworkshops57953.2023.10283762 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2023-05-28

In order to solve untrustworthy detection results of malicious nodes and opaque result tracking process in traditional IoT, we propose a wireless sensor network node model this paper. It utilizes the transparency, data traceability immutability blockchain track results. A cluster head selection algorithm (CHSA) determination (MNDA) are proposed. Finally, based on CHSA-MNDA is formed. This proposed can improve efficiency accuracy detection, thereby improving security IoT. The simulation show...

10.1109/iccworkshops53468.2022.9814635 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2022-05-16

10.1007/s11042-020-09386-4 article EN Multimedia Tools and Applications 2020-08-06

To alleviate the occurrence of flow table overflow in SDN network, this paper studies mitigation strategy based on network path optimization. This first describes phenomenon and its causes, analyzes existing solutions. Then, centralized control function software-defined controller, a Flow Table Resource-based Routing Algorithm (FTR) is proposed. The algorithm mainly includes three parts: calculating load factor switch, evaluating balance degree table, link weight routing. Finally,...

10.1109/vtc2023-fall60731.2023.10333500 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2023-10-10

Blockchain-enabled cyber-physical systems (CPSs) are developed to provide the mass of Intelligent Object Terminal Equipment (IOTE). However, they cannot deal with real-time control problem perception. Hence, this paper studies multi-type access methods and multi-path selective algorithm intelligent end devices in local area network. The is proposed based on multi-terminal collaboration technology. This network model provides a basis for realizing awareness optimal resource scheduling IOTE....

10.1145/3492323.3495575 article EN 2021-12-06
Coming Soon ...