- Advanced Steganography and Watermarking Techniques
- Advanced Vision and Imaging
- Chaos-based Image/Signal Encryption
- Image Enhancement Techniques
- Cellular Automata and Applications
- Video Surveillance and Tracking Methods
- 3D Surveying and Cultural Heritage
- Software-Defined Networks and 5G
- Biometric Identification and Security
- Computer Graphics and Visualization Techniques
- Face recognition and analysis
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Infrared Target Detection Methodologies
- Remote Sensing and LiDAR Applications
- Digital Media Forensic Detection
- Advanced Neural Network Applications
- Advanced Malware Detection Techniques
- Generative Adversarial Networks and Image Synthesis
- Brain Tumor Detection and Classification
- Cognitive Computing and Networks
- Computability, Logic, AI Algorithms
- Coding theory and cryptography
Zhuhai Institute of Advanced Technology
2024
Beijing Institute of Technology
2024
Nanjing University of Posts and Telecommunications
2021-2023
Beijing Electronic Science and Technology Institute
2017-2021
In recent years, with the improvement of living standards and economic development, urban car ownership has increased year by year. This put pressure on carrying capacity roads, leading to traffic congestion. However, for traditional means vehicle detection, there are problems such as small detection range, poor flexibility low efficiency, so that it is not possible obtain real-time convenient flow data. this paper, YOLOv5-OBB used a research object, three experiments conducted using...
It is difficult and challenging to evaluate the aesthetics quality of images from multiple angles. Since humans' perception comes many factors, integrated image aesthetic assessment cannot be easily summarized by few attributes. A comprehensive evaluation supposed predict attributes across not only one dataset. This requires model have high accuracy, but also strong generalization ability, resulting in a better prediction on models datasets. Recent work shows that deep convolution neural...
Traditional routing scheme cannot be applied in the dynamic and complex network environment directly. Thus resulting degraded performance. This paper proposes one Deep Graph Learning (DGL) algorithm based on Convolution Network (GCN) Actor-Critic architecture. The GCN is selected as policy order to update link weight of whole network. trained by critic traffic allocated proportionally according total reachable path. Finally, realizes optimization global Simulation results demonstrate that...
In order to solve untrustworthy detection results of malicious nodes and opaque result tracking process in traditional IoT, we propose a wireless sensor network node model this paper. It utilizes the transparency, data traceability immutability blockchain track results. A cluster head selection algorithm (CHSA) determination (MNDA) are proposed. Finally, based on CHSA-MNDA is formed. This proposed can improve efficiency accuracy detection, thereby improving security IoT. The simulation show...
To alleviate the occurrence of flow table overflow in SDN network, this paper studies mitigation strategy based on network path optimization. This first describes phenomenon and its causes, analyzes existing solutions. Then, centralized control function software-defined controller, a Flow Table Resource-based Routing Algorithm (FTR) is proposed. The algorithm mainly includes three parts: calculating load factor switch, evaluating balance degree table, link weight routing. Finally,...
Blockchain-enabled cyber-physical systems (CPSs) are developed to provide the mass of Intelligent Object Terminal Equipment (IOTE). However, they cannot deal with real-time control problem perception. Hence, this paper studies multi-type access methods and multi-path selective algorithm intelligent end devices in local area network. The is proposed based on multi-terminal collaboration technology. This network model provides a basis for realizing awareness optimal resource scheduling IOTE....