Xusheng Li

ORCID: 0000-0003-0492-7455
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • 3D Shape Modeling and Analysis
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Advanced Decision-Making Techniques
  • Advanced Image and Video Retrieval Techniques
  • Security and Verification in Computing
  • Remote Sensing and LiDAR Applications
  • Chaos-based Image/Signal Encryption
  • Higher Education and Teaching Methods
  • Advanced Computational Techniques and Applications
  • Advanced Memory and Neural Computing
  • Topic Modeling
  • Evaluation and Optimization Models
  • Railway Engineering and Dynamics
  • Ideological and Political Education
  • Vehicle License Plate Recognition
  • Imbalanced Data Classification Techniques
  • Genomics and Phylogenetic Studies
  • Robotics and Sensor-Based Localization
  • Resource-Constrained Project Scheduling
  • Face and Expression Recognition
  • Advanced Algorithms and Applications
  • Hydraulic and Pneumatic Systems
  • Advanced Materials and Mechanics

Southwest University
2025

Chongqing University
2022-2024

Lanzhou University of Technology
2023

Henan Normal University
2020-2022

Changchun University of Science and Technology
2022

Pennsylvania State University
2019-2020

Sun Yat-sen University
2020

Beijing Academy of Artificial Intelligence
2019

Southwest Jiaotong University
2006-2016

Shanghai Polytechnic University
2016

Recently, it has been found that cloud storage still security risks, and research on the privacy of user data information is in early stage. This paper studies risks data, designs an image encryption scheme based neural networks. First, existing network model improved to obtain a new bidirectional activation (BA) network, establish many-to-one mapping relationship between key chaotic initial value, hide original system, improve randomness system. Then, medical dynamic index scrambling...

10.1016/j.ins.2022.11.089 article EN cc-by-nc-nd Information Sciences 2022-11-28

This paper provides an in-depth review of advancements in robotic motion control systems through the application Deep Reinforcement Learning (DRL). The study highlights growing complexity tasks. It emphasizes need for adaptive strategies dynamic, uncertain environments where traditional methods fall short. By categorizing DRL algorithms into value-based approaches, such as Q-Networks (DQN), and policy gradient methods, like Proximal Policy Optimization (PPO), offers a comparative analysis...

10.54254/2755-2721/2025.19753 article EN cc-by Applied and Computational Engineering 2025-01-10

The packing cotton picker has become the mainstream cotton-picking equipment due to its advantages of integrated picking and non-stop unloading. Precision is an inevitable development trend, accurate detection bale's dimension during process first step toward achieving this. Therefore, this paper proposes a geometry-based method determine bale in picker. By establishing mathematical model process, relationship between rotation angle rocker arm component derived. reliability...

10.20944/preprints202501.1598.v1 preprint EN 2025-01-22

Accurately predicting the wind power output of a farm across various time scales utilizing Wind Power Forecasting (WPF) is critical issue in trading and utilization. The WPF problem remains unresolved due to numerous influencing variables, such as speed, temperature, latitude, longitude. Furthermore, achieving high prediction accuracy crucial for maintaining electric grid stability ensuring supply security. In this paper, we model all turbines within graph nodes built by their geographical...

10.48550/arxiv.2501.16591 preprint EN arXiv (Cornell University) 2025-01-27

Widely used as fundamental security components in most cryptographic applications, random number generators (RNGs) rely mainly on randomness provided by entropy sources. If the is less than expected, RNGs may be compromised and thus impair of whole applications. However, common assumptions (e.g., outputs are independent identically distributed, i.e., IID) not always hold. For example, many sources based some physical phenomena that fragile sensitive to external factors temperature), which...

10.1109/tifs.2019.2947871 article EN IEEE Transactions on Information Forensics and Security 2019-10-16

Return-oriented programming (ROP) is a code reuse attack that chains short snippets of existing to perform arbitrary operations on target machines. Existing detection methods against ROP exhibit unsatisfactory accuracy and/or have high runtime overhead. In this paper, we present ROPNN, which innovatively combines address space layout guided disassembly and deep neural networks detect payloads. The disassembler treats application input data as pointers aims find any potential gadget chains,...

10.48550/arxiv.1807.11110 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Interactions among microorganisms have been the key to understand microbial communities. As an important member of microorganisms, bacteria are closely related human diseases. Therefore, studying interaction between plays role in microbiome research. There a large number published medical literatures that contain small-scale data about interactions bacteria. These often record discovered by co-cultural experiments for two or more species. Mining and organizing them into databases will...

10.1109/bibm47256.2019.8983133 article EN 2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2019-11-01

Vehicle type and brand information constitute a crucial element in intelligent transportation systems (ITSs). While numerous appearance-based classification methods have studied frontal view images of vehicles, the challenge multi-pose multi-angle vehicle distribution has largely been overlooked. This paper proposes an approach for recognition, addressing aforementioned issues. By utilizing faster regional convolution neural networks, this method automatically captures features...

10.3390/s23239569 article EN cc-by Sensors 2023-12-02

Voxel-based 3D object detection methods have been applied in various applications such as autonomous driving, robot navigation, and Augmented Reality. However, the sparse unstructured characteristics of point cloud voxels prevent high-performance voxel encoding usually require generalized platforms, CPUs. In this paper, an FPGAbased Voxel Encoding Accelerator (VEA) is proposed, which contains a generator feature extender. The decouples storage information storage, leading to high-speed...

10.1109/iccd56317.2022.00081 article EN 2022 IEEE 40th International Conference on Computer Design (ICCD) 2022-10-01

Return-oriented programming (ROP) is a code reuse attack that chains short snippets of existing to perform arbitrary operations on target machines. Existing detection methods against ROP exhibit unsatisfactory accuracy and/or have high runtime overhead. In this paper, we present DeepReturn, which innovatively combines address space layout guided disassembly and deep neural networks detect payloads. The disassembler treats application input data as pointers aims find any potential gadget...

10.3233/jcs-191368 article EN Journal of Computer Security 2020-09-11

Multi-line LiDAR is widely used in autonomous vehicles, so point cloud-based 3D detectors are essential for driving. Extracting rich multi-scale features crucial driving due to significant differences the size of different types objects. However, real-time requirements, large-size convolution kernels rarely extract large-scale backbone. Current commonly use feature pyramid networks obtain features; however, some objects containing fewer clouds further lost during downsampling, resulting...

10.48550/arxiv.2405.09828 preprint EN arXiv (Cornell University) 2024-05-16

Abstract Convolution neural networks have been widely used in the field of computer vision, which effectively solve practical problems. However, loss function with fixed parameters will affect training efficiency and even lead to poor prediction accuracy. In particular, when there is a class imbalance data, final result tends favor large‐class. detection recognition problems, large‐class dominate due its quantitative advantage, features few‐class can be not fully learned. order learn...

10.1049/ipr2.12661 article EN cc-by-nc-nd IET Image Processing 2022-10-17

Support vector machine (SVM) is a new general learning machine, which can approximate any function at accuracy. The baseband predistortion method for amplifier studied based on SVM. Simulation shows good linearization results and generalization performance.

10.1109/apmc.2005.1607109 article EN 2006-03-22

10.3724/sp.j.1224.2013.00302 article EN JOURNAL OF ENGINEERING STUDIES 2013-09-01
Coming Soon ...