Suxia Cui

ORCID: 0000-0003-1152-3272
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image and Signal Denoising Methods
  • Experimental Learning in Engineering
  • Advanced Data Compression Techniques
  • Engineering Education and Pedagogy
  • Teaching and Learning Programming
  • Advanced Vision and Imaging
  • Advanced Image Processing Techniques
  • Engineering Education and Curriculum Development
  • Smart Agriculture and AI
  • Network Security and Intrusion Detection
  • Mechatronics Education and Applications
  • Cloud Computing and Resource Management
  • Sparse and Compressive Sensing Techniques
  • Image Enhancement Techniques
  • Advanced Steganography and Watermarking Techniques
  • Advanced Optical Network Technologies
  • IoT and Edge/Fog Computing
  • Advanced Image Fusion Techniques
  • Medical Image Segmentation Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Open Education and E-Learning
  • Smart Grid Security and Resilience
  • Face recognition and analysis
  • Digital Media Forensic Detection

Prairie View A&M University
2015-2024

University of California, San Diego
2024

Washington University in St. Louis
2024

Texas A&M University
2024

University of Houston
2022

Mississippi State University
2003-2020

Beijing Polytechnic
2020

Beijing University of Technology
2020

Institute of Electrical Engineering
2020

Xidian University
2020

Recently, human being’s curiosity has been expanded from the land to sky and sea. Besides sending people explore ocean outer space, robots are designed for some tasks dangerous living creatures. Take exploration an example. There many projects or competitions on design of Autonomous Underwater Vehicle (AUV) which attracted interests. Authors this article have learned necessity platform upgrade a previous AUV project, would like share experience one task extension in area fish detection....

10.1155/2020/3738108 article EN cc-by Applied Computational Intelligence and Soft Computing 2020-01-23

The industrial Internet of things (IIoT) can be regarded as machines, computers, and people enabling intelligent operations using advanced data analytics. It is a network systems, objects, platforms, applications that communicate share intelligence. the biggest most important part overall picture. This paper provides brief introduction to IIoT.

10.7324/ijasre.2017.32538 article EN International Journal of Advances in Scientific Research and Engineering 2017-01-01

Shockwave detection is critical in analyzing shockwave structure and location. High speed video imaging systems are commonly used to obtain image frames during control experiments. Image edge algorithms become natural choices detecting shockwaves. In this paper, a computer software system designed for introduced. Different algorithms, including Roberts, Prewitt, Sobel, Canny, Laplacian of Gaussian, implemented can be chosen by the users easily accurately detect Experimental results show that...

10.4236/jsip.2013.43b019 article EN Journal of Signal and Information Processing 2013-01-01

Unsupervised Machine Learning (ML) is more desirable than supervised ML-based network intrusion detection techniques. Convolutional Neural Network (CNN) performs excellently in tasks related to image processing and computer vision applications as a learning (SL) model, but SL not suitable for zero-day attack (IDS) system. In this work, the power of CNN conjunction with autoencoder (AE) used develop unsupervised machine techniques detect anomalies traffic. Two models are developed: CNN-based...

10.1109/ccwc57344.2023.10099151 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2023-03-08

Multihypothesis motion compensation is extended into the transform domain by using a redundant wavelet to produce multiple predictions that are diverse in phase. The corresponding inverse implicitly combines multihypothesis single spatial-domain prediction for such no side information needed describe combination weights. Additionally, we use hierarchical search tailor motion-vector field individual phases. Substantial gains rate-distortion performance obtained comparison an equivalent system...

10.1109/icip.2003.1246614 article EN 2004-06-03

Hyperspectral Images are a set of narrow spectrum band images used in the recognition and mapping surface materials such as minerals vegetation. Usually these Image datasets high dimensional which makes its classification process complex task low accuracy by using conventional approaches. dimensionality reduction feature have become necessary steps multi-dimensional hyperspectral image processing. This study investigates an effective algorithm for extracting spatial features stationary...

10.1109/icwapr.2014.6961299 article EN International Conference on Wavelet Analysis and Pattern Recognition 2014-07-01

A technique is presented that incorporates an irregular triangle mesh into wavelet-domain motion-estimation and motion-compensation using a shift-invariant redundant wavelet transform. Triangle vertices are identified by simple correlation operator locating image edges in the subbands, while motion compensation takes place through affine transformation mapping triangles from one frame to next. The motion-compensated residual downsampled non-redundant form which then coded any wavelet-based...

10.1109/icip.2002.1038119 article EN Proceedings - International Conference on Image Processing 2003-06-25

A video coder is presented that combines mesh-based motion-compensated temporal filtering, phase-diversity multihypothesis motion compensation, and an embedded 3D wavelet-coefficient coder. The key contribution of this work the introduction paradigm into which achieved by deploying filtering in domain a spatially redundant wavelet transform. regular triangle mesh used to track between frames, affine transform triangles implements compensation within lifting-based Experimental results reveal...

10.1109/icip.2003.1246790 article EN 2004-06-03

Fake faces generated with Generative Adversarial Networks (GANs) are becoming more and realistic getting harder to be identified directly by human beings. However, CNN (Convolutional Neural network) based deep learning architecture can achieve almost perfect detection accuracy on such fake faces. In this paper we present a study of face the exploration global texture features empirical knowledge that textures quite different from those real A new architecture, LBP (Local Binary Pattern)-Net,...

10.1109/icip42928.2021.9506460 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2021-08-23

An anomaly-based intrusion detection system (IDS) is considered an effective mechanism for detecting distributed denial of service (DDoS) attack, but the performance depends on good datasets used training. There are synthetic or simulation-based available with various limitations. To overcome limitations existing datasets, a realistic DDoS dataset developed in this work using Spirent's CyberFlood-CF20 emulator. Attack traffic generated by CF20 and captured feature extraction labeling....

10.1109/icce50685.2021.9427660 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2021-01-10

Engineering programs suffer a high attrition rate, which causes the nation to graduate much less engineers. A survey of literature reveals that rate is due mainly fact first year an engineering program all fundamental theory and students don't see connection their future careers. To address this problem, educators in Roy G. Perry College at Prairie View A&M University launched five-week summer camp entitled “College Enhancement Institute (CE2I)” aimed improving performance incoming...

10.19030/ajee.v2i2.6636 article EN American Journal of Engineering Education (AJEE) 2011-11-23

Cybersecurity is a critical issue in today's internet world. Classical security systems, such as firewalls based on signature detection, cannot detect sophisticated zero-day attacks. Machine learning (ML) solutions are more attractive for their capabilities of detecting anomaly traffic from benign traffic, but to develop an ML-based detection system, we need meaningful or realistic network datasets train the engine. There many public ML applications. Still, they have limitations, data...

10.3390/s23198174 article EN cc-by Sensors 2023-09-29

Multihypothesis with phase diversity is introduced into motion-compensated temporal filtering by deploying the latter in domain of a spatially redundant wavelet transform. The centerpiece this redundant-wavelet approach to multihypothesis multiple-phase inverse transform that involves an implicit projection significantly reducing noise not captured motion model filtering. primary contribution work derivation establishes analytically advantage as compared equivalent taking place spatial...

10.1109/tcsvt.2005.861940 article EN IEEE Transactions on Circuits and Systems for Video Technology 2006-02-01

This paper introduces a laser scanner based measurement system for measuring crop/tree geometric characteristics. The system, which is mounted on Unmanned Ground Vehicle (UGV), contains SICK LMS511 PRO scanner, GPS, and computer. scans objects within distance up to 80 meters with scanning frequency of 25 100Hz an angular resolution 0.1667° 1°. With Ethernet connection, this can output the measured values in real time. UGV WIFI remotely controlled agricultural robotics system. During field...

10.1117/12.2042341 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2013-09-19

Computation is an integral part of a larger revolution that will affect how science conducted. Computational biology important emerging field which uniquely enabled by computation. It involves using computers to model biological problems and interpret data, especially in evolutionary molecular biology. The application computational tools all areas producing excitements insights into too complex for conventional approaches. This paper provides brief introduction on

10.23956/ijarcsse.v8i6.616 article EN International Journal of Advanced Research in Computer Science and Software Engineering 2018-06-30

Multihypothesis motion compensation has been widely used in video coding with previous attention focused on techniques employing predictions that are diverse spatially or temporally. In this paper, the multihypothesis concept is extended into transform domain by using a redundant wavelet to produce multiple phase. The corresponding multiple-phase inverse implicitly combines phase-diverse single spatial-domain prediction for compensation. performance advantage of...

10.1109/tip.2006.877506 article EN IEEE Transactions on Image Processing 2006-09-21
Coming Soon ...