Xiaopeng Yan

ORCID: 0000-0003-1399-465X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Chaos control and synchronization
  • Mathematical Dynamics and Fractals
  • Image and Signal Denoising Methods
  • Domain Adaptation and Few-Shot Learning
  • Advanced Algorithms and Applications
  • Advanced Image and Video Retrieval Techniques
  • Multimodal Machine Learning Applications
  • Image and Video Stabilization
  • Generative Adversarial Networks and Image Synthesis
  • Adversarial Robustness in Machine Learning
  • Black Holes and Theoretical Physics
  • Mobile Agent-Based Network Management
  • stochastic dynamics and bifurcation
  • Topic Modeling
  • Geophysical Methods and Applications
  • Remote Sensing and Land Use
  • Natural Language Processing Techniques
  • Galaxies: Formation, Evolution, Phenomena
  • Digital Media Forensic Detection
  • Cosmology and Gravitation Theories
  • Advanced Neural Network Applications
  • Synthetic Aperture Radar (SAR) Applications and Techniques

Dalian Maritime University
2018-2025

Group Sense (China)
2020

Sun Yat-sen University
2019

Shaanxi Normal University
2018

Beijing Institute of Technology
2008-2014

Jiangnan University
2012

Resembling the rapid learning capability of human, low-shot empowers vision systems to understand new concepts by training with few samples. Leading approaches derived from meta-learning on images a single visual object. Obfuscated complex background and multiple objects in one image, they are hard promote research object detection/segmentation. In this work, we present aflexible general methodology achieve these tasks. Our work extends Faster /Mask R-CNN proposing over RoI...

10.1109/iccv.2019.00967 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2019-10-01

Chaotic image encryption is widely used in the field of information security. This paper proposes a novel chaotic method with spiral-transform-based fractal sorting matrix (STFSM). First all, theory STFSM good scrambling effect introduced, which has irregularity and iterative. Then, iterative algorithm calculation example are introduced. can be as map spatial location transformations to implement design encryption. Based on complete algorithm, cryptosystem based proposed achieve process. To...

10.1109/tcsi.2022.3172116 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2022-05-17

To further enhance the security of image encryption, a new chaos-based encryption algorithm (IEA) based on discrete Fourier transform and Joseph traversal is proposed to encrypt plain in both frequency domain space simultaneously. In IEA, logistic map used generate appropriate chaotic sequence, improved scramble different starting positions variable step sizes. Then, block diffusion performed at end. The main finding concerning IEA that combination can information, which has been validated...

10.3390/math12050638 article EN cc-by Mathematics 2024-02-21

Abstract In order to prevent the remote-controlled lookout images of intelligent ships from being maliciously stolen or tampered with, and ensure navigation operation safety, this paper proposes an image encryption scheme based on ship-shore information transmission. The proposed introduces Sine Embedded Dynamic Random Coupled Map Lattice (SEDRCML), which replaces static coupling coefficients e with a one-dimensional sine chaotic mapping. This modification enhances system by exhibiting...

10.1088/1402-4896/adbac1 article EN Physica Scripta 2025-02-26

As is well known, in mathematics, any function could be approximated by the Padé approximant. The approximant best approximation of a rational given order. In fact, often gives better than truncating its Taylor series, and it may still work where series does not converge. present work, we consider two issues. First, obtain analytical luminosity distance for flat XCDM model, find that relative error fairly small. Second, propose several parameterizations equation-of-state parameter (EoS) dark...

10.1088/1475-7516/2014/01/045 article EN Journal of Cosmology and Astroparticle Physics 2014-01-29

Chaotic theory is commonly being researched for application in image encryption scheme (IES). In this paper, a novel two-dimensional cross hyperchaotic Sine-modulation-Logistic map (2D-CHSLM) based on the famous Sine and Logistic maps. The behaviors of 2D-CHSLM testified with help their bifurcation diagrams, trajectory plots, Lyapunov exponents, sample entropy, C0 complexity, permutation entropy 0-1 test. A new bit-level IES traditional structure proposed utilizing 2D-CHSLM. 2D-CHSLM-IES...

10.20944/preprints202402.0205.v1 preprint EN 2024-02-05

Abstract A new chaotic image encryption scheme based on fractional order wavelet decomposition is proposed in this paper. Initially, the undergoes a three-stage fractional-order decomposition, resulting high-frequency and low-frequency components. High-frequency components are dislocated using system, while employing matrix model. Subsequently, scrambled quantum encoding followed by Arnold transform to yield final result. Ultimately, process involves iteratively acquiring M4 key diffusing...

10.1088/1402-4896/ad368b article EN Physica Scripta 2024-03-21

We present a new cosine chaotic mapping proved by chaos theory test and analysis such that the system has good cryptography properties, wide range, simple structure, sensitivity to initial value, can meet needs of image encryption. Based on system, we propose encryption method. First, according cyclic characteristics mapping, information wave is simulated. Second, quasi-Doppler effect used synchronously scramble diffuse obfuscate original pixel. Finally, XOR diffusion pixels carried out...

10.1088/1674-1056/ac5a43 article EN Chinese Physics B 2022-03-03

Webly supervised learning becomes attractive recently for its efficiency in data expansion without expensive human labeling. However, adopting search queries or hashtags as web labels of images training brings massive noise that degrades the performance DNNs. Especially, due to semantic confusion query words, retrieved by one may contain tremendous belonging other concepts. For example, searching `tiger cat' on Flickr will return a dominating number tiger rather than cat images. These...

10.1145/3394171.3413952 article EN Proceedings of the 30th ACM International Conference on Multimedia 2020-10-12

In order to deal with the security of image information, this paper proposes a chaotic encryption method based on fractional wavelet transform. First, transform is applied preprocess as signal. After three-level decomposition, high-frequency components are obtained low frequency components. Second, hash function used generate initial value system for plaintext operation, and brought into Lorenz obtain sequence, sequence scrambled high components, 3D cyclic displacement scrambling performed...

10.1109/access.2020.3038183 article EN cc-by IEEE Access 2020-01-01

The signal singularity of radio fuze reflects it be affected by surroundings. Since typical Fourier Transform Algorithm is difficult to detect the position and its distribution, a more accurate oriented method has been presented based on Wavelet Algorithm. Simulation experiment for jamming identification conducted under this method. It showed that technology can identify effectively realize localization fuze. By way, anti-interference capability improved sharply.

10.1109/wicom.2008.423 article EN 2008-10-01

A broad range of cross-$m$-domain generation researches boil down to matching a joint distribution by deep generative models (DGMs). Hitherto algorithms excel in pairwise domains while as $m$ increases, remain struggling scale themselves fit distribution. In this paper, we propose domain-scalable DGM, i.e., MMI-ALI for $m$-domain matching. As an ensemble model ALIs \cite{dumoulin2016adversarially}, is adversarially trained with maximizing Multivariate Mutual Information (MMI) w.r.t....

10.48550/arxiv.1907.03426 preprint EN other-oa arXiv (Cornell University) 2019-01-01

In order to help students deepen the understanding of synthetic aperture radar (SAR) image processing algorithms, a SAR experiment platform based on C# language is developed.Through this kind simulation platform, can be visualized and choose different algorithms enable vividly understand algorithm differences parameter adjustment corresponding effects, so as better algorithms.Then, requirement analysis, summary design detailed are carried out, then system coded implemented by Visual...

10.2991/mess-18.2018.32 article EN cc-by-nc 2018-01-01
Coming Soon ...