Hongxin Zhang

ORCID: 0000-0003-1865-9519
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Antenna Design and Analysis
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Natural Language Processing Techniques
  • Blind Source Separation Techniques
  • Wireless Signal Modulation Classification
  • Topic Modeling
  • Computer Graphics and Visualization Techniques
  • Ultra-Wideband Communications Technology
  • Electromagnetic Compatibility and Noise Suppression
  • Advanced Image and Video Retrieval Techniques
  • EEG and Brain-Computer Interfaces
  • Advanced Antenna and Metasurface Technologies
  • Microwave Engineering and Waveguides
  • Optical Network Technologies
  • Advanced Fiber Laser Technologies
  • Power Line Communications and Noise
  • Millimeter-Wave Propagation and Modeling
  • 3D Shape Modeling and Analysis
  • Advanced Malware Detection Techniques
  • Speech and Audio Processing
  • Data Visualization and Analytics
  • Coding theory and cryptography

Hebei University of Technology
2025

Beijing University of Posts and Telecommunications
2015-2024

Zhejiang University
2014-2024

Northeast Agricultural University
2024

Institute of Automation
2023

Chinese Academy of Sciences
2009-2023

University of Chinese Academy of Sciences
2023

Stanford University
2023

Zhoukou Normal University
2021-2023

Shanghai Jiao Tong University
2022-2023

Recent AI-assistant agents, such as ChatGPT, predominantly rely on supervised fine-tuning (SFT) with human annotations and reinforcement learning from feedback (RLHF) to align the output of large language models (LLMs) intentions, ensuring they are helpful, ethical, reliable. However, this dependence can significantly constrain true potential agents due high cost obtaining supervision related issues quality, reliability, diversity, self-consistency, undesirable biases. To address these...

10.48550/arxiv.2305.03047 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Generating a Chain of Thought (CoT) has been shown to consistently improve large language model (LLM) performance on wide range NLP tasks. However, prior work mainly focused logical reasoning tasks (e.g. arithmetic, commonsense QA); it remains unclear whether improvements hold for more diverse types reasoning, especially in socially situated contexts. Concretely, we perform controlled evaluation zero-shot CoT across two sensitive domains: harmful questions and stereotype benchmarks. We find...

10.18653/v1/2023.acl-long.244 article EN cc-by 2023-01-01

In this paper, we propose a novel shape interpolation approach based on Poisson equation. We formulate the trajectory problem of as solving equations defined domain mesh. A non-linear gradient field method is proposed to take both vertex coordinates and surface orientation into account. With proper boundary conditions, in-between shapes are reconstructed implicitly from interpolated fields, while traditional methods usually manipulate directly. Besides global interpolation, our also...

10.1145/1060244.1060274 article EN 2005-06-13

Wire arc additive manufacturing (WAAM) is a viable technology for complex and medium-to-large-sized invar alloy components. However, the cyclic thermal input during WAAM process may cause austenite grains in component to grow abnormally, adversely impacting material’s mechanical properties. The addition of alloying elements such as Cr, Mo, V can refine microstructure solve these problems. This study examines influence V, N on properties produced through wire manufacturing. form various...

10.3390/app15063351 article EN cc-by Applied Sciences 2025-03-19

Abstract This article is focused on the electromagnetic radiation effects of Silicon Carbide (SiC) Metal-Oxide-Semiconductor Field-Effect Transistors (MOSFETs) under total ionizing dose (TID) effect. A 650V trench-gate SiC MOSFET was selected as experimental subject. The variations in electronic characteristics MOSFETs were explained from perspective crystal defects. Furthermore, an analysis trends device conducted based changes electrical properties devices. broad network model for signals...

10.1088/1748-0221/20/04/p04005 article EN Journal of Instrumentation 2025-04-01

Abstract Background Previous studies have revealed that circadian genes play important roles in cell proliferation, apoptosis, cycle control, DNA damage response and treatment of chemotherapy agents cancers. Aims We hypothesized the polymorphisms may be associated with prognosis hepatocellular carcinoma ( HCC ) patients treated transcatheter arterial chemoembolization TACE ). Methods Twelve functional single nucleotide SNP s) negative feedback regulation (including CRY 1, 2, PER 2 3 were...

10.1111/j.1478-3231.2012.02849.x article EN Liver International 2012-07-19

Cloud computing is an essential technology to Big Data analytics and services. A cloud system often comprised of a large number parallel storage devices. Monitoring the usage performance such important for efficient operations, maintenance, security. Tracing every application on untenable due scale privacy issues. But profile data can be collected relatively efficiently by regularly sampling state system, including properties as CPU load, memory usage, network others, creating set...

10.1109/tvcg.2016.2534558 article EN IEEE Transactions on Visualization and Computer Graphics 2016-02-29

The fiber optical network offers high speed, large bandwidth, and a degree of reliability. However, the development communication technology has hit bottleneck due to several challenges such as energy loss, cost, system capacity approaching Shannon limit. As powerful tool, machine learning provides strong driving force for various industries greatly promotes society. Machine also new possible solution achieve greater transmission capacities longer distances in communications. In this...

10.1109/mnet.011.2000676 article EN IEEE Network 2021-07-01

The increasing popularity of Internet Things (IoT) devices provides a huge data source for intelligent identification. Images captured by the unmanned aerial vehicle (UAV) are often exploited in target detection missions search, rescue and fire prevention. However, without sufficient training samples, machine learning method is usually difficult to meet application requirements. To solve problem, brain–computer interface (BCI) real-time system applied UAV detection. In this study, novel...

10.1109/jiot.2023.3273163 article EN IEEE Internet of Things Journal 2023-05-04

The limits of open-ended generative models are unclear, yet increasingly important. What causes them to succeed and what fail? In this paper, we take a prompt-centric approach analyzing bounding the abilities models. We present generic methodology analysis with two challenging prompt constraint types: structural stylistic. These types categorized into set well-defined constraints that analyzable by single prompt. then systematically create diverse simple, natural, useful prompts robustly...

10.18653/v1/2023.findings-eacl.148 article EN cc-by 2023-01-01

Explicitly sharing individual level data in genomics studies has many merits comparing to summary statistics, including more strict QCs, common statistical analyses, relative identification and improved power GWAS, but it is hampered by privacy or ethical constraints. In this study, we developed encG-reg, a regression approach that can detect relatives of various degrees based on encrypted genomic data, which immune The encryption properties encG-reg are the random matrix theory masking...

10.1371/journal.pgen.1011037 article EN cc-by PLoS Genetics 2024-01-11

10.1016/j.gmod.2006.03.001 article EN Graphical Models 2006-04-19

Abstract For wireless transmission, radio-frequency device anti-cloning has become a major security issue. Radio-frequency distinct native attribute (RF-DNA) fingerprint is developing technology to find the difference among RF devices and identify them. Comparing with previous research, (1) this paper proposed that mean ( μ ) feature should be added into RF-DNA fingerprint. Thus, totally four statistics (mean, standard deviation, skewness, kurtosis) were calculated on instantaneous...

10.1186/s13638-019-1544-8 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-09-18

We propose and experimentally demonstrate single-sideband (SSB) photonic vector millimeter-wave (mm-wave) signal generation enabled by optical dual-SSB modulation a single push-pull Mach-Zehnder modulator (MZM). use software-based digital processing to generate the driving for MZM. The has vector-modulated sideband an unmodulated sideband, which are spaced our desired mm-wave carrier frequency. After linear of MZM, filtering, single-ended photodiode detection, we can get electrical...

10.1364/ol.44.003570 article EN Optics Letters 2019-07-11

Abstract Objective. Asynchronous brain-computer interfaces (BCIs) show significant advantages in many practical application scenarios. Compared with the rapid development of synchronous BCIs technology, progress asynchronous BCI research, terms containing multiple targets and training-free detection, is still relatively slow. In order to improve practicability BCI, a spatio-temporal equalization multi-window algorithm (STE-MW) was proposed for detection steady-state visual evoked potential...

10.1088/1741-2552/ac127f article EN Journal of Neural Engineering 2021-07-08

10.1016/s1005-8885(11)60468-8 article EN The Journal of China Universities of Posts and Telecommunications 2012-06-01

10.1016/s1005-8885(17)60215-2 article EN The Journal of China Universities of Posts and Telecommunications 2017-06-01
Coming Soon ...