Qian He

ORCID: 0000-0003-3020-2896
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Generative Adversarial Networks and Image Synthesis
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Peer-to-Peer Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Advanced Malware Detection Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • Web Data Mining and Analysis
  • Cloud Data Security Solutions
  • Advanced MIMO Systems Optimization
  • Anomaly Detection Techniques and Applications
  • Wireless Communication Networks Research
  • Cooperative Communication and Network Coding
  • Cognitive Computing and Networks
  • Service-Oriented Architecture and Web Services
  • Robotics and Automated Systems
  • Image and Video Quality Assessment
  • Computer Graphics and Visualization Techniques
  • Sentiment Analysis and Opinion Mining
  • Advanced Computational Techniques and Applications

Guilin University of Electronic Technology
2016-2025

China Mobile (China)
2024

Wuhan Polytechnic University
2022

China Southern Power Grid (China)
2022

Xichang University
2021

Beijing Jiaotong University
2021

Zhejiang Industry Polytechnic College
2010-2020

Tsinghua University
2019

Institute of Microelectronics
2019

Guangxi University
2017-2019

Blockchain and AI are promising techniques for next-generation wireless networks. can establish a secure decentralized resource sharing environment. be explored to solve problems with uncertain, time-variant, complex features. Both of these have recently seen surge in interest. The integration two further enhance the performance In this article, we first propose intelligent architecture networks by integrating blockchain into enable flexible sharing. Then empowered content caching problem...

10.1109/mnet.2019.1800376 article EN IEEE Network 2019-05-01

Douyin, internationally known as TikTok, has become one of the most successful short-video platforms. To maintain its popularity, Douyin to provide better Quality Experience (QoE) growing user base. Understanding characteristics videos is thus critical service improvement and system design. In this paper, we present an initial study on fundamental based a dataset over 260 thousand short collected across three months. The are found be significantly different from traditional online videos,...

10.1145/3321408.3323082 article EN Proceedings of the ACM Turing Celebration Conference - China 2019-05-17

Generating a new font library is very labor-intensive and time-consuming job for glyph-rich scripts. Few-shot generation thus required, as it requires only few glyph references without fine-tuning during test. Existing methods follow the style-content disentanglement paradigm expect novel fonts to be produced by combining style codes of reference glyphs content representations source. However, these few-shot either fail capture content-independent representations, or employ localized...

10.1109/cvpr52688.2022.00775 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

Aiming at the problem of privacy leakage during data sharing in Internet Things, a blockchain based secure platform with fine-grained access control(BSDS-FA) is proposed. First, this paper proposes new hierarchical attribute-based encryption algorithm, which uses attribute structure and multi-level authorization center. The algorithm implements flexible control by distributing different user attributes to centers. Then, it combined Fabric technology solve huge decryption cost for users...

10.1109/access.2020.2992649 article EN cc-by IEEE Access 2020-01-01

This paper presents a novel Region-Aware Face Swapping (RAFSwap) network to achieve identity-consistent harmonious high-resolution face generation in local-global manner: 1) Local Facial (FRA) branch augments local identity-relevant features by introducing the Transformer effectively model misaligned crossscale semantic interaction. 2) Global Source Feature-Adaptive (SFA) further complements global cues for generating swapped faces. Besides, we propose Mask Predictor (FMP) module...

10.1109/cvpr52688.2022.00748 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

Training a text-to-image generator in the general domain (e.g., Dall.e, CogView) requires huge amounts of paired text-image data, which is too expensive to collect. In this paper, we propose self-supervised scheme named as CLIP-GEN for generation with language-image priors extracted pre-trained CLIP model. our approach, only require set unlabeled images train generator. Specifically, given an image without text labels, first extract embedding united language-vision space encoder CLIP. Next,...

10.48550/arxiv.2203.00386 preprint EN other-oa arXiv (Cornell University) 2022-01-01

10.1109/tim.2025.3557103 article EN IEEE Transactions on Instrumentation and Measurement 2025-01-01

Conventional yaw stability strategy of distributed drive electric vehicle (DDEV) is usually realised by torque distribution strategy. However, the instantaneous variations four independent tyres slip ratio and effect disturbance have not been considered sufficiently. Therefore, it difficult to realise robustness for DDEV under various operating conditions. To solve this problem, a novel model predictive controller-based compensation control system (MPC-CCS) proposed in paper. The MPC-CCS...

10.1080/00207721.2018.1479005 article EN International Journal of Systems Science 2018-05-30

The interest of artificial intelligence (AI) and mobile edge computing (MEC) has increased in recent years. As a fundamental building block for the development computing, new techniques are needed network. Driven by Internet Things (IoT) AI, MEC, as an emerging paradigm, enables cloud services AI frontier close proximity to users, pushing cache resources from network edge. With continuous in-depth research on intelligent networks, green would be paradigm MEC. is playing more important role...

10.1109/smartiot.2019.00024 article EN 2019-08-01

Set synchronization is an essential job for distributed applications. In many cases, given two sets A and B, applications need to identify those elements that appear in set but not vice versa. Bloom filter, a spaceefficient data structure representing supporting membership queries, has been employed as lightweight method realize with low false positive probability. Unfortunately, bloom filters their variants can only be applied simple rather than more general multisets, which allow multiple...

10.1109/tnet.2016.2618006 article EN IEEE/ACM Transactions on Networking 2016-11-07

10.1007/s12555-018-0694-5 article EN International Journal of Control Automation and Systems 2019-03-13

Due to the increasing growth of technologies and diversity user needs in field information technology, position cloud computing is becoming more apparent. The development infrastructure any organization requires spending a lot money, time, manpower, which sometimes does not fit into operational capacity an organization. Therefore, organizations tend use such advance their goals. A fully open distributed structure its services makes it attractive target for attackers. This includes multiple...

10.3390/su13010101 article EN Sustainability 2020-12-24

Orbital angular momentum (OAM) beams have demonstrated significant potential in the fields of communication, imaging and quantum information science. In particular, active OAM metasurfaces enable flexible on-demand control without altering their structures, significantly enriching applications beams. However, due to limitations electrode wiring unit structure efficiency, most existing metasurface designs are reflective, hindering further development this field. Here, we propose an induced...

10.1364/oe.537765 article EN cc-by Optics Express 2024-09-16

The dramatically growing trend of vehicles equipped with driving camera recorders has allowed realizing real-time crowdsourced video sharing in vehicular edge computing (VEC). Such cameras can assist monitoring objects directly front and behind the vehicles, enabling them to provide important visual information through streaming case possible accidents. Exploiting on-board units (OBUs) for VEC allow drivers passengers share access on-road surveillance services. However, data security privacy...

10.1109/tits.2023.3269058 article EN IEEE Transactions on Intelligent Transportation Systems 2023-05-05

Considering the inevitable trends for heterogeneous network convergence, Cognitive Radio Network (CRN) concept has been proposed with some essential characteristics to achieve adaptation and global end-to-end goals. This motivates a more flexible effective dynamic channel assignment scheme which can utilize licensed spectrum effectively through reusing idle opportunistically. paper focuses on offers optimal resource allocation mechanism satisfy requirement of users networks in transmission....

10.1109/vtcfall.2012.6398951 article EN 2012-09-01

Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized management network. Without adequate access methods, risk unauthorized to network its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which cause severe damage their abnormal behaviour goes undetected privileges not promptly restricted. To...

10.32604/iasc.2023.039989 article EN cc-by Intelligent Automation & Soft Computing 2023-01-01

Recently 3D-aware GAN methods with neural radiance field have developed rapidly. However, current model the whole image as an overall field, which limits partial semantic editability of synthetic results. Since NeRF renders pixel by pixel, it is possible to split in spatial dimension. We propose a Compositional Neural Radiance Field (CNeRF) for portrait synthesis and manipulation. CNeRF divides regions learns independent each region, finally fuses them complete image. Thus we can manipulate...

10.1609/aaai.v37i2.25278 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26
Coming Soon ...