Jialiang Peng

ORCID: 0000-0003-3781-5513
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Smart Agriculture and AI
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Face and Expression Recognition
  • Blockchain Technology Applications and Security
  • Face recognition and analysis
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Plant Disease Management Techniques
  • Forensic Fingerprint Detection Methods
  • Traffic Prediction and Management Techniques
  • Adversarial Robustness in Machine Learning
  • Network Security and Intrusion Detection
  • Advanced Neural Network Applications
  • Traffic control and management
  • UAV Applications and Optimization
  • Leaf Properties and Growth Measurement
  • Complexity and Algorithms in Graphs
  • Advanced Chemical Sensor Technologies
  • Caching and Content Delivery
  • Dermatoglyphics and Human Traits

Heilongjiang University of Science and Technology
2019-2024

Heilongjiang University
2012-2024

Hunan Agricultural University
2023-2024

Guangzhou University
2024

State Key Laboratory of Cryptology
2022

Beijing University of Technology
2022

Norwegian University of Science and Technology
2017

Harbin Institute of Technology
2012-2016

Harbin University of Science and Technology
2016

Zhejiang University
2014

This generation faces existential threats because of the global assault novel Corona virus 2019 (i.e., COVID-19). With more than thirteen million infected and nearly 600000 fatalities in 188 countries/regions, COVID-19 is worst calamity since World War II. These misfortunes are traced to various reasons, including late detection latent or asymptomatic carriers, migration, inadequate isolation people. makes detection, containment, mitigation priorities contain exposure via quarantine,...

10.3390/v12070769 article EN cc-by Viruses 2020-07-16

Federated learning (FL) is an emerging technology for empowering various applications that generate large amounts of data in intelligent cyber–physical systems (ICPS). Though FL can address users' concerns about privacy, its maintenance still depends on efficient incentive mechanisms. For long-term incentivization to participants federation under dynamic environments, deep reinforcement as a promising has been extensively studied. However, the nonstationary problem caused by heterogeneity...

10.1109/jiot.2021.3081626 article EN IEEE Internet of Things Journal 2021-05-18

In this paper, a novel method to verify the infrared finger-vein patterns is proposed for biometric purposes. Firstly, we select parameters Gabor filter with eight orientations exploit network, then extract vein by fusion of two distinct orientation results. Secondly, utilize SIFT features offset effect images rotation and shift impact during verification. Finally, number matching between registered test finger calculated as similarity measurement personal identification. The experiment...

10.1109/iih-msp.2012.17 article EN 2012-07-01

Generative Adversarial Network (GAN) and its variants serve as a perfect representation of the data generation model, providing researchers with large amount high-quality generated data. They illustrate promising direction for research limited availability. When GAN learns semantic-rich distribution from dataset, density tends to concentrate on training Due gradient parameters deep neural network contain samples, they can easily remember samples. is applied private or sensitive data,...

10.1109/icpads47876.2019.00150 preprint EN 2019-12-01

In the explosive growth of time-series data (TSD), scale TSD suggests that and capability many Internet Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in due to correlation between information acquired via different sources. this article, we propose a cohort dominant set selection algorithms for electricity consumption with focus on discriminating is small but capable representing kernel carried by an arbitrarily error rate less than <inline-formula...

10.1109/jiot.2019.2946753 article EN IEEE Internet of Things Journal 2019-10-10

Federated learning (FL) has recently been proposed as an emerging paradigm to build machine models using distributed training datasets that are locally stored and maintained on different devices in 5G networks while providing privacy preservation for participants. In FL, the central aggregator accumulates local updates uploaded by participants update a global model. However, there two critical security threats: poisoning membership inference attacks. These attacks may be carried out...

10.1109/mwc.01.1900525 article EN IEEE Wireless Communications 2020-08-01

Federated Edge Learning (FEL) allows edge nodes to train a global deep learning model collaboratively for computing in the Industrial Internet of Things (IIoT), which significantly promotes development 4.0. However, FEL faces two critical challenges: communication overhead and data privacy. suffers from expensive when training large-scale multi-node models. Furthermore, due vulnerability gradient leakage label-flipping attacks, process is easily compromised by adversaries. To address these...

10.1145/3453169 article EN ACM Transactions on Internet Technology 2021-12-06

In the era of Industry 4.0, Industrial Internet Things (IIoT) has been applied to help physical entities access real-time data in network and share critical information. However, both decentralization IIoT heterogeneity different devices constituting also pose a serious threat secure communication between entities. Although encryption technologies can ensure confidentiality data, security key becomes more important for IIoT. Recently, some asymmetric group agreement (AGKA) protocols have...

10.1109/tii.2022.3176048 article EN IEEE Transactions on Industrial Informatics 2022-05-20

Tomatoes are a crop of significant economic importance, and disease during growth poses substantial threat to yield quality. In this paper, we propose IBSA_Net, tomato leaf recognition network that employs transfer learning small sample data, while introducing the Shuffle Attention mechanism enhance feature representation. The model is optimized by employing IBMax module increase receptive field adding HardSwish function ConvBN layer improve stability speed. To address challenge poor...

10.3390/app13074348 article EN cc-by Applied Sciences 2023-03-29

Empowered by promising artificial intelligence, the traditional Internet of Things is evolving into Artificial Intelligence (AIoT), which an important enabling technology for Industry 4.0. Collaborative learning a key AIoT to build machine (ML) models on distributed datasets. However, there are two critical concerns collaborative AIoT: privacy leakage sensitive data and dishonest computation. Specifically, contains information users, cannot be openly shared model learning. Furthermore,...

10.1109/mwc.003.2100598 article EN IEEE Wireless Communications 2022-06-01

In this study, computer vision applicable to traditional agriculture was used achieve accurate identification of rice leaf diseases with complex backgrounds. The researchers developed the RiceDRA-Net deep residual network model and it identify four different diseases. disease test set a background named CBG-Dataset, new single constructed, SBG-Dataset, based on original dataset. Res-Attention module 3 × convolutional kernels denser connections compared other attention mechanisms reduce...

10.3390/app13084928 article EN cc-by Applied Sciences 2023-04-14

Based on the current research wine grape variety recognition task, it has been found that traditional deep learning models relying only a single feature (e.g., fruit or leaf) for classification can face great challenges, especially when there is high degree of similarity between varieties. In order to effectively distinguish these similar varieties, this study proposes multisource information fusion method, which centered SynthDiscrim algorithm, aiming achieve more comprehensive and accurate...

10.3390/s24092953 article EN cc-by Sensors 2024-05-06

Transient stability assessment (TSA) plays an important role to ensure the safe operation of power system in Internet Energy (IoE). Many time-domain simulation (TDS)-based and transient energy function (TEF)-based methods have been proposed assess system. With wide area measurement (WAMS) phasor measure units (PMUs) applied observe real-time data, TSA based on machine learning data-driven are continuously studied. These kinds can only when subjected large disturbances. However, these cannot...

10.1109/jiot.2021.3127895 article EN IEEE Internet of Things Journal 2021-11-15

Revealing the in-depth structure–property relationship and designing specific capacity electrodes are particularly important for supercapacitors. Despite many efforts made to tune composition electronic structure of cobalt oxide pseudocapacitance, insight into [CoO]6 octahedron from microstructure is still insufficient. Herein, we present a tunable in LiCoO2 by chemical delithiation process. The c-strained strain induced form higher valence Co ions, (003) crystalline layer spacing increases...

10.1021/acs.nanolett.3c04434 article EN Nano Letters 2024-01-22

Currently there are fewer depth models applied to pepper picking detection, while the existing generalized neural networks have problems such as large model parameters, long training time, and low accuracy.In order solve above problems, this paper proposes a Yolo-chili target detection algorithm for chili detection. First, classical yolov5 is used benchmark model, an adaptive spatial feature pyramid structure combining attention mechanism idea of multi-scale prediction introduced improve...

10.20944/preprints202404.1916.v1 preprint EN 2024-04-29

In this paper, a new finger vein recognition method based on Gabor wavelet and Local Binary Pattern (GLBP) is proposed. the scheme, magnitude operator are combined, so feature vector has excellent stability. We introduce Block-based Linear Discriminant Analysis (BLDA) to reduce dimensionality of GLBP enhance its discriminability at same time. The results an experiment show that proposed approach performance compared other competitive approaches in current literatures.

10.1587/transinf.e96.d.1886 article EN IEICE Transactions on Information and Systems 2013-01-01
Coming Soon ...