Ming Liu

ORCID: 0009-0001-9684-0009
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Speech Recognition and Synthesis
  • Advanced Computational Techniques and Applications
  • Music and Audio Processing
  • Text and Document Classification Technologies
  • Imbalanced Data Classification Techniques
  • Network Security and Intrusion Detection
  • Speech and Audio Processing
  • Anomaly Detection Techniques and Applications
  • Web Data Mining and Analysis
  • Advanced Decision-Making Techniques
  • Remote-Sensing Image Classification
  • Advanced SAR Imaging Techniques
  • Advanced Malware Detection Techniques
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • Neural Networks and Applications
  • Rough Sets and Fuzzy Logic
  • EEG and Brain-Computer Interfaces
  • Electricity Theft Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Semiconductor materials and devices
  • Data Mining Algorithms and Applications
  • Advanced Algorithms and Applications
  • Advanced Clustering Algorithms Research
  • Network Packet Processing and Optimization
  • Ferrocene Chemistry and Applications

Minzu University of China
2024

National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2021-2024

Ministry of Education of the People's Republic of China
2024

Beijing Institute of Technology
2023

National University of Defense Technology
2022

Guilin University of Technology
2020-2022

Jilin Jianzhu University
2022

Tianjin Normal University
2021

Central China Normal University
2021

University of Washington
2020

Abstract Optimization of images with bad compositions has attracted increasing attention in recent years. Previous methods however seldomly consider image similarity when improving composition aesthetics. This may lead to significant content changes or bring large distortions, resulting an unpleasant user experience. In this paper, we present a new algorithm for aesthetics, while retaining faithful, as much possible, the original content. Our method computes improved using unified model...

10.1111/j.1467-8659.2012.03212.x article EN Computer Graphics Forum 2012-09-01

The proton-induced degradation for InP/InGaAs heterojunction bipolar transistors (HBTs) is studied based on the calculation in energy range from displacement damage threshold to 100 MeV with analytical model of nonionizing loss (NIEL). experiments 3 and 10 proton radiation HBTs have been performed, which significant current gain predominant. increase base due increased recombination responsible noticeable degradation. Qualitative comparison NIEL results coefficients made good correlation found.

10.1109/tns.2015.2416729 article EN IEEE Transactions on Nuclear Science 2015-05-08

Presently, sentence-level researches are very significant in fields like natural language processing, information retrieval, machine translation etc. In this paper we present a practical task on sentence classification. The main purpose of work is to classify the abstract sentences scientific papers corpus built by ourselves into four categories- background, goal, method and result- which differ from each other common usage, so that can do further such as frequent pattern mining, extraction...

10.5539/cis.v6n4p125 article EN cc-by Computer and Information Science 2013-09-30

Fraud detection is an increasingly important and difficult task in the modern technological environment. Existing classification methods for fraud are based on call behavior attributes, such as duration frequency of callings. With evolution mode, self-attributes cannot detect fraudsters who camouflage themselves by behaving like normal accounts. So we propose Attention-based Graph Representation learning Model(AGRM), which takes into account node's its context information. In our model,...

10.1109/icc.2019.8761665 article EN 2019-05-01

Far-field speech recognition is a challenging task that conventionally uses signal processing beamforming to attack noise and interference problem. But the performance has been found usually limited due heavy reliance on environmental assumption. In this paper, we propose unified multichannel far-field system combines neural transformer-based Listen, Spell, Attend (LAS) system, which extends end-to-end further include enhancement. Such framework then jointly trained optimize final objective...

10.48550/arxiv.2401.02673 preprint EN other-oa arXiv (Cornell University) 2024-01-01

Triplet Markov fields (TMF) model is suitable for dealing with multi-class segmentation of non-stationary synthetic aperture radar (SAR) images. In this study, an algorithm using TMF edge location fast unsupervised SAR images proposed. The new can locate accurately reasonable computational cost. First the statistical characteristics multiplicative speckle noise in image, strength based on ratio exponentially weighted averages operator introduced into Turbopixels to obtain a superpixel graph...

10.1049/iet-ipr.2011.0198 article EN IET Image Processing 2012-10-12

By combining audio and visual modalities, the speech recognition systems achieve higher performance robustness. The fusion strategies to this point are mainly three types: feature level model decision fusion. In paper, we present a novel audio-visual framework, in which joint dimensionality reductional approach is used project features into more compact subspaces. With correlation preserving criteria, representations of projected will be able preserve conveyed original feattre space. At same...

10.1109/icassp.2008.4518640 article EN Proceedings of the ... IEEE International Conference on Acoustics, Speech, and Signal Processing 2008-03-01

Facing a large amount of entities appearing on the web, entity linking has recently become useful. It assigns an from resource to one name mention help users grasp meaning this mention. Unfortunately, many possible can be assigned Apparently, usually co-occurring mentions are related and considered together determine their best assignments. This approach is called collective often conducted based graph. However, traditional methods either consume much time due scale graph or obtain low...

10.1145/3086703 article EN ACM transactions on office information systems 2017-08-31

10.1631/fitee.2000417 article EN Frontiers of Information Technology & Electronic Engineering 2022-02-01

This paper addresses the numerical and statistical stability in integration of inertial navigation system global satellite (GNSS) using Kalman filter (KF). Due to different units used horizontal vertical components geodetic (curvilinear) coordinates vicinity earth’s surface, i.e. radians former meters latter, covariance innovation vector KF, which should be inversed, can ill-conditioned, resulting severe instability. A simple rescaling method is proposed address this problem, specifically,...

10.1177/0954410015591614 article EN Proceedings of the Institution of Mechanical Engineers Part G Journal of Aerospace Engineering 2015-06-24

With the rapid development of Internet Things (IoT), continuous emergence cyberattacks have brought great threat to security network. Intrusion Detection System (IDS) which can identify malicious network attacks has become a strong tool ensure security. Many deep learning-based approaches been used in IDS. However, most these researches ignore internal structural characteristics traffic, and cannot accurately learn key features traffic. Thus, they low accuracy classifying different kinds...

10.1109/iwcmc51323.2021.9498652 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2021-06-28

Traditional publish/subscribe systems suffer from either the limited expressiveness of events or complexity matching algorithms. Moreover, most them do not consider semantic information events. This study proposes a fuzzy with reasoning system, which employs ontology to model and subscriptions. The elaborate two main components in system: 1) Offline part domain defines concepts relationships between them, extra knowledge is supplement for ontology. 2) Online shows details published events,...

10.1109/iccece54139.2022.9712661 article EN 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE) 2022-01-14

10.1016/j.theochem.2004.08.044 article EN Journal of Molecular Structure THEOCHEM 2004-11-01

With the development and popularization of highspeed network technology, Intrusion Detection System need to process more data. In most cases, only a small part data which be processed is abnormal The will overwhelmed by normal A large number occupy resources IDS lead lot false alarms. These all bring troubles for Response administrators. this paper, we present method based on semi-supervised learning massive in high-speed network. We add some representative labeled unlabeled dataset, let...

10.1049/cp.2010.0618 article EN 2010-01-01

10.1109/jstars.2024.3452680 article EN cc-by-nc-nd IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2024-01-01

Along with explosion of information, how to cluster large-scale documents has become more and important. This paper proposes a novel document clustering algorithm (CLCL) solve this problem. first constructs lexical chains from feature space reflect different topics which input contain, also can be separated into clusters by these chains. However, separation is too rough. So, idea self organizing mapping used optimize partition. For agglomerating semantic similarities one cluster, influences...

10.5539/cis.v3n1p91 article EN cc-by Computer and Information Science 2010-01-19
Coming Soon ...