Jiacen Xu

ORCID: 0009-0002-0292-1113
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Radar Systems and Signal Processing
  • Remote Sensing and LiDAR Applications
  • Machine Learning and Data Classification
  • VLSI and FPGA Design Techniques
  • Anomaly Detection Techniques and Applications
  • Indoor and Outdoor Localization Technologies
  • Teaching and Learning Programming
  • Online Learning and Analytics
  • Bacillus and Francisella bacterial research
  • Data Stream Mining Techniques
  • Advanced Malware Detection Techniques
  • Imbalanced Data Classification Techniques
  • Underwater Vehicles and Communication Systems
  • Antenna Design and Optimization
  • VLSI and Analog Circuit Testing
  • Advanced Optical Sensing Technologies
  • Educational Games and Gamification
  • Advanced SAR Imaging Techniques
  • Direction-of-Arrival Estimation Techniques
  • 3D Shape Modeling and Analysis
  • Image and Signal Denoising Methods
  • Power Line Communications and Noise
  • Graph Theory and Algorithms
  • Network Security and Intrusion Detection

University of California, Irvine
2023

Beijing Institute of Technology
2016-2023

Huawei Technologies (China)
2022

UC Irvine Health
2021

Embedded Systems (United States)
2016

Large language models (LLMs) have demonstrated impressive results on natural tasks, and security researchers are beginning to employ them in both offensive defensive systems. In cyber-security, there been multiple research efforts that utilize LLMs focusing the pre-breach stage of attacks like phishing malware generation. However, so far lacks a comprehensive study regarding whether LLM-based systems can be leveraged simulate post-breach typically human-operated, or "hands-on-keyboard"...

10.48550/arxiv.2403.01038 preprint EN arXiv (Cornell University) 2024-03-01

Quantifying the importance of each training point to a learning task is fundamental problem in machine and estimated scores have been leveraged guide range data workflows such as summarization domain adaption. One simple idea use leave-one-out error indicate its importance. Recent work has also proposed Shapley value, it defines unique value distribution scheme that satisfies set appealing properties. However, calculating values often expensive, which limits applicability real-world...

10.1109/cvpr46437.2021.00814 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021-06-01

Pulse Doppler (PD) systems are widely used for moving target detection, especially in scenarios with clutter. Range ambiguity, which arises from fixed parameters waveforms, is an inherent drawback conventional systems. By using a diverse pulse train such as of coherent phase coded pulses, these ambiguous peaks can be suppressed effectively but at the cost sidelobe dispersions. In this work, novel efficient PD process proposed to suppress range ambiguity and detect targets under strong...

10.3390/s18072326 article EN cc-by Sensors 2018-07-18

This paper presents a novel low complexity time-of arrival (TOA) estimation method for unknown intra-pulse modulated signal under SNR condition. The received is firstly pre-processed by delayed conjugate multiplication to reduce the modulation and get rough range of signal. Then correlation accumulation applied achieve precise rising falling edge. Simulations are conducted show feasibility evaluate performance estimation. Compared with existing methods, this can better result.

10.1109/icspcc.2016.7753696 article EN 2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) 2016-08-01

Emerging applications in Printed Circuit Board (PCB) routing impose new challenges on automatic length matching, including adaptability for any-direction traces with their original preserved interactiveness. The can be addressed through two orthogonal stages: assign non-overlapping regions to each trace and meander the within reach target length. In this paper, mainly focusing meandering stage, we propose an obstacle-aware detailed approach optimize utilization of available space achieve...

10.48550/arxiv.2407.19195 preprint EN arXiv (Cornell University) 2024-07-27

Reference placement is promising to handle the increasing complexity in PCB design. We model netlist into a graph and use subgraph matching algorithm find isomorphism of placed template component combination reuse placement. The state-of-the-art VF3 can achieve high accuracy while suffering from computation time large-scale instances. Thus, we propose D2BS guarantee quality efficiency. build filter candidate set (CS) according designed features construct CS structure. In optimization,...

10.1145/3489517.3530670 article EN Proceedings of the 59th ACM/IEEE Design Automation Conference 2022-07-10

A novel low complexity time-of arrival (TOA) estimation method is presented in this paper. This achieves a precise TOA under SNR condition for unknown intra-pulse modulated signal, especially frequency pulse. Firstly, delayed conjugate multiplication employed to reduce the modulation as well estimate rough range of received Then, part, correlation accumulation used by accumulating pre-processed signal with proper gain. Finally, simulation results are given examine estimating performance and...

10.1109/radar.2016.8059545 article EN 2021 CIE International Conference on Radar (Radar) 2016-10-01

Mismatched filter is an important technique to suppress the sidelobes of phase-coded pulses. Here, authors propose a mainlobe windowing procedure, by which much lower sidelobe level can be obtained at slightly signal-to-noise ratio loss. Based on this idea, they present two mismatched design procedures, namely integrated (ISL) optimal and peak (PSL) filter. The ISL formula in closed form PSL optimisation procedures. Simulation results are presented verify theory.

10.1049/joe.2019.0189 article EN cc-by-nc-nd The Journal of Engineering 2019-08-30

The worst-case training principle that minimizes the maximal adversarial loss, also known as (AT), has shown to be a state-of-the-art approach for enhancing robustness. Nevertheless, min-max optimization beyond purpose of AT not been rigorously explored in context. In this paper, we show how general framework over multiple domains can leveraged advance design different types attacks. particular, given set risk sources, minimizing attack loss reformulated problem by introducing domain weights...

10.48550/arxiv.1906.03563 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Although the prevention of AI vulnerabilities is critical to preserve safety and privacy users businesses, educational tools for robust are still underdeveloped worldwide. We present design, implementation, assessment Maestro. Maestro an effective open-source game-based platform that contributes advancement education. provides goal-based scenarios where college students exposed challenging life-inspired assignments in a competitive programming environment. assessed Maestro's influence on...

10.48550/arxiv.2306.08238 preprint EN cc-by-nc-sa arXiv (Cornell University) 2023-01-01

Although the prevention of AI vulnerabilities is critical to preserve safety and privacy users businesses, educational tools for robust are still underdeveloped worldwide. We present design, implementation, assessment Maestro. Maestro an effective open-source game-based platform that contributes advancement education. provides "goal-based scenarios" where college students exposed challenging life-inspired assignments in a "competitive programming" environment. assessed Maestro's influence on...

10.1609/aaai.v37i13.26878 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26

Recent research efforts on 3D point cloud semantic segmentation (PCSS) have achieved outstanding performance by adopting neural networks. However, the robustness of these complex models not been systematically analyzed. Given that PCSS has applied in many safety-critical applications like autonomous driving, it is important to fill this knowledge gap, especially, how are affected under adversarial samples. As such, we present a comparative study robustness. First, formally define attacker's...

10.1109/dsn58367.2023.00056 article EN 2023-06-01

The joint design of mismatched filter and waveform is an important technique in suppressing sidelobes phase coded waveform. Conventionally, implied constraint that the mainlobe response same width as a chip or bit included. In fact, slightly broadened acceptable most cases. More importantly, relaxation will provide more freedom sidelobe suppression. this work, into fixed window shape. Under constraints shape constant modular, optimization problem to minimize integrated level (ISL). solved by...

10.1109/icsip57908.2023.10270925 article EN 2022 7th International Conference on Signal and Image Processing (ICSIP) 2023-07-08

Pulse edge estimation has always been an important issue in the field of electronic reconnaissance. Here, for unknown received pulse with non-uniform envelope, a novel method based on instantaneous frequency is proposed. By using sliding window detection standard deviation segmented signal, rough can be obtained. Then, double threshold smoothed signal segment performed to obtain accurate estimation. Moreover, parameter setting and application this are analysed. The simulation results show...

10.1049/joe.2019.0765 article EN cc-by The Journal of Engineering 2019-10-07

Quantifying the importance of each training point to a learning task is fundamental problem in machine and estimated scores have been leveraged guide range data workflows such as summarization domain adaption. One simple idea use leave-one-out error indicate its importance. Recent work has also proposed Shapley value, it defines unique value distribution scheme that satisfies set appealing properties. However, calculating values often expensive, which limits applicability real-world...

10.48550/arxiv.1911.07128 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Recent research efforts on 3D point cloud semantic segmentation (PCSS) have achieved outstanding performance by adopting neural networks. However, the robustness of these complex models not been systematically analyzed. Given that PCSS has applied in many safety-critical applications like autonomous driving, it is important to fill this knowledge gap, especially, how are affected under adversarial samples. As such, we present a comparative study robustness. First, formally define attacker's...

10.48550/arxiv.2112.05871 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01
Coming Soon ...