Xingming Wang

ORCID: 0009-0004-1301-7597
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Speech and Audio Processing
  • Speech Recognition and Synthesis
  • Mobile Ad Hoc Networks
  • Music and Audio Processing
  • Education and Work Dynamics
  • Higher Education and Teaching Methods
  • Ideological and Political Education
  • Energy Efficient Wireless Sensor Networks
  • Digital Media Forensic Detection
  • Voice and Speech Disorders
  • Cryptographic Implementations and Security
  • Opportunistic and Delay-Tolerant Networks
  • Security in Wireless Sensor Networks
  • Advanced Authentication Protocols Security
  • Educational Technology and Pedagogy
  • Composite Material Mechanics
  • Advanced Numerical Methods in Computational Mathematics
  • Scheduling and Timetabling Solutions
  • Advanced Computational Techniques and Applications
  • Coal and Its By-products
  • Advanced Wireless Communication Techniques
  • Service-Oriented Architecture and Web Services
  • Advanced Mathematical Modeling in Engineering
  • Advanced Wireless Network Optimization
  • Chaos-based Image/Signal Encryption

Duke Kunshan University
2022-2023

Cytoskeleton (United States)
2023

Institute for Forecasting of the Slovak Academy of Sciences
2023

Wuhan University
2007-2022

Anhui University of Science and Technology
2020

Jeonbuk National University
2010

Daqing Normal University
2009

University of Chinese Academy of Sciences
2009

Beihang University
2008

Anhui Agricultural University
2007

Wireless local area networks are presently widely deployed so that different stations can potentially associate with an access point (AP). The AP selection strategy is one of the significant research areas for wireless networks. solves relevant problem which be selected and associated a station efficient resource utilization obtained. Rather than merely choosing strongest received signal strength, however, we calculate effective throughput each neighboring use result as basis selection....

10.1109/cyberc.2010.20 article EN 2010-10-01

This paper describes our DKU-OPPO system for the 2022 Spoofing-Aware Speaker Verification (SASV) Challenge.First, we split joint task into speaker verification (SV) and spoofing countermeasure (CM), these two tasks which are optimized separately.For ASV systems, four state-of-the-art methods employed.For CM propose on top of challenge baseline to further improve performance, namely Embedding Random Sampling Augmentation (ERSA) One-Class Confusion Loss(OCCL).Second, also explore whether SV...

10.21437/interspeech.2022-11190 article EN Interspeech 2022 2022-09-16

10.1007/s10409-008-0215-5 article EN Acta Mechanica Sinica 2008-12-05

Despite the great performance of language identification (LID), there is a lack large-scale singing LID databases to support research (SLID). This paper proposed over 3200 hours dataset used for identification, called Slingua. As baseline, we explore two self-supervised learning (SSL) models, WavLM and Wav2vec2, as feature extractors both SLID universal speech (ULID), compared with traditional handcraft feature. Moreover, by training corpus, compare difference identification. The final...

10.1109/icassp49357.2023.10095116 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

In popular symmetric ciphers, S-box substitution is the core operation that dominates executions of cryptographic algorithms. this paper, a method application-specific instruction-set extension used for accelerating key in cryptography. Two instructions access are designed by constructing novel flexible on-chip parallel box unit consists multiple lookup tables and post-processing module. The integrated into 32-bit configurable Leon2 processor. Configuration presented. Implementing extended...

10.1109/ebiss.2009.5137980 article EN 2009-05-01

Recent anti-spoofing systems focus on spoofing detection, where the task is only to determine whether test audio fake. However, there are few studies putting attention identifying methods of generating fake speech. Common attack algorithms in logical access (LA) scenario, such as voice conversion and speech synthesis, can be divided into several stages: input processing, conversion, waveform generation, etc. In this work, we propose a system for classifying different attributes, representing...

10.23919/apsipaasc55919.2022.9980129 article EN 2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2022-11-07

A reliable voice anti-spoofing countermeasure system needs to robustly protect automatic speaker verification (ASV) systems in various kinds of spoofing scenarios. However, the performance could be degraded by channel effects and codecs. In this paper, we show that using low-frequency subbands signals as input can mitigate negative impact introduced codecs on systems. To validate this, two types low-pass filters with different cut-off frequencies are applied systems, equal error rate (EER)...

10.1109/iscslp57327.2022.10038240 article EN 2022 13th International Symposium on Chinese Spoken Language Processing (ISCSLP) 2022-12-11

Current research in synthesized speech detection primarily focuses on the generalization of systems to unknown spoofing methods noise-free speech. However, performance anti-spoofing countermeasures (CM) system is often don't work as well more challenging scenarios, such those involving noise and reverberation. To address problem enhancing robustness CM systems, we propose a transfer learning-based enhancement front-end joint optimization (TL-SEJ) method, investigating its effectiveness...

10.48550/arxiv.2407.20111 preprint EN arXiv (Cornell University) 2024-07-29

Recently, much attention is drawn for integrating MANET with Internet in order to extend network coverage and applications domain of ad hoc networks. In this paper, we propose a modified Dynamic Sequence Routing method providing route between through gateway. the proposed scheme introduce flag field packet differentiate whether destined or Internet. The gateway provides address translation functionality by maintaining table mapping local global addresses. verify performance our system have...

10.1109/cyberc.2010.44 article EN 2010-10-01

This paper describes a new tree-based routing method which can be used to connect heterogeneous networks. In the proposed method, source node located in one network sends packets group of nodes another network. our scenario, normally belongs mobile ad hoc network, while consists sensor specified geographical region. The packet destination order aggregate data. Our protocol attains energy efficiency and accuracy by incorporating metric for constructing tree according routes. is calculated...

10.1109/cyberc.2010.67 article EN 2010-10-01

Recent anti-spoofing systems focus on spoofing detection, where the task is only to determine whether test audio fake. However, there are few studies putting attention identifying methods of generating fake speech. Common attack algorithms in logical access (LA) scenario, such as voice conversion and speech synthesis, can be divided into several stages: input processing, conversion, waveform generation, etc. In this work, we propose a system for classifying different attributes, representing...

10.48550/arxiv.2212.08601 preprint EN other-oa arXiv (Cornell University) 2022-01-01

poster Share on Why and How to Teach Machine Learning in High School –A Practice Bejing National Day China Authors: Zijie Zheng Department of Math, Beijing School, 0009-0003-8979-028XSearch about this author , Siyao Han Computer Science, 0009-0007-2235-3930Search Weiqi Zhang 0009-0002-5665-8189Search Xingming Wang 0009-0004-1301-7597Search Chao Gong Tsinghua University, 0000-0003-1160-0565Search Authors Info & Claims ACM TURC '23: Proceedings the Turing Award Celebration Conference -...

10.1145/3603165.3607412 article EN 2023-07-28

Due to the resource limitations of sensor nodes, providing security protocols is a particular challenge in networks. A popular proposed method neighborhood based key agreement protocol (NEKAP), which an improvement over well-known Localized Encryption and Authentication Protocol (LEAP). NEKAP efficient light-weight protocol, but includes loopholes through adversaries may launch replay attack by successfully masquerading as legitimate nodes thereby compromise communications network. In this...

10.1109/cyberc.2010.22 article EN 2010-10-01

In recent years, the combination of case-based reasoning (CBR) and domain knowledge has become a hotspot in CBR field. Different representation ways bring about different influences system performance. This paper makes summarization an analysis deficiencies integration between traditional CBR, based on which it proposes scalable case model using description logic (DL). Moreover, corresponding retrieval algorithm is also presented. The mainly serves for revision. Furthermore, usage...

10.1109/kam.2009.224 article EN 2009-01-01

Wireless mesh networks (WMNs) are drawing attention for commercial applications. Service should be uninterrupted when roaming from one domain to another, security maintained, and billing accurate. However, conventional authentication methods have drawbacks such as coordination between the home foreign domains connectivity them. In this paper, we first present a re-authentication method which enables mobile node authenticated by may not directly connected domain. Even though current does...

10.1109/cyberc.2010.55 article EN 2010-10-01
Coming Soon ...