Jiamin Zheng

ORCID: 0009-0004-8159-7810
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Gear and Bearing Dynamics Analysis
  • User Authentication and Security Systems
  • Magnetic Bearings and Levitation Dynamics
  • Cryptography and Data Security
  • Digital and Cyber Forensics
  • Adversarial Robustness in Machine Learning
  • Robotics and Sensor-Based Localization
  • Geophysical Methods and Applications
  • Tribology and Lubrication Engineering
  • Bacillus and Francisella bacterial research
  • Security in Wireless Sensor Networks
  • Underwater Vehicles and Communication Systems
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Non-Destructive Testing Techniques
  • Error Correcting Code Techniques
  • Engineering Diagnostics and Reliability
  • Advanced Image and Video Retrieval Techniques
  • Infrastructure Maintenance and Monitoring
  • Advanced machining processes and optimization
  • DNA and Biological Computing
  • Security and Verification in Computing

Beijing Technology and Business University
2021-2025

Southern University of Science and Technology
2023

Beijing Institute of Technology
2017-2018

East China University of Science and Technology
2002-2009

Despite significant advancements in bridge façade defect classification, real-world automated inspections continue to face substantial challenges, including faint visibility, low lighting conditions, overexposure, noise interference, motion blur, and occlusions. These factors, stemming from variable environmental conditions unstable imaging angles, severely degrade model performance. To address this issue, we introduce the Hard Defect Classification Dataset (HDCD), which systematically...

10.3390/electronics14071407 article EN Electronics 2025-03-31

The robustness of adversarial examples to image scaling transformation is usually ignored when most existing attacks are proposed. In contrast, often the first step model transfer various sizes input images into fixed ones. We evaluate impact on applied classification tasks. set up an system provide a basis for evaluation and conduct experiments in different situations explore relationship between examples. Experiment results show that algorithms have similar examples, but ratio...

10.23919/cje.2021.00.309 article EN Chinese Journal of Electronics 2023-01-01

Mobile device forensics is an interdisciplinary field consisting of techniques applied to a wide range computing devices. Android devices are among the most disruptive technologies last years, gaining even more diffusion and success in daily life people categories. became important forensic due rich amount personal information they store. However, tools often used acquire privacy by attackers. This papar presents anti-forensics approach for which protects AES keys from being acquired tools....

10.1109/cse-euc.2017.45 article EN 2017-07-01

In recent years, significant progress has been made in learning-based VSLAM (Visual Simultaneous Localization and Mapping). Cloud-based is a promising solution for meeting the computational demands of methods mobile robot applications. However, existing cloud-based systems face high transmission demands. To address this issue, we propose system, offloading heavy cost reconstructing challenging images to cloud using method leaving light realtime tracking edge model-based method. By combining...

10.1109/tvt.2023.3319489 article EN IEEE Transactions on Vehicular Technology 2023-09-26

In this paper, the dynamic model of rotor bearing system with rub-impact and oil whirl is formulated. Continuation-shooting method for periodic solution nonlinear non-autonomous used to obtain bifurcation stability motion rotor-bearing system. The effect unbalance rotor/stator clearance on are analyzed respectively. results obtained compared those fault.

10.4028/www.scientific.net/msf.626-627.517 article EN Materials science forum 2009-08-01
Coming Soon ...