Zhentao Zhang

ORCID: 0009-0007-9178-0979
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Decision-Making Techniques
  • Advanced Fiber Optic Sensors
  • Quantum Information and Cryptography
  • IPv6, Mobility, Handover, Networks, Security
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Advanced Sensor and Control Systems
  • Speech Recognition and Synthesis
  • Cryospheric studies and observations
  • Power Systems and Renewable Energy
  • Cloud Data Security Solutions
  • Speech and Audio Processing
  • Cloud Computing and Resource Management
  • Photonic Crystal and Fiber Optics
  • Smart Grid and Power Systems
  • Energy Load and Power Forecasting
  • Geoscience and Mining Technology
  • Image Enhancement Techniques
  • Advanced Algorithms and Applications
  • Advanced Computing and Algorithms
  • Stock Market Forecasting Methods
  • Music and Audio Processing
  • Machine Fault Diagnosis Techniques
  • Energy and Environmental Systems
  • Regional Development and Environment

Jilin University of Chemical Technology
2021-2024

Chongqing Metrology Quality Inspection and Research Institute
2021-2023

Bank of China
2023

Alibaba Group (China)
2023

Fuzhou University
2023

Suzhou Research Institute
2021

Liaocheng University
2020-2021

Technical Institute of Physics and Chemistry
2017

Nanjing University
2014

Changchun University of Technology
2010

Snow removal aims to locate snow areas and recover clean images without repairing traces. Unlike the regularity semitransparency of rain, with various patterns degradations seriously occludes background. As a result, state-of-the-art methods usually retains large parameter size. In this paper, we propose lightweight but high-efficient network called Laplace Mask Query Transformer (LMQFormer). Firstly, present Laplace-VQVAE generate coarse mask as prior knowledge snow. Instead using in...

10.1109/tcsvt.2023.3264824 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-04-05

Geometric quantum manipulation and Landau-Zener interferometry have been separately explored in many systems. In this Letter, we combine these two approaches to study the dynamics of a superconducting phase qubit. We experimentally demonstrate based on pure geometric phases solid-state observe interference caused by accumulated evolution between consecutive transitions, while dynamical is canceled out spin-echo pulse. The full controllability qubit state as function intrinsically robust...

10.1103/physrevlett.112.027001 article EN Physical Review Letters 2014-01-14

Cloud computing has witnessed tremendous growth, prompting enterprises to migrate the cloud for reliable and on-demand computing. Within a single Virtual Private (VPC), number of instances (such as VMs, bare metals, containers) reached millions, posing challenges related supporting millions with network location decoupling from underlying hardware, high elastic performance, reliability. However, academic studies have primarily focused on specific issues like high-speed data plane virtualized...

10.1145/3603269.3604859 article EN 2023-09-01

Spoof speech detection (SSD) can help to protect an automatic speaker recognition system against malicious attacks. However, there exists a great diversity in the spoof utterances generated by different text-to-speech and voice conversion algorithms, resulting poor generality of SSD unseen spoofing To address this problem, we integrate multi-scale feature aggregation (MFA) dynamic convolution operations into anti-spoofing framework detect local global artifacts The proposed mainly contains...

10.1109/icassp48485.2024.10446612 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Third Generation (3G) wireless networks are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G generally more vulnerable than wire-line counterparts, thus making them fertile ground for some new attacks. In this paper, we propose a novel AKA Protocol scheme 3G, which is based on Diffie-Hellman Algorithm. This improves transmission security between ME, VLR HLR, it also provides message freshness, forward secrecy,...

10.1109/iccet.2010.5485292 article EN 2010-01-01

In this paper, we analyze the security access domain in third generation communication system (3G) is vulnerable to Man Middle (MitM) attack and denial of service (DoS). Basing on deep analysis Authentication Key Agreement (AKA) protocol, formally established MitM-DoS models wireless network wired network. Aiming at vulnerability 3G, finally, a new defense strategy modeling demonstrated paper.

10.1109/icise.2009.1050 article EN 2009-01-01

In this work, a dual-branch network is proposed to exploit both local and global information of utterances for spoofing speech detection (SSD). The artifacts can reside in specific temporal or spectral regions, which are the primary objectives SSD systems. We propose spectro-temporal graph attention jointly capture differences speech. It different from existing methods that method exploits cross mechanism bridge dependency. As also provide complimentary SSD, we use BiLSTM-based branch...

10.21437/interspeech.2024-251 article EN Interspeech 2022 2024-09-01

Emotion Forecasting in Conversations (EFC), the task aims to predict emotion of next utterance (yet come), has received more and attention recent years. However, this ignores one-to-many feature dialogue its prediction target is label, which flawed most cases. In work, we propose a new task: Distribution (EDFC), distribution utterance. Although reasonable real applications, it can only learn using labels cases because difficulty obtaining distribution. To address it, explore positive role...

10.1109/icassp49357.2023.10096414 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

A wireless wearable physiological parameter monitoring system for home health care is studied in this paper. Based on the of human research, we introduced realization ZigBee acquisition module.

10.1109/cmce.2010.5610310 article EN International Conference on Computer, Mechatronics, Control and Electronic Engineering 2010-08-01

10.4156/aiss.vol4.issue16.36 article EN INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 2012-09-15

The efficient integration of distributed fiber Bragg grating (FBG) sensors and cloud computing platform is used to achieve accurate measurement evaluation physical quantities, which solves the problems traditional sensing technology for health structure monitoring system, such as cost space constraints, it difficult deploy enough servers deal with data collection, transmission storage in real time. using adopts erbium-doped cascaded grating, reasonably configures FBG demodulator acquisition...

10.1109/icbaie52039.2021.9389950 article EN 2021-03-26

The status monitoring of industrial process equipment is great significance to its production energy efficiency and safety. A state system for complex surface structures based on the distributed FBG sensor network proposed. adopts realizes calculation stress field through layout design at different positions in three-dimensional space. 32-channel designed, light source, demodulation module, processing are selected analyzed. On basis building network, test was carried out equipment. For...

10.1155/2021/5250778 article EN cc-by Mobile Information Systems 2021-10-11

In the telecommunication operator wireless network, user is identifiable and centrally managed, therefore trust can also be managed. this paper, we propose cloud model based on to solve management problems in networks, including collection, storage, evaluation update. model, realizes conversion between qualitative concept quantitative value of satisfaction degree, timeliness vector buffer queue, update backward algorithm determine tendency numerical characteristics model. The proposed by...

10.1109/iccomta.2009.5349200 article EN 2009-10-01

The quantization scheme between double enhanced charge phase-slip (ECPS) qubits is given. In this system, there exist quantum entanglement phenomenona. characteristic discussed by employing the concurrence. An interesting conclusion obtained, i.e., if one desire to change two ECPS qubits, mutual inductance should be considered first, but it also a good choice tune symmetric and asymmetric combination of gate voltages.

10.1142/s0217979221500417 article EN International Journal of Modern Physics B 2021-01-05

by preprocessing the original load data series, processing ability of gray prediction to fluctuating series is enhanced, and selection initial conditions, it can make fitting curve more accord with law things developing in future, improve precision model meet demand short-term forecasting. The improved compared general GM (L,1) case analysis.

10.1109/icipca59209.2023.10257731 article EN 2023-08-11

In this paper we analyze certificate structure, discuss on authentication method based in mobile network environment. This proposes a privilege management system attribute The uses which is high security to provide user large scale applications. use of certificate, distribute OCSP service and USIM support are also discussed paper.

10.1109/paciia.2009.5406584 article EN 2009-11-01

10.4156/ijact.vol4.issue16.19 article EN International Journal of Advancements in Computing Technology 2012-09-30

Ventilation is a basic requirement for building comfort and the power consumption higher mechanical ventilation, in this paper, heat exchanger with natural ventilation designed experiment studied.The results show that temperature exchange effectiveness, moisture efficiency enthalpy are all related to difference, humidity difference flow rate.When Air rate than 53m3/h more 10°C.Natural can meet requirements of an ordinary bedroom.Enthalpy energy saving

10.2991/icsd-17.2017.41 article EN cc-by-nc 2017-01-01

Snow removal aims to locate snow areas and recover clean images without repairing traces. Unlike the regularity semitransparency of rain, with various patterns degradations seriously occludes background. As a result, state-of-the-art methods usually retains large parameter size. In this paper, we propose lightweight but high-efficient network called Laplace Mask Query Transformer (LMQFormer). Firstly, present Laplace-VQVAE generate coarse mask as prior knowledge snow. Instead using in...

10.48550/arxiv.2210.04787 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...