Jian Zhang

ORCID: 0000-0001-5418-0455
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Advanced Graph Neural Networks
  • Millimeter-Wave Propagation and Modeling
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Smart Grid Energy Management
  • Power Systems and Technologies
  • Smart Grid and Power Systems
  • Adversarial Robustness in Machine Learning
  • Electronic Packaging and Soldering Technologies
  • Geochemistry and Geologic Mapping
  • Energy Harvesting in Wireless Networks
  • Cooperative Communication and Network Coding
  • Chaos-based Image/Signal Encryption
  • Quantum Computing Algorithms and Architecture
  • Generative Adversarial Networks and Image Synthesis
  • Face recognition and analysis
  • AI in cancer detection
  • Power System Optimization and Stability
  • Blind Source Separation Techniques
  • Optimal Power Flow Distribution
  • Geological and Geochemical Analysis
  • Network Security and Intrusion Detection

Central South University
2015-2025

Nankai University
2025

Affiliated Hospital of Jiangsu University
2025

Jiangsu University
2025

Chinese Center For Disease Control and Prevention
2021-2024

State Grid Hebei Electric Power Company
2023

State Grid Corporation of China (China)
2018-2023

Quantum Technology Sciences (United States)
2023

Beijing University of Posts and Telecommunications
2023

China Aerodynamics Research and Development Center
2022

In recent years, with the rapid enhancement of computing power, deep learning methods have been widely applied in wireless networks and achieved impressive performance. To effectively exploit information graph-structured data as well contextual information, graph neural (GNNs) introduced to address a series optimization problems networks. this overview, we first illustrate construction method communication for various simply introduce progress several classical paradigms GNNs. Then,...

10.1109/ojcoms.2021.3128637 article EN cc-by-nc-nd IEEE Open Journal of the Communications Society 2021-01-01

Millimeter-wave (mmWave) frequency bands, which offer abundant underutilized spectral resources, have been explored and exploited in the past several years to meet requirements of emerging wireless services highlighted by high data rates, ultrareliability, ultralow delivery latency. Yet, unique characteristics mmWave, e.g., continuous wide bandwidth, large path, penetration losses, along with hardware constraints, call for innovative technologies mmWave communication. Recently, an extensive...

10.1109/jproc.2021.3107494 article EN publisher-specific-oa Proceedings of the IEEE 2021-09-20

Driven by the explosive growth of Internet Things (IoT) devices with stringent requirements on latency and reliability, ultra-reliability low communication (uRLLC) has become one three key scenarios for 5th generation (5G) 6G systems. In this paper, we focus beamforming design problem downlink multiuser uRLLC system. Since strict demand reliability latency, in general, short packet transmission is a favorable way systems, which indicates classical Shannon's capacity formula no longer...

10.1109/twc.2021.3090197 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2021-06-29

The KNN (K-nearest neighbors) algorithm is one of Top-10 data mining algorithms and widely used in various fields artificial intelligence. This leads to that quantum have developed achieved certain speed improvements, denoted as Q-KNN. However, these Q-KNN methods must face two key problems follows. first they are mainly focused on neighbor selection without paying attention the influence K value algorithm. second only process quantized, not quantized. To solve problems, this paper designs a...

10.1109/tcad.2023.3345251 article EN cc-by IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2023-12-20

The non-orthogonal multiple access (NOMA) technique or more generally the principle is a crucial component for next generation cellular system. For two-user downlink NOMA, constellations of near and far users are superposed transmission, maximum likelihood (ML) successive interference cancellation (SIC) receiver used reception. In this paper, we aim to further enhance linklevel performance NOMA with ML receiver. A method constellation rotation proposed where respectively rotated before...

10.1109/vtcfall.2016.7880967 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2016-09-01

Femtocells are considered as promising technologies for the next generation wireless networks to improve system capacity and enhance indoor coverage. The dense deployment of femtocells brings a lot challenges in terms interference management energy consumption. To alleviate co-channel interference, we investigate based on hierarchically joint user scheduling power control downlink femtocell considering impact cost. Then, formulate this problem Stackelberg game with one leader multiple...

10.1109/jsyst.2016.2580560 article EN IEEE Systems Journal 2016-07-07

10.1109/icassp49660.2025.10890364 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

10.1109/ojcoms.2025.3549434 article EN cc-by IEEE Open Journal of the Communications Society 2025-01-01

10.1109/icassp49660.2025.10887961 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Electroencephalography (EEG) is widely used for analyzing brain activity; however, the nonlinear and nature of EEG signals presents significant challenges traditional analysis methods. Machine has shown great promise in addressing these limitations. This study proposes a novel approach using Radial Function (RBF) neural networks optimized by Particle Swarm Optimization (PSO) to reconstruct dynamics extract age-related characteristics. recordings were collected from 142 participants spanning...

10.3389/fnins.2025.1557763 article EN cc-by Frontiers in Neuroscience 2025-03-28

Unauthorised face recognition (FR) systems have posed significant threats to digital identity and privacy protection. To alleviate the risk of compromised identities, recent makeup transfer-based attack methods embed adversarial signals in order confuse unauthorised FR systems. However, their major weakness is that they set up a fixed image unrelated both protected reference images as confusion identity, which turn has negative impact on success rate visual quality transferred photos. In...

10.1609/aaai.v39i1.32031 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Knowledge graph (KG) fact prediction aims to complete a KG by determining the truthfulness of predicted triples. Reinforcement learning (RL)-based approaches have been widely used for prediction. However, existing largely suffer from unreliable calculations on rule confidences owing limited number obtained reasoning paths, thereby resulting in decisions Hence, we propose new RL-based approach named EvoPath this study. features reward mechanism based entity heterogeneity, facilitating an...

10.1186/s42492-023-00150-7 article EN cc-by Visual Computing for Industry Biomedicine and Art 2023-11-20

Nasopharyngeal Carcinoma (NPC) is one of the most common malignant tumors in China. However, cancer's region subtle, variability and irregular. In traditional diagnostic way, clinicians' diagnosis relies on manual delineations which are time consuming require rich prior experience. Recently, deep learning architecture U-Net Dual Path Network (DPN) apply well biomedical segmentation nature scene respectively. cannot extract abundance texture information from data DPN utilize shallow layer...

10.1109/icivc.2018.8492781 article EN 2018-06-01

As more and cloud services are exposed to DDoS attacks, attack detect has become a new challenging task because large packet traces captured on fast links could not be easily handled single server with limited computing memory resources. In this paper, we propose Hadoop based model identify abnormal packets compute the statistics according number of packets. The novelties that:(1) by harnessing HBASE, an improved bloom filter mapping mechanism named TCP2HC/UDP2HC implemented, (2)with...

10.1109/trustcom.2016.0302 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2016-08-01

Graph neural networks (GNNs) have attracted much attention because of their excellent performance on tasks such as node classification. However, there is inadequate understanding how and why GNNs work, especially for representation learning. This paper aims to provide a theoretical framework understand GNNs, specifically, spectral graph convolutional networks, from signal denoising perspectives. Our shows that are implicitly solving problems: convolutions work features, while attentions edge...

10.48550/arxiv.2006.04386 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Recommendation has become especially crucial during the COVID-19 pandemic as a significant number of people rely on online shopping from home. Existing recommendation algorithms, designed to address issues like cold start and data sparsity, often overlook time constraints users. Specifically, users expect receive recommendations for products interest in shortest possible time. To this challenge, we propose novel collaborative filtering algorithm that leverages advantages quantum computing...

10.1145/3674982 article EN ACM Transactions on Knowledge Discovery from Data 2024-06-29
Coming Soon ...