Xiaolei Liu

ORCID: 0000-0001-8510-4025
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Digital Media Forensic Detection
  • Advanced Neural Network Applications
  • Blockchain Technology Applications and Security
  • Robotics and Sensor-Based Localization
  • Robotic Path Planning Algorithms
  • Advancements in Photolithography Techniques
  • Advanced Algorithms and Applications
  • Face and Expression Recognition
  • Blind Source Separation Techniques
  • Advanced Sensor and Control Systems
  • Video Surveillance and Tracking Methods
  • Biometric Identification and Security
  • Energy Efficient Wireless Sensor Networks
  • Wireless Signal Modulation Classification
  • Full-Duplex Wireless Communications
  • User Authentication and Security Systems
  • Advanced Surface Polishing Techniques
  • Aerospace Engineering and Control Systems
  • Autonomous Vehicle Technology and Safety
  • Emotion and Mood Recognition

China Academy of Engineering Physics
2020-2024

Chinese Academy of Engineering
2024

Tianjin University
2021-2023

Zhongji Test Equipment (China)
2023

Tongji University
2023

China Academy of Urban Planning and Design
2023

Suzhou Research Institute
2023

University of Electronic Science and Technology of China
2016-2022

State Key Laboratory of Crystal Materials
2022

Cloud Computing Center
2022

Many IoT (Internet of Things) systems run Android or Android-like systems. With the continuous development machine learning algorithms, learning-based malware detection system for devices has gradually increased. However, these models are often vulnerable to adversarial samples. An automated testing framework is needed help perform security analysis. The current methods generating samples mostly require training parameters and most aimed at image data. To solve this problem, we propose a...

10.3390/s19040974 article EN cc-by Sensors 2019-02-25

In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using computer may access content that he does not have permission to access. For an insider attacker, it relatively easy steal colleague’s password or use unattended launch attack. A common one-time user authentication method work in this situation. paper, we propose based on mouse biobehavioral characteristics deep learning, which can...

10.1155/2019/3898951 article EN Security and Communication Networks 2019-02-17

Model inversion attacks (MIAs) aim to recover private data from inaccessible training sets of deep learning models, posing a privacy threat. MIAs primarily focus on the white-box scenario where attackers have full access model's structure and parameters. However, practical applications are usually in black-box scenarios or label-only scenarios, i.e., can only obtain output confidence vectors labels by accessing model. Therefore, attack models existing difficult effectively train with...

10.1109/tifs.2024.3372815 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Recent studies have highlighted audio adversarial examples as a ubiquitous threat to state-of-the-art automatic speech recognition systems. Thorough on how effectively generate are essential prevent potential attacks. Despite many research this, the efficiency and robustness of existing works not yet satisfactory. In this paper, we propose weighted-sampling examples, focusing numbers weights distortion reinforce attack. Further, apply denoising method in loss function make attack more...

10.1609/aaai.v34i04.5928 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

In terms of intelligent driving, the adversarial example an attack against traffic signs will cause vehicle to make wrong judgments and decisions. However, existing examples defense algorithms generally have problems such as high training costs poor effects struggle adapt environment driving. order reduce cost while improving accuracy classification, we propose a novel algorithm for combining micro-network structure generative network (GAN). The compresses classification model Discriminator....

10.1109/mnet.2024.3392582 article EN IEEE Network 2024-04-23

Abstract Pointer instruments, widely used in complex environments, present significant challenges for manual reading due to inefficiency and difficulty. For intelligent devices, problems arise with instrument localization, low inference accuracy, incorrect readings. To address these issues, this paper proposes a novel deep-learning algorithm that divides the task of pointer instruments into three stages. First, NV-YOLOv8 model is introduced identify instrument’s location, Spatial Transformer...

10.1088/2631-8695/adb542 article EN Engineering Research Express 2025-02-12

Automatic driving has become a extremely hot issue in recent years, and the detection of stop signs is critical for autonomous driving. Different from precious methods which target features were extracted then feed to SVM classifier classify different types traffic signs, this paper introduces kind transfer learning method based on convolutional neural network(CNN). A deep convolution network trained using large data sets, valid region network(RCNN) can be obtained through small amount...

10.1109/ccdc.2018.8408160 article EN 2018-06-01

Early and highly precise detection is essential for delaying the progression of coronary artery disease (CAD). Previous methods primarily based on single-modal data inherently lack sufficient information that compromises precision. This paper proposes a novel multi-modal learning method aimed to enhance CAD by integrating ECG, PCG, coupling signals. A signal initially generated operating deconvolution ECG PCG. Then, various entropy features are extracted from its signals, as well recurrence...

10.3390/bioengineering11111093 article EN cc-by Bioengineering 2024-10-30

The insider threats have always been one of the most severe challenges to cybersecurity. It can lead destruction organisation’s internal network system and information leakage, which seriously threaten confidentiality, integrity availability data. To make matters worse, since attacker has authorized access network, they launch attack from inside erase their trace, makes it challenging track forensics. A blockchain traceability for is proposed in this paper mitigate issue. First, constructs...

10.3390/s20185297 article EN cc-by Sensors 2020-09-16

With the popularization of IoT (Internet Things) devices and continuous development machine learning algorithms, learning-based malicious traffic detection technologies have gradually matured. However, models are usually very vulnerable to adversarial samples. There is a great need for an automated testing framework help security analysts detect errors in systems. At present, most methods generating samples require training parameters known only applicable image data. To address challenge,...

10.3390/s18082630 article EN cc-by Sensors 2018-08-10

With the increasing popularity of Unmanned Aerial Vehicles (UAVs), accuracy detecting small objects in large-view images is also expected to increase. However, accurate object detection still a challenging problem. Currently, Image Pyramid Network, Feature Network (FPN), rich training strategies and data augmentation are widely used address this To accurately detect objects, most important thing mine for more feature information. We propose Widened Residual Block (WRB) break through...

10.1109/lgrs.2022.3220661 article EN IEEE Geoscience and Remote Sensing Letters 2022-01-01

In this paper, the cycle performance and capacity fading of commercial C/LiFePO4 batteries were studied at different rate. The electrochemical impedance spectroscopy (EIS) battery was tested analyzed in charge-discharge cycles. morphologies anode cathode numbers also characterized by scanning electron microscope (SEM). experimental results show that become faster higher rate cycling. SEM images cycled electrodes exhibit is possibly attributed to degradation structure. When deteriorates...

10.1088/1757-899x/452/3/032088 article EN IOP Conference Series Materials Science and Engineering 2018-12-13

For face recognition systems, impostors can obtain legal identity authentication by presenting the printed images, downloaded images or candid videos to sensor. In this paper, an enhanced local binary feature (ELBP) of a map is extracted as classification identify whether real fake face. Compared with dynamic static methods proposed in previous literature, method convenient and effective. We achieved over 95% correct rate on NUAA datasets. Through comprehensive analysis comparison other...

10.1109/cac.2017.8243913 article EN 2017-10-01

Advanced cyberattacks are often featured by multiple types, layers, and stages, with the goal of cheating monitors. Existing anomaly detection systems usually search logs or traffics alone for evidence attacks but ignore further analysis about attack processes. For instance, traffic methods can only detect flows roughly fail to reconstruct event process reveal current network node status. As a result, they cannot fully model complex multistage attack. To address these problems, we present...

10.1155/2019/5695021 article EN Security and Communication Networks 2019-06-13

It will be dangerous if hazard gas or inflammable arises in room without being noticed for a long time. A robot is good choice to automatically detect the and send out accurate information alarm. To obtain exact plentiful danger information, has search source. Traditional source searching ways not satisfying. An intelligent mounted sensors, laser finder vision introduced, responding recover delay features of sensors analysed. The requirement feature indoor discussed. two kinds strategy...

10.1109/robio.2009.5420679 article EN 2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) 2009-12-01
Coming Soon ...