Bin Han

ORCID: 0000-0002-0111-6254
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Higher Education and Teaching Methods
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Virtual Reality Applications and Impacts
  • Advanced Computational Techniques and Applications
  • Human Motion and Animation
  • Team Dynamics and Performance
  • Rough Sets and Fuzzy Logic
  • Experimental Learning in Engineering
  • Network Security and Intrusion Detection
  • Education and Work Dynamics
  • Tactile and Sensory Interactions
  • Advanced Neural Network Applications
  • Face recognition and analysis
  • Interactive and Immersive Displays
  • Advanced Clustering Algorithms Research
  • Data Mining Algorithms and Applications
  • Face and Expression Recognition
  • Video Surveillance and Tracking Methods
  • Human Pose and Action Recognition
  • Information Retrieval and Search Behavior
  • QR Code Applications and Technologies
  • Innovative Educational Techniques
  • Sentiment Analysis and Opinion Mining

Korea Institute of Science and Technology
2022-2024

Dalian University of Technology
2024

Southern California University for Professional Studies
2024

University of Southern California
2024

Korea University
2019-2022

China Earthquake Administration
2021

Jiangsu University of Science and Technology
2009-2021

Chengdu University of Information Technology
2011-2021

State Key Laboratory of Cryptology
2021

Wuxi Vocational Institute of Commerce
2013

Simulator sickness has been one of the major obstacles toward making virtual reality (VR) widely accepted and used. For example, navigation produces vection, which is illusion self-motion as perceives bodily motion despite no movement actually occurs. This, in turn, causes a sensory conflict between visual actual (or vestibular) sickness. In this study, we explore method to reduce simulator by visually mixing optical flow patterns that are reverse direction motion. As mainly detected...

10.1145/3491102.3501847 article EN CHI Conference on Human Factors in Computing Systems 2022-04-28

This study investigates how different virtual agent (VA) behaviors influence subjects' perceptions and group decision-making. Participants carried out experimental discussions with a VA exhibiting varying levels of engagement affective behavior. Engagement refers to the VA's focus on task, whereas behavior reflects emotional state. The findings revealed that engagements effectively captured participants' attention even in setting enhanced synergy, thereby facilitating more in-depth...

10.1145/3613904.3642917 article EN other-oa 2024-05-11

This poster introduces the Masked FER-2013 dataset that can be used to analyze facial emotions in people wearing masks and train a recognizer. The containing face images annotated with seven was modified by synthesizing mask into lower portion of face. Based on quantitative evaluation, our improve accuracy CNN, VGG, ResNet models' emotion recognition masked maximum 46%. Additionally, as use case, we present an application recognizes person, generates emotional animation, augments it real...

10.1109/vrw58643.2023.00216 article EN 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) 2023-03-01

AudienceMR is designed as a multi-user mixed reality space that seamlessly extends the local user to become large, shared classroom where some of audience members are seen seated in real space, and more through an extended portal. can provide sense presence large-scale crowd/audience with associated spatial context. In contrast virtual (VR), however, (MR), lecturer deliver content or conduct performance from real, actual, comfortable, familiar while interacting directly nearby objects, such...

10.3390/app11199022 article EN cc-by Applied Sciences 2021-09-28

摘要: 该文针对K平面聚类算法KPC (K-Plane Clustering)对噪声点敏感的缺陷,通过引入隶属度约束函数,推导出鲁棒的改进分割K平面聚类算法IFP-KPC(Improved Fuzzy Partitions for K-Plane Clustering),并利用Voronoi距离对IFP-KPC算法的鲁棒性进行了合理解释。实验结果表明IFP-KPC算法较之于KPC算法具有更好的聚类效果。 关键词: K平面聚类; 改进模糊分割; Voronoi距离; 鲁棒性

10.3724/sp.j.1146.2006.02065 article NO cc-by JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2011-03-28

Armored equipment plays a crucial role in the ground battlefield. The fast and accurate detection of enemy armored targets is significant to take initiative Comparing general object vehicle detection, target battlefield environment more challenging due long distance observation complicated environment. In this paper, an robust automatic method proposed detect Firstly, inspired by Feature Pyramid Network (FPN), we propose top-down aggregation (TDA) network which enhances shallow feature maps...

10.1142/s0218001419500071 article EN International Journal of Pattern Recognition and Artificial Intelligence 2018-09-11

In this paper, a fragile audio watermarking scheme for content authentication is proposed. The signal segmented and the sum of absolute value samples computed each part, then frame adjusted quantized quantization result converted to binary as watermark. Then, proper positive integer chosen compute mean continuous sample amplitude by sliding one every time. sequence constructs line which cross timing axis in time domain. Watermark information embedded at these intersection points with dither...

10.1109/icmt.2011.6003041 article EN 2011-07-01

A robust speech content authentication algorithm against desynchronization attacks is proposed, in order to authenticate the of digital signal. Firstly, signal framed, and each frame divided into two parts. The number frame, as watermark bit, embedded first second part by quantizing Bessel-Fourier moments correspond signals. authenticated comparing with bits extracted from part. Experiment results shown that scheme proposed effective. And some existing schemes, performance improved. Index...

10.12720/jcm.9.9.723-728 article EN Journal of Communications 2014-01-01

We discuss how data fusion and mining are mutually supportive in multisensor systems and, with an illustrative example, we show the rough set theory is a powerful tool to inducing rule-based object models for system used environment pollution monitoring. The entropy employed analyze attribute sets. Also, probability model introduced mine statistical information hidden table. They all promising future processing coming from system.

10.1109/acc.2001.945675 article EN 2001-01-01

In order to identify Tor anonymous network traffic which was generated by the most widely used in world, analyzing features that can be recognize based on meek pluggable transport, and proposing a method machine learning classify traffic. identification aimed at Tor-Meek using Meek confusion technology network. To determine flow characteristics from original feature set, RandomForest selection is evaluate importance of these features, select available subset. The classifier constructed C4.5,...

10.1109/iccwamtip53232.2021.9674056 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2021-12-17

As a software representation of assets and processes, digital twins is valuable for the design future marine monitoring control systems. Such system usually requires integration technologies from cloud edge, WebAccess/SCADA SaaS Composer Advantech Technology were adopted in our proposed framework ships running coastal waters based application was given paper. The compatible with various network access technologies, including near shore oriented cellular communication off satellite...

10.1109/icaica50127.2020.9182549 article EN 2022 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) 2020-06-01

10.24251/hicss.2024.677 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2024-01-01

In this paper, a new reduct searching algorithm is proposed to benefit the applications of rough sets theory. The information entropy introduced algorithm, so that indeterministic causalities among attributes can be found and sensitivity noise, occurring unavoidably when approximation quality function /spl gamma/ applied, removed. theoretical analysis an illustrated example show rule set induced by uses less than algorithms based on function. At same time, gives larger coverage, especially...

10.1109/acc.2002.1025373 article EN 2002-01-01

Noise is often brought to host audio by common signal processing operation, and it usually changes the high-frequency component of an signal. So embedding watermark adjusting low-frequency coefficient can improve robustness a scheme. Moving Average sequence feature This work proposed method which into maximal in discrete cosine transform domain moving average sequence. Subjective objective tests reveal that watermarking scheme maintains highly quality, simultaneously, algorithm robust...

10.48550/arxiv.1704.02755 preprint EN other-oa arXiv (Cornell University) 2017-01-01

The synchronization scheme based on moving average is robust and suitable for the same rule to be adopted in embedding watermark code, but imperceptibility search efficiency seldom reported. study aims improve original audio watermarking. Firstly, survival of algorithm from desynchronization attacks improved. Secondly, improved inaudibility. Objective difference grade (ODG) marked significantly changed. Thirdly, analyzed derived result close experimental result. Fourthly, selection...

10.3745/jips.03.0112 article EN Journal of Information Processing Systems 2019-04-01

In this work, we propose to use an approximate 2D map of the environment generated from latest modeling technology and enhance object manipulation performance for touch based mobile augmented reality. We validated advantage proposed interface through a pilot experiment confirmed that helps reduce task completion time almost 2 times improve usability as well.

10.1145/3359996.3364715 article EN 2019-11-12

In light of the COVID-19 pandemic, wearing a mask is crucial to avoid contracting infectious diseases. However, known impair communication functions. This study aims address difficulties caused by and provide strategy for aiding in understanding speaker's speech through facial animation. Facial animation generated real-time, upper information processed detect emotions, generating lower expression. addition, system detects mask's shape enables accurate registration proper position. technology...

10.1145/3550082.3564178 article EN 2022-12-06

10.3923/itj.2006.779.791 article EN Information Technology Journal 2006-08-15

Serendipity is the phenomenon of people making unexpected and beneficial discoveries. While research on mechanism effectiveness serendipity in information acquisition has been actively conducted, little attempt made to quantify when it occurs. In this paper, we present a quantitative model that measures experienced by users hypertext environment. order propose an evaluation how probable would experience serendipitous moments process active search, define discovery as can happen during...

10.3390/electronics10141678 article EN Electronics 2021-07-14

We propose an intrusion detection system for wireless sensor networks. According to the features of clustered network, in every node network deploy IDS agent, which include two different agent: local agent and global agent. This carry out tasks, at same time using several blocks order realize data collection, detection, response agents management, would make our has advantages simple operation good expansibility, lower cost improved secure capacity.

10.1109/itap.2011.6006209 article EN International Conference on Internet Technology and Applications 2011-08-01
Coming Soon ...