- Geological and Geochemical Analysis
- Indoor and Outdoor Localization Technologies
- earthquake and tectonic studies
- Geochemistry and Geologic Mapping
- High-pressure geophysics and materials
- Context-Aware Activity Recognition Systems
- Speech and Audio Processing
- Sparse and Compressive Sensing Techniques
- Video Surveillance and Tracking Methods
- Advanced Computational Techniques and Applications
- Gait Recognition and Analysis
- Energy Efficient Wireless Sensor Networks
- Power Systems and Technologies
- Anomaly Detection Techniques and Applications
- User Authentication and Security Systems
- China's Socioeconomic Reforms and Governance
- Advanced Image and Video Retrieval Techniques
- Underwater Vehicles and Communication Systems
- IoT and Edge/Fog Computing
- Simulation and Modeling Applications
- Image Retrieval and Classification Techniques
- Spam and Phishing Detection
- Space Satellite Systems and Control
- Face and Expression Recognition
- Advanced Malware Detection Techniques
Newcastle University
2023-2025
Affiliated Hospital of Guizhou Medical University
2025
Guizhou University
2025
North Minzu University
2025
Guangxi University
2024
Guangzhou Institute of Geochemistry
2014-2024
Chinese Academy of Sciences
2014-2024
Lancaster University
2022-2024
China Southern Power Grid (China)
2024
Guilin University of Technology
2007-2024
Prior research has shown the potential of device-free WiFi sensing for human activity recognition. In this paper, we show first time signals can also be used to uniquely identify people. There is strong evidence that suggests all humans have a unique gait. An individual's gait will thus create perturbations in spectrum. We propose system called WiFi-ID analyses channel state information extract features are representative walking style individual and allow us person. implement on commercial...
Remote sensing observations have shown that the far side of Moon (lunar farside) has different geology and rock composition to those nearside, including abundances potassium, rare earth elements, phosphorus (collectively known as KREEP). The Chang’e-6 (CE-6) spacecraft collected samples from South Pole–Aitken (SPA) basin on farside brought them Earth. We used lead-lead rubidium-strontium isotope systems date low-titanium basalt in a CE-6 sample, finding consistent age 2830 (±5) million...
A large proportion of ores in magmatic sulfide deposits consist mixtures cumulus silicate minerals, liquid, and melt, with characteristic textural relationships that provide essential clues to their origin. Within silicate-sulfide cumulates, there is a range abundance magmatic-textured between up about five modal percent sulfides, called “disseminated ores,” “net-textured” (or “matrix”) containing 30 70 forming continuous networks enclosing silicates. Disseminated cumulates have various...
Recent research has devoted significant efforts on the utilization of WiFi signals to recognize various human activities. An individual's limb motions in coverage area could interfere with wireless signal propagation, that manifested as unique patterns for activity recognition. Existing approaches though yielding reasonable performance certain cases, are ignorant two major challenges. The performed activities individual normally have inconsistent speed different situations and time. Besides...
Abstract Systems of sensor human activity recognition are becoming increasingly popular in diverse fields such as healthcare and security. Yet, developing systems poses inherent challenges due to the variations complexity behaviors during performance physical activities. Recurrent neural networks, particularly long short-term memory have achieved promising results on numerous sequential learning problems, including recognition. However, parallelization is inhibited recurrent networks...
Phishing websites distribute unsolicited content and are frequently used to commit email internet fraud; detecting them before any user information is submitted critical. Several efforts have been made detect these phishing in recent years. Most existing approaches use hand-crafted lexical statistical features from a website's textual train classification models web pages. However, detection few challenges, including 1) the tediousness of extracting features, which require specialized domain...
The ~216 Ma Hongqiling No. 7 intrusion is located in the southern margin of Central Asian orogenic belt, northeastern China. It was second largest Ni producer after Jinchuan crops out an area ~0.013 km2 on surface. intruded gneisses and marbles Paleozoic Hulan Formation. mainly composed orthopyroxenite (~95 vol %), with minor harzburgite norite. Over 90 % contains disseminated, net-textured or massive sulfides. bulk sulfide ores (recalculated to 100% sulfide) have low average PGE...
Activity recognition is an important component of many pervasive computing applications. Device-free activity has the advantage that it does not have privacy concern using cameras and subjects do to carry a device on them. Recently, been shown channel state information (CSI) can be used for in device-free setting. With proliferation wireless devices, understand how radio frequency interference (RFI) impact In this paper, we investigate RFI CSI-based location-oriented recognition. We conduct...
This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning techniques. Phishing is a very common social engineering technique. The attackers try to deceive online users mimicking uniform resource locator (URL) webpage. Traditionally, largely based on manual reports from users. Machine techniques have recently been introduced for detection. With the recent rapid development of techniques, many deep-learning-based recognition methods also explored improve...
Radio tomographic imaging (RTI) enables device free localisation of people and objects in many challenging environments situations. Its basic principle is to detect the changes statistics radio signals due link obstruction by or objects. However, accuracy RTI suffers from complicated multipath propagation behaviours links. We propose use inexpensive energy efficient electronically switched directional (ESD) antennas improve quality behaviour observations, therefore, RTI. implement a (dRTI)...
Background subtraction is often the first step of many computer vision applications. For a background method to be useful in embedded camera networks, it must both accurate and computationally efficient because resource constraints on platforms. This makes traditional algorithms unsuitable for platforms they use complex statistical models handle subtle illumination changes. These make them but computational requirement these too high In this paper, we propose new which efficient. The key...
Research has shown the potential of device-free WiFi sensing for human identification. Each and every a unique gait prior works suggest devices are able to capture signature person's gait. In this article, we show first time that monitored could be inconsistent have mirror-like perturbations when individuals walk through in different directions, provided antenna array is horizontal walking path. Such mirrored patterns negatively affect uniqueness accuracy Therefore, propose system called...
Research Article| June 01, 2019 S and C Isotope Constraints for Mantle-Derived Sulfur Source Organic Carbon-Induced Sulfide Saturation of Magmatic Ni-Cu Deposits in the Central Asian Orogenic Belt, North China Bo Wei; Wei 1Key Laboratory Mineralogy Metallogeny, Guangzhou Institute Geochemistry, Chinese Academy Sciences, 510640, Search other works by this author on: GSW Google Scholar Christina Yan Wang; Wang †Corresponding author: e-mail, wang_yan@gig.ac.cn Yann Lahaye; Lahaye 2Geological...
Human activity recognition has become essential to a wide range of applications, such as smart home monitoring, health-care, surveillance. However, it is challenging deliver sufficiently robust human system from raw sensor data with noise in environment setting. Moreover, imbalanced datasets less frequent activities create extra challenges for accurate recognition. Deep learning algorithms have achieved promising results on balanced datasets, but their performance without explicit algorithm...
Human has an unique gait and prior works show increasing potentials in using WiFi signals to capture the signature of individuals' gait. However, existing WiFi-based human identification (HI) systems have not been ready for real-world deployment due various strong assumptions including known users sufficient training data captured predefined domains such as fixed walking trajectory/orientation, layout (receivers locations) multipath environment (deployment time site). In this paper, we...
With the properties of openness and dynamic in topology, wireless sensor networks are challenged with great security threats. In this paper we focus on wormhole attack which is proved to be particularly dangerous resource-limited nodes. We present SA-TC algorithm for detecting thus defending against serious threat. It based on-demand multi-path routings uses statistical analysis time constraint identify suspected links. needs neither synchronization among sensors nor extra hardwares such as...
Face recognition is an element of many smartphone apps, e.g. face unlocking, people tagging and games. Sparse Representation Classification (SRC) a state-of-the-art algorithm, which has been shown to outperform classical algorithms in OpenCV. The success SRC due its use l1, makes robust noise occlusions. Since l1 optmisation computationally intensive, uses random projection matrices reduce the dimension problem. However, do not give consistent classification accuracy. In this paper, we...
Real-time target tracking is an important service provided by embedded camera networks. The first step in to extract the moving targets from video frames, which can be realised using background subtraction. For a subtraction method useful networks, it must both accurate and computationally efficient because of resource constraints on platforms. This makes many traditional algorithms unsuitable for platforms they use complex statistical models handle subtle illumination changes. These make...
Activity recognition is an important component of many pervasive computing applications. Radio-based activity has the advantage that it does not have privacy concern compared with camera-based solutions, and subjects do to carry a device on them. It been shown channel state information (CSI) can be used for in device-free setting. With proliferation wireless devices, understand how radio frequency interference (RFI) impact In this article, we investigate RFI CSI-based location-oriented...
Recently, Unmanned Aerial Vehicle (UAV) swarm has been increasingly studied to collect data from ground sensors in remote and hostile areas. A key challenge is the joint design of velocities collection schedules UAVs, as inadequate would lead failed transmissions buffer overflows and, turn, significant packet losses. In this paper, we optimize jointly velocity controls multiple UAVs minimize losses, adapting battery levels, queue lengths channel conditions sensors, trajectories UAVs. absence...
Type 1 diabetes mellitus (DM1) is a metabolic disease derived from falls in pancreatic insulin production resulting chronic hyperglycemia. DM1 subjects usually have to undertake number of assessments blood glucose levels every day, employing capillary glucometers for the monitoring dynamics. In recent years, advances technology allowed creation revolutionary biosensors and continuous (CGM) techniques. This has enabled subject’s level real time. On other hand, few attempts been made apply...