- Advanced Steganography and Watermarking Techniques
- Privacy, Security, and Data Protection
- Underwater Acoustics Research
- Aluminum Alloys Composites Properties
- Anomaly Detection Techniques and Applications
- Advanced Image and Video Retrieval Techniques
- Adversarial Robustness in Machine Learning
- Advanced Graph Neural Networks
- Recommender Systems and Techniques
- Second Language Learning and Teaching
- Aluminum Alloy Microstructure Properties
- Advanced Malware Detection Techniques
- Advanced Mathematical Theories and Applications
- Advanced Decision-Making Techniques
- Hydraulic and Pneumatic Systems
- Advanced materials and composites
- Advanced Sensor and Control Systems
- QR Code Applications and Technologies
- Inertial Sensor and Navigation
- Target Tracking and Data Fusion in Sensor Networks
- Microstructure and mechanical properties
- Underwater Vehicles and Communication Systems
- Advanced Computational Techniques and Applications
- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
Chongqing University
2025
University of California, Irvine
2023-2024
Hunan University of Science and Technology
2024
Anhui University of Finance and Economics
2023
University of South China
2023
Xiangtan University
2023
Northeastern University
2023
Cégep Garneau
2021
Shenyang Jianzhu University
2020-2021
University of Science and Technology of China
2018-2021
This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on screen and information captured by camera, we can still extract watermark message from photo. To realize such demands, analyzed special distortions caused process, including lens distortion, light source moiré distortion. resist geometric deformation proposed an intensity-based scale-invariant feature transform (I-SIFT) algorithm accurately locate embedding...
Deep learning has achieved tremendous success in numerous industrial applications. As training a good model often needs massive high-quality data and computation resources, the learned models have significant business values. However, these valuable deep are exposed to huge risk of infringements. For example, if attacker full information one target including network structure weights, can be easily finetuned on new datasets. Even only access output model, he/she still train another similar...
Smart speakers collect voice commands, which can be used to infer sensitive information about users. Given the potential for privacy harms, there is a need greater transparency and control over data collected, used, shared by smart speaker platforms as well third party skills supported on them. To bridge this gap, we build framework measure collection, usage, sharing platforms. We apply our Amazon ecosystem. Our results show that parties, including advertising tracking services are unique...
This paper designs a novel underpainting based camera shooting resilient (CSR) document watermarking algorithm for dealing with the leak source tracking problem. By applying such algorithm, we can extract authentication watermark information from candid photographs. The watermarked contains three significant properties. 1) Inconspicuousness. is inconspicuous and it will not easily be maliciously attacked. 2) Robustness. We propose DCT-based embedding distortion compensation extracting which...
Screen-camera communication techniques achieve one-way with widely-used screen and camera devices. Popular barcode methods use visible spatial patterns to represent data, which has been considered obtrusive human observers. Recent works borrow ideas from visual light (VLC), inter-frame pixel change modulate data. To recover change, the receiver record process video frames. Such video-based extraction high hardware requirements lacks reliability. Inspired by VLC-based methods, we propose...
In order to develop a new ceramic tool material with self-repairing capability, Al2O3/TiC/TiB2 was prepared by vacuum hot-pressure sintering method. The toughening and strengthening mechanism of TiB2 on Al2O3/TiC substrate analyzed. results show that the has good comprehensive mechanical properties when content is 10 vol.%. Its flexural strength 701.32 MPa, hardness 18.3 GPa, fracture toughness 6.2 MPa·m1/2, which were improved 11.6%, 2.2% 16.1% respectively, compared material. Fracture...
Virtual reality (VR) is an emerging technology that enables new applications but also introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in space and provide first comprehensive analysis of personal data exposed by OVR apps itself, from a combined networking policy perspective. We experimented with Quest 2 headset tested most popular available official SideQuest app stores. developed OVRseen, methodology system for collecting, analyzing, comparing...
Lotus pods in unstructured environments often present multi-scale characteristics the captured images. As a result, it makes their automatic identification difficult and prone to missed false detections. This study proposed lightweight lotus pod model, MLP-YOLOv5, deal with this difficulty. The model adjusted detection layer optimized anchor box parameters enhance small object accuracy. C3 module transformer encoder (C3-TR) shuffle attention (SA) mechanism were introduced improve feature...
Since the global positioning system began to operate, it has become more and close people's lives, been applied various fields now. In order track decode GPS signals, signals need be captured first. The necessary parameters of signal are immediately transmitted tracking process, then navigation message satellite can obtained by process. this paper, basic contents related structure briefly described. Then, traditional acquisition method based on time domain correlation is introduced, FFT...
Research Article| February 21, 2018 Parallel Image Registration Implementations for GMTSAR Package Hao Cui; Cui aSchool of Earth and Space Sciences, University Science Technology China, Hefei 230026, zhaxj@ustc.edu.cn Search other works by this author on: GSW Google Scholar Xianjie Zha zhaxj@ustc.edu.cnbAlso at National Geophysical Observatory Mengcheng, Anhui, China. Seismological Letters (2018) 89 (3): 1129–1136. https://doi.org/10.1785/0220170171 Article history first online: 21 Feb Cite...
According to previous studies, the Chinese revised Hukou system has not been proven be effective in short-term movement of rural labor force or controlling urban populations. In this study, we address and analyze self-selection problem from perspective inflows migration endogeneity adoption system, based on data China Family Panel Studies (CFPS). The study shows that adopted by local governments was significantly efficient harmed decisions force.
On the purpose of deepening method research perceptual analysis, based on description relationship between design and rational design, importance in modern product is clarified. To strengthen emotional expression product, study focuses sort with background internalization equivalent theory. Taking as bond, how located sensibility analyzed. By taking advantage formal beauty rule, more elements are added into to summarize principle design.
Wireless sensing combined with deep learning has become a research hotspot in recent years, but most of the existing work is limited by distance. The establishment several models years proven long-distance ability LoRa devices, there still insufficient on how to combine devices learning. This paper analyzes propagation and variation laws signals affected human activities, proposes signal processing method extract features suitable for networks. By comparing current advanced commonly used...
We delved into the intricate relationships of social support, ethnic identity, pride, and subjective well-being among Chinese athletes who belong to an minority. The study's focus was on 877 from diverse economic regions in China, participated 11th Zhengzhou National Minority Traditional Sports Games 2019. results showed that support positively correlated with minorities. Social directly influenced athletes' well-being, as well indirectly impacting it by affecting their identity and/or...
Virtual reality (VR) platforms enable a wide range of applications, however pose unique privacy risks. In particular, VR devices are equipped with rich set sensors that collect personal and sensitive information (e.g., body motion, eye gaze, hand joints, facial expression), which can be used to uniquely identify user, even without explicit identifiers. this paper, we interested in understanding the extent user identified based on data collected by different sensors. We consider adversaries...
In order to improve the accuracy of wind turbine fault diagnosis, a diagnosis method based on Subtraction-Average-Based Optimizer (SABO) optimized Variational Mode Decomposition (VMD) and Kernel Extreme Learning Machine (KELM) is proposed. Firstly, SABO algorithm was used optimize VMD parameters decompose original signal obtain best modal components, then nine features were calculated feature vectors. Secondly, KELM parameters, training set test divided according different proportions. The...
Web forms are one of the primary ways to collect personal information online, yet they relatively under-studied. Unlike web tracking, data collection through is explicit and contextualized. Users (i) asked input specific types, (ii) know context (i.e., on which website for what purpose). For be trusted by users, must meet common sense standards appropriate practices within a particular privacy norms). In this paper, we extract norms embedded measurement study. First, build specialized...