- Security in Wireless Sensor Networks
- Distributed Control Multi-Agent Systems
- Wireless Communication Security Techniques
- Robotic Path Planning Algorithms
- Robotics and Automated Systems
- Face recognition and analysis
- Robotics and Sensor-Based Localization
- Biometric Identification and Security
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Cognitive Radio Networks and Spectrum Sensing
- Mobile Ad Hoc Networks
- Advanced Wireless Network Optimization
- Advanced Sensor and Control Systems
- Advanced Image and Video Retrieval Techniques
- Advanced Malware Detection Techniques
- Guidance and Control Systems
- Advanced Bandit Algorithms Research
- Industrial Technology and Control Systems
- UAV Applications and Optimization
- Reconstructive Facial Surgery Techniques
- Adaptive Control of Nonlinear Systems
- Magnetic Field Sensors Techniques
- Digital Media Forensic Detection
- Elevator Systems and Control
PLA Army Engineering University
2018-2025
University of Sheffield
2025
PLA Air Force Aviation University
2008-2023
Xi'an High Tech University
2022
Harbin Institute of Technology
2021
Changchun University
2010-2020
Hebei Science and Technology Department
2019
Zhongji Test Equipment (China)
2014
Harbin Engineering University
2010
This paper investigates the multi-user power control problem in relay-assisted anti-jamming systems. Because of hierarchical confrontation characteristics between users and jammer, we take incomplete information observation error into consideration formulate an Bayesian three-layer Stackelberg game, which primary act as leaders, relay vice-leaders, jammer acts a follower. Both have ability to sense others' transmission choose optimal realize maximum utility. Based on backward induction...
In this article, we study the problem of anti-jamming through channel selection in fading environment. Different from most existing works which ignored characteristic channels, use a Markov model to capture influence variable transmission rate Then, as decision process. On basis, an online reinforcement learning algorithm (Q-learning) is proposed select optimal intelligently. Simulation results show that outperforms sensing algorithm. The reason it can learn both pattern jamming signal and...
Ear recognition is a biometric identification technology based on human ear feature information, which can not only detect the in picture but also determine whose it is, so identity be verified by recognition. In order to improve real-time performance of algorithm and make better for practical applications, lightweight method YOLOv5s proposed. This mainly includes following steps: First, MobileNetV3 network used as backbone network. Second, using idea Ghostnet network, C3 module Conv neck...
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). We consider scenario that when FAE intrudes underlaying cellular networks, it can passively wiretap confidential messages in actively jam all legitimate links. A hierarchical heterogeneous power control mechanism multiple user equipments (DUEs) one equipment (CUE) is proposed to combat intelligent FAE. Moreover, multi-tier Stackelberg game...
This paper investigates a power control problem in jamming system, where separate smart jammer is deployed to ensure the communication security of legal user. However, due leakage, may incur unintentional interference users. The key how suppress illegal while limit negative impact on A counter measure Stackelberg game formulated model dynamic system. acts as leader sense and interfere communications user, user follower. In game, uncertain channel information taken into account. According...
This paper mainly investigates the unmanned aerial vehicle (UAV) communication networks under threat of a static malicious jammer. While taking flying process user (UAV transmitter-receiver pair) into consideration, we propose joint power and trajectory optimization method. Moreover, Stackelberg framework is formulated to solve proposed problem. In addition, algorithm (JPTOA) based on best-response (BR) designed obtain user's strategy as well equilibrium (SE) in each time stage. Furthermore,...
In this letter, we study the problem of jamming pattern recognition (JPR) when some patterns have no training samples. Existing works were designed for known only, hence they failed to deal with unknown patterns. To address challenge, a zero-shot learning (ZSL) based JPR scheme is proposed. Firstly, supervised process introduced learn latent feature representation Then, an unsupervised classification approach proposed recognize different Finally, both and are classified in space. Simulation...
Abstract In view of the anti‐tracking‐jamming problem, traditional online learning methods usually cannot analyse jamming behaviour, and find an effective way to prevent attacks. To cope with these challenges, a novel communication/deception dual mode mechanism is proposed in this paper. Deception users are selected send high‐power signal for attraction, form collaborative relationships communication users. The corresponding anti‐jamming model then constructed as Markov game multi‐agent...
In this letter, we investigate an intelligent jamming problem in a wireless confrontation scenario where both the user and jammer can dynamically adjust spectrum access or pattern. To realize accurate attacks, first propose deep learning-based pattern recognition method to recognize user's patterns. Then, based on results, design targeted methods including conventional patterns reinforcement Moreover, practical demonstration system is designed built software-defined radio (SDR) platform for...
In multi-agent confrontation scenarios, a jammer is constrained by the single limited performance and inefficiency of practical application. To cope with these issues, this paper aims to investigate jamming problem in multi-user scenario, where coordination between jammers considered. Firstly, Markov decision process (MDP) framework used model analyze problem. Secondly, collaborative algorithm (CMJA) based on reinforcement learning proposed. Finally, an actual intelligent system designed...
We investigate the problem of dynamic spectrum anti-jamming access against intelligent jammer using game theory and opponent modeling. Previous work has formulated interaction between user as an adversarial game, aimed to find Nash Equilibrium (NE). However, sticking NE will lead overcautious behaviors can't achieve best performance while is sub-optimal. Thus, this letter tries exploit adaptive Best Response (BR) rather than NE. propose minimax deep Q network (DQN) approximate utility...
In this paper, we study joint relay selection and the power control optimization problem in an anti-jamming communication system. Considering hierarchical competitive relationship between a user jammer, formulate as Stackelberg game. From perspective of game, selects strategy firstly which acts leader, while jammer chooses then that follower. Moreover, prove existence equilibrium. Based on Q-learning algorithm multi-armed bandit method, is proposed. Simulation results show user’s probability...
Human ear recognition technology is an emerging in biometrics. It has high theoretical research value and market application prospects, it gradually develops with the development of image processing, pattern other fields. Aiming at problem insufficient accuracy detection speed human practical applications, This paper constructs a method based on SSD_MobileNet_v1 target model. The data set uses USTB library University Science Technology Beijing, enhanced annotated to eliminate influence noise...
This letter investigates the problem of combating intelligent reactive jammer through a deep reinforcement learning (DRL) based hidden strategy. Existing anti-jamming researches always assume capacity-limited adversary which is non-reactive or only launches attacks while detecting activities transmitter. In this letter, we consider an that releases track jamming once transmitter are detected, otherwise it indiscriminate (e.g., sweep comb jamming). A DRL-based strategy proposed to resist...
Faster-than-Nyquist(FTN) is a promising technique due to higher spectral efficiency, but at cost of introducing the inter-symbol interference (ISI) which usually requires computationally demanding detection algorithms. In order reduce complexity receiver, in this paper, novel Tomlinson-Harashima precoding (THP) scheme proposed for FTN system. conventional THP (CTHP) scheme, ISI introduced by time-packing can only be diminished from several preceding information symbols, results large...
The formation problem of multi-robot is a type in cooperation and it one challenging research directions system. Aiming at the control problem, this paper we propose kind hybrid architecture firstly, which combines reactive based on Motor Schema with hierarchical architecture. Secondly design four kinds basic behaviors architecture, each using fuzzy neural networks. Lastly use nerve cell fuse outputs qua final system, controls executive appliance to act. This method put forward enhances...
This letter investigates a jamming problem in the confrontation scenario when both opposites are intelligent. Most existing studies assumed learning-based jammer could obtain communication feedback as reward, which may be infeasible and limits application. To overcome this limitation, we propose efficacy evaluation method based on change of behaviors, is oriented by idea to reflect trend real effect approximatively. Considering rival intelligent adjust strategy dynamically, multi...
In order to improve the delight of life and efficiency nursing care for elderly or disabled persons in a wheelchair, method automatic tracking caregiver was proposed this paper. The video sequence image acquired by visual sensers installed wheelchair is taken as research object. Firstly, fast motion estimation compensation algorithm based on brisk operator proposed, which turns dynamic background into static background. Then, Mean Shift object realize that intelligent tracks caregiver....
Global motion estimation between two successive frames is important to the process of video stabilization. In proposed approach, global was based on background feature points (BFPS). First, were collected from input by FAST operator; second, point's descriptor and matching FREAK operator.The MSAC used classify BFPS. Last, six parameters affine transform model calculate interframe vector. The experiment results show that he method can stabilize inter-frame jitter, in meanwhile, it improve...
In this paper, we investigate the discrete power control problem in anti-jamming relay communication networks. Based on hierarchical competitive relationships between transmitters (user and relay) jammer, a three-layer Stackelberg game is formulated, which user acts as leader, vice-leader jammer follower. From perspective of hierarchical-game theoretic, formulate optimization multi-armed bandit (MAB) problem, where user, act players each optional strategy considered an arm to select. MAB...
The UP-Voyager II autonomous mobile robot as the experimental platform, a kind of fuzzy adaptive PID algorithm is presented and used for robot's motion control. Aiming at interferential, time varying nonlinear problems in control, design method put forward. This may dynamically adjust proportional coefficient (K <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p</sub> ), integral xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> ) derivative...