Zhibin Feng

ORCID: 0000-0003-0245-4332
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Distributed Control Multi-Agent Systems
  • Wireless Communication Security Techniques
  • Robotic Path Planning Algorithms
  • Robotics and Automated Systems
  • Face recognition and analysis
  • Robotics and Sensor-Based Localization
  • Biometric Identification and Security
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Cognitive Radio Networks and Spectrum Sensing
  • Mobile Ad Hoc Networks
  • Advanced Wireless Network Optimization
  • Advanced Sensor and Control Systems
  • Advanced Image and Video Retrieval Techniques
  • Advanced Malware Detection Techniques
  • Guidance and Control Systems
  • Advanced Bandit Algorithms Research
  • Industrial Technology and Control Systems
  • UAV Applications and Optimization
  • Reconstructive Facial Surgery Techniques
  • Adaptive Control of Nonlinear Systems
  • Magnetic Field Sensors Techniques
  • Digital Media Forensic Detection
  • Elevator Systems and Control

PLA Army Engineering University
2018-2025

University of Sheffield
2025

PLA Air Force Aviation University
2008-2023

Xi'an High Tech University
2022

Harbin Institute of Technology
2021

Changchun University
2010-2020

Hebei Science and Technology Department
2019

Zhongji Test Equipment (China)
2014

Harbin Engineering University
2010

This paper investigates the multi-user power control problem in relay-assisted anti-jamming systems. Because of hierarchical confrontation characteristics between users and jammer, we take incomplete information observation error into consideration formulate an Bayesian three-layer Stackelberg game, which primary act as leaders, relay vice-leaders, jammer acts a follower. Both have ability to sense others' transmission choose optimal realize maximum utility. Based on backward induction...

10.1109/access.2019.2893459 article EN cc-by-nc-nd IEEE Access 2019-01-01

In this article, we study the problem of anti-jamming through channel selection in fading environment. Different from most existing works which ignored characteristic channels, use a Markov model to capture influence variable transmission rate Then, as decision process. On basis, an online reinforcement learning algorithm (Q-learning) is proposed select optimal intelligently. Simulation results show that outperforms sensing algorithm. The reason it can learn both pattern jamming signal and...

10.1109/icct.2018.8600218 article EN 2018-10-01

Ear recognition is a biometric identification technology based on human ear feature information, which can not only detect the in picture but also determine whose it is, so identity be verified by recognition. In order to improve real-time performance of algorithm and make better for practical applications, lightweight method YOLOv5s proposed. This mainly includes following steps: First, MobileNetV3 network used as backbone network. Second, using idea Ghostnet network, C3 module Conv neck...

10.3390/app13116667 article EN cc-by Applied Sciences 2023-05-30

In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). We consider scenario that when FAE intrudes underlaying cellular networks, it can passively wiretap confidential messages in actively jam all legitimate links. A hierarchical heterogeneous power control mechanism multiple user equipments (DUEs) one equipment (CUE) is proposed to combat intelligent FAE. Moreover, multi-tier Stackelberg game...

10.1109/access.2019.2906845 article EN cc-by-nc-nd IEEE Access 2019-01-01

This paper investigates a power control problem in jamming system, where separate smart jammer is deployed to ensure the communication security of legal user. However, due leakage, may incur unintentional interference users. The key how suppress illegal while limit negative impact on A counter measure Stackelberg game formulated model dynamic system. acts as leader sense and interfere communications user, user follower. In game, uncertain channel information taken into account. According...

10.23919/jcc.2021.04.010 article EN China Communications 2021-04-01

This paper mainly investigates the unmanned aerial vehicle (UAV) communication networks under threat of a static malicious jammer. While taking flying process user (UAV transmitter-receiver pair) into consideration, we propose joint power and trajectory optimization method. Moreover, Stackelberg framework is formulated to solve proposed problem. In addition, algorithm (JPTOA) based on best-response (BR) designed obtain user's strategy as well equilibrium (SE) in each time stage. Furthermore,...

10.1109/icc.2019.8761467 article EN 2019-05-01

In this letter, we study the problem of jamming pattern recognition (JPR) when some patterns have no training samples. Existing works were designed for known only, hence they failed to deal with unknown patterns. To address challenge, a zero-shot learning (ZSL) based JPR scheme is proposed. Firstly, supervised process introduced learn latent feature representation Then, an unsupervised classification approach proposed recognize different Finally, both and are classified in space. Simulation...

10.1109/lwc.2021.3140145 article EN IEEE Wireless Communications Letters 2022-01-04

Abstract In view of the anti‐tracking‐jamming problem, traditional online learning methods usually cannot analyse jamming behaviour, and find an effective way to prevent attacks. To cope with these challenges, a novel communication/deception dual mode mechanism is proposed in this paper. Deception users are selected send high‐power signal for attraction, form collaborative relationships communication users. The corresponding anti‐jamming model then constructed as Markov game multi‐agent...

10.1049/cmu2.12339 article EN cc-by-nc-nd IET Communications 2022-03-03

In this letter, we investigate an intelligent jamming problem in a wireless confrontation scenario where both the user and jammer can dynamically adjust spectrum access or pattern. To realize accurate attacks, first propose deep learning-based pattern recognition method to recognize user's patterns. Then, based on results, design targeted methods including conventional patterns reinforcement Moreover, practical demonstration system is designed built software-defined radio (SDR) platform for...

10.1109/lwc.2022.3204898 article EN IEEE Wireless Communications Letters 2022-09-06

In multi-agent confrontation scenarios, a jammer is constrained by the single limited performance and inefficiency of practical application. To cope with these issues, this paper aims to investigate jamming problem in multi-user scenario, where coordination between jammers considered. Firstly, Markov decision process (MDP) framework used model analyze problem. Secondly, collaborative algorithm (CMJA) based on reinforcement learning proposed. Finally, an actual intelligent system designed...

10.23919/jcc.2022.10.003 article EN China Communications 2022-10-01

We investigate the problem of dynamic spectrum anti-jamming access against intelligent jammer using game theory and opponent modeling. Previous work has formulated interaction between user as an adversarial game, aimed to find Nash Equilibrium (NE). However, sticking NE will lead overcautious behaviors can't achieve best performance while is sub-optimal. Thus, this letter tries exploit adaptive Best Response (BR) rather than NE. propose minimax deep Q network (DQN) approximate utility...

10.1109/lwc.2022.3219434 article EN IEEE Wireless Communications Letters 2022-11-04

In this paper, we study joint relay selection and the power control optimization problem in an anti-jamming communication system. Considering hierarchical competitive relationship between a user jammer, formulate as Stackelberg game. From perspective of game, selects strategy firstly which acts leader, while jammer chooses then that follower. Moreover, prove existence equilibrium. Based on Q-learning algorithm multi-armed bandit method, is proposed. Simulation results show user’s probability...

10.3390/app9163348 article EN cc-by Applied Sciences 2019-08-14

Human ear recognition technology is an emerging in biometrics. It has high theoretical research value and market application prospects, it gradually develops with the development of image processing, pattern other fields. Aiming at problem insufficient accuracy detection speed human practical applications, This paper constructs a method based on SSD_MobileNet_v1 target model. The data set uses USTB library University Science Technology Beijing, enhanced annotated to eliminate influence noise...

10.1109/cac51589.2020.9326541 article EN 2020-11-06

This letter investigates the problem of combating intelligent reactive jammer through a deep reinforcement learning (DRL) based hidden strategy. Existing anti-jamming researches always assume capacity-limited adversary which is non-reactive or only launches attacks while detecting activities transmitter. In this letter, we consider an that releases track jamming once transmitter are detected, otherwise it indiscriminate (e.g., sweep comb jamming). A DRL-based strategy proposed to resist...

10.1109/lwc.2022.3165633 article EN IEEE Wireless Communications Letters 2022-04-07

Faster-than-Nyquist(FTN) is a promising technique due to higher spectral efficiency, but at cost of introducing the inter-symbol interference (ISI) which usually requires computationally demanding detection algorithms. In order reduce complexity receiver, in this paper, novel Tomlinson-Harashima precoding (THP) scheme proposed for FTN system. conventional THP (CTHP) scheme, ISI introduced by time-packing can only be diminished from several preceding information symbols, results large...

10.1109/access.2019.2962069 article EN cc-by IEEE Access 2020-01-01

The formation problem of multi-robot is a type in cooperation and it one challenging research directions system. Aiming at the control problem, this paper we propose kind hybrid architecture firstly, which combines reactive based on Motor Schema with hierarchical architecture. Secondly design four kinds basic behaviors architecture, each using fuzzy neural networks. Lastly use nerve cell fuse outputs qua final system, controls executive appliance to act. This method put forward enhances...

10.1109/paciia.2008.255 article EN 2008-12-01

This letter investigates a jamming problem in the confrontation scenario when both opposites are intelligent. Most existing studies assumed learning-based jammer could obtain communication feedback as reward, which may be infeasible and limits application. To overcome this limitation, we propose efficacy evaluation method based on change of behaviors, is oriented by idea to reflect trend real effect approximatively. Considering rival intelligent adjust strategy dynamically, multi...

10.1109/lwc.2022.3199743 article EN IEEE Wireless Communications Letters 2022-08-25

In order to improve the delight of life and efficiency nursing care for elderly or disabled persons in a wheelchair, method automatic tracking caregiver was proposed this paper. The video sequence image acquired by visual sensers installed wheelchair is taken as research object. Firstly, fast motion estimation compensation algorithm based on brisk operator proposed, which turns dynamic background into static background. Then, Mean Shift object realize that intelligent tracks caregiver....

10.1109/ccdc.2016.7531094 article EN 2016-05-01

Global motion estimation between two successive frames is important to the process of video stabilization. In proposed approach, global was based on background feature points (BFPS). First, were collected from input by FAST operator; second, point's descriptor and matching FREAK operator.The MSAC used classify BFPS. Last, six parameters affine transform model calculate interframe vector. The experiment results show that he method can stabilize inter-frame jitter, in meanwhile, it improve...

10.1109/cac51589.2020.9326474 article EN 2020-11-06

In this paper, we investigate the discrete power control problem in anti-jamming relay communication networks. Based on hierarchical competitive relationships between transmitters (user and relay) jammer, a three-layer Stackelberg game is formulated, which user acts as leader, vice-leader jammer follower. From perspective of hierarchical-game theoretic, formulate optimization multi-armed bandit (MAB) problem, where user, act players each optional strategy considered an arm to select. MAB...

10.1109/iccc51575.2020.9344934 article EN 2020-12-11

The UP-Voyager II autonomous mobile robot as the experimental platform, a kind of fuzzy adaptive PID algorithm is presented and used for robot's motion control. Aiming at interferential, time varying nonlinear problems in control, design method put forward. This may dynamically adjust proportional coefficient (K <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p</sub> ), integral xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> ) derivative...

10.1109/iccsnt.2013.6967342 article EN 2013-10-01
Coming Soon ...