Chen Zhong

ORCID: 0000-0003-3934-4436
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Algorithms and Applications
  • Fire Detection and Safety Systems
  • Cooperative Communication and Network Coding
  • Anomaly Detection Techniques and Applications
  • Caching and Content Delivery
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Measurement and Detection Methods
  • Fire dynamics and safety research
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • Network Security and Intrusion Detection
  • Remote-Sensing Image Classification
  • Infrared Target Detection Methodologies
  • Remote Sensing and Land Use
  • Smart Grid Security and Resilience
  • Advanced Optimization Algorithms Research
  • Fault Detection and Control Systems
  • Automated Road and Building Extraction
  • Video Surveillance and Tracking Methods
  • Advanced Numerical Analysis Techniques
  • Evacuation and Crowd Dynamics
  • Image Processing Techniques and Applications
  • Distributed Sensor Networks and Detection Algorithms
  • Age of Information Optimization
  • Industrial Technology and Control Systems

Syracuse University
2018-2024

Center Point
2019-2024

Shenyang Fire Research Institute
2016-2024

Yangtze University
2006-2023

Huazhong University of Science and Technology
2014-2023

Huaiyin Institute of Technology
2021

Capital Medical University
2020

Nanyang Technological University
2019

Beihang University
2014-2015

South China University of Technology
2014

Content caching at the edge nodes is a promising technique to reduce data traffic in next-generation wireless networks. Inspired by success of Deep Reinforcement Learning (DRL) solving complicated control problems, this work presents DRL-based framework with Wolpertinger architecture for content base station. The proposed aimed maximizing long-term cache hit rate, and it requires no knowledge popularity distribution. To evaluate framework, we compare performance other algorithms, including...

10.1109/ciss.2018.8362276 article EN 2018-03-01

With the purpose to offload data traffic in wireless networks, content caching techniques have recently been studied intensively. Using these and a portion of popular files at local servers, users can be served with less delay. Most replacement policies are based on popularity, that depends users' preferences. In practice, such information varies over time. Therefore, an approach determine file popularity patterns must incorporated into policies. this context, we study network edge using...

10.1109/tccn.2020.2968326 article EN publisher-specific-oa IEEE Transactions on Cognitive Communications and Networking 2020-01-21

To make efficient use of limited spectral resources, we in this work propose a deep actor-critic reinforcement learning based framework for dynamic multichannel access. We consider both single-user case and scenario which multiple users attempt to access channels simultaneously. employ the proposed as single agent case, extend it decentralized multi-agent multi-user scenario. In cases, develop algorithms evaluate policies via experiments numerical results. model, order performance channel...

10.1109/tccn.2019.2952909 article EN IEEE Transactions on Cognitive Communications and Networking 2019-11-12

The growing demand on high-quality and low-latency multimedia services has led to much interest in edge caching techniques. Motivated by this, we this paper consider at the base stations with unknown content popularity distributions. To solve dynamic control problem of making decisions, propose a deep actor-critic reinforcement learning based multi-agent framework aim minimize overall average transmission delay. evaluate proposed framework, compare learning-based performance three other...

10.1109/icc.2019.8762084 article EN 2019-05-01

Anomaly detection is widely applied in a variety of domains, involving for instance, smart home systems, network traffic monitoring, IoT applications and sensor networks. In this paper, we study deep reinforcement learning based active sequential testing anomaly detection. We assume that there an unknown number abnormal processes at time the agent can only check with one each sampling step. To maximize confidence level decision minimize stopping concurrently, propose actor-critic framework...

10.1109/globecom38437.2019.9013223 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

As the applications of deep reinforcement learning (DRL) in wireless communication grow, sensitivity DRL based strategies against adversarial attacks has started to draw more attention. In order address such and alleviate resulting security concerns, we this paper study defense DRL-based jamming attacker on a dynamic multichannel access agent. To defend attacks, propose three diversified strategies: proportional-integral-derivative (PID) control, use an imitation development orthogonal...

10.1109/ciss48834.2020.1570629719 article EN 2020-03-01

Due to the scarcity in wireless spectrum and limited energy resources especially mobile applications, efficient resource allocation strategies are critical networks. Motivated by recent advances deep reinforcement learning (DRL), we address multi-agent DRL-based joint dynamic channel access power control a interference network. We first propose DRL algorithm with centralized training (DRL-CT) tackle problem. In this case, is performed at central unit (CU) after training, users make...

10.1109/tvt.2021.3131534 article EN IEEE Transactions on Vehicular Technology 2021-11-30

We consider the dynamic multichannel access problem, which can be formulated as a partially observable Markov decision process (POMDP). first propose model-free actor-critic deep reinforcement learning based framework to explore sensing policy. To evaluate performance of proposed policy and framework's tolerance against uncertainty, we test in scenarios with different channel switching patterns probabilities. Then, time-varying environment identify adaptive ability framework. Additionally,...

10.1109/globalsip.2018.8646405 preprint EN 2018-11-01

This study introduces a novel approach, Local Spatial Projection Convolution (LSPConv), for point cloud classification and semantic segmentation. Unlike conventional methods utilizing relative coordinates local geometric information, our motivation stems from the inadequacy of existing techniques representing intricate spatial organization unconsolidated irregular 3D clouds. To address this limitation, we propose Module vector projection strategy, designed to capture comprehensive...

10.7717/peerj-cs.1738 article EN cc-by PeerJ Computer Science 2024-01-05

10.1016/j.jmaa.2008.03.023 article EN Journal of Mathematical Analysis and Applications 2008-03-17

Due to the fact that WorldView-2 (WV2) has a small time lag while acquiring images from panchromatic (PAN) and two multispectral (MS1 MS2) sensors, moving vehicle is located at different positions in three image bands. Consequently, such displacement can be utilized identify vehicles, information, as speed direction estimated. In this paper, we focus on detection according information present novel processing chain. The locations are extracted by an improved morphological detector based...

10.3390/rs6076500 article EN cc-by Remote Sensing 2014-07-16

Recently, wireless caching techniques have been studied to satisfy lower delay requirements and offload traffic from peak periods. By storing parts of the popular files at mobile users, users can locate some their requested in own caches or neighbors. In latter case, when a user receives its neighbors, device-to-device (D2D) communication is performed. The D2D underlaid with cellular networks also new paradigm for upcoming systems. allowing pair adjacent communicate directly, achieve higher...

10.1109/access.2018.2881038 article EN cc-by-nc-nd IEEE Access 2018-01-01

The existing relative radiometric normalization methods are insufficient to define the invariant pixels automatically, and conventional do not perform well when multitemporal images contain a lot of changes. Two types changes should be particularly considered: one is caused by significant spectral differences due change ground objects, other in regions misalignment displacement acquisition view angles geometrical distortions. To automatically extract reduce influence changes, hierarchical...

10.1109/lgrs.2015.2506643 article EN IEEE Geoscience and Remote Sensing Letters 2015-12-23

The high spatial resolution remote sensing image provide more details such as color, size, shape, context and texture. traditional pixel-based classifier cannot satisfying results may reduce the classification accuracy. So object-oriented processing for extraction of information from data become interest. first step is segmentation. object derived by means multi-scale segmentation in this paper. hierarchical region-merging are implemented. procedure does not stop until average size all...

10.1109/igarss.2005.1526648 article EN 2005-11-15

As a successful metaheuristic, Ant Colony Optimization (ACO) performs excellently in solving most combinatorial optimization problems. However, the ACO algorithm needs considerable computational time and resources when complexity of problem increases. Parallel implementing is good ideal to speedup it. A new parallel ant colony (PACO) presented, which has characteristics coarse-granularity interacting multi colonies, partially asynchronous implementation information exchange strategy. The...

10.1109/paciia.2008.248 article EN 2008-12-01

To address the anomaly detection problem in presence of noisy observations and to tackle tuning efficient exploration challenges that arise deep reinforcement learning algorithms, we this paper propose a soft actor-critic framework. evaluate proposed framework, measure its performance terms accuracy, stopping time, total number samples needed for detection. Via simulation results, demonstrate when algorithms are employed, identify impact key parameters, such as sensing cost, on performance....

10.1109/icassp43922.2022.9747436 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

Extracting buildings from remote sensing images is a significant task with many applications such as map drawing, city planning, population estimation, etc. However, traditional methods that rely on artificially designed features struggle to perform well due the diverse appearance and complicated background. In this paper, we design an end-to-end convolutional neural network combines semantic segmentation edge detection for building extraction. addition, propose residual unit combined...

10.1117/12.2538019 article EN 2020-02-14

We address the problem of sequentially selecting and observing processes from a given set to find anomalies among them. The decision-maker observes subset at any time instant obtains noisy binary indicator whether or not corresponding process is anomalous. develop an anomaly detection algorithm that chooses be observed instant, decides when stop taking observations, declares decision on anomalous processes. objective identify with accuracy exceeding desired value while minimizing delay in...

10.1109/tsipn.2023.3313818 article EN IEEE Transactions on Signal and Information Processing over Networks 2023-01-01

As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity DRL based communication strategies against adversarial attacks has started to draw increasing attention. In order address such and alleviate resulting security concerns, we this paper consider a victim user that performs DRL-based dynamic channel access, an attacker executes DRLbased jamming disrupt victim. Hence, both are agents can interact with each other, retrain their models, adapt...

10.48550/arxiv.2007.06055 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Time domain gating in vector network analyzers (VNAs) is used widely EMC and other RF measurement applications. Conceptually, it straightforward - the analyzer first converts frequency data to time via inverse Fourier transform, a gate applied include or exclude certain periods. Because provided as built-in function commercial analyzers, user typically does not concern himself with details of mathematical process. However, actual implementations are different VNAs, especially designs band...

10.23919/emctokyo.2019.8893825 article EN 2019-06-01

The precise capture and identification of movement features are important for numerous scientific endeavors. In this work, we present a novel multimodal sensor, called the resistance/capacitance dual-mode (RCDM) which effectively differentiates between compression stretchable strains during tennis motion; meanwhile, it can also accurately identify various joint movements. proposed wearable device seamless design, comprising two separate components: resistive part capacitive part. components...

10.1155/2023/5079256 article EN Journal of Sensors 2023-01-01

Unmanned Aircraft Systems (UAS) operations are changing the way aviation and commerce conducted today. Until recently, for civil commercial operations, nearly all UAS within visual line of sight (VLOS). However, this severely limits economic benefits that can be realized by use these unmanned, someday, autonomous systems.Beyond (BVLOS) require much more capabilities operator to rely on general public condone comfortable with. BVLOS ground platform technologies with varying states maturity....

10.1109/icns50378.2020.9222956 article EN 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS) 2020-09-01
Coming Soon ...