Zheng Huang

ORCID: 0009-0003-2994-8030
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Handwritten Text Recognition Techniques
  • Privacy-Preserving Technologies in Data
  • Image Processing and 3D Reconstruction
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • Natural Language Processing Techniques
  • Network Security and Intrusion Detection
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • Complexity and Algorithms in Graphs
  • Image Retrieval and Classification Techniques
  • Video Surveillance and Tracking Methods
  • Cooperative Communication and Network Coding
  • Cloud Computing and Resource Management
  • Music and Audio Processing
  • Advanced Neural Network Applications
  • Vehicle License Plate Recognition
  • Anomaly Detection Techniques and Applications
  • Speech and Audio Processing
  • Advanced Optimization Algorithms Research
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Image and Video Retrieval Techniques
  • Cloud Data Security Solutions
  • Digital Media Forensic Detection

Shanghai University of Engineering Science
2024

Nanchang University
2007-2024

Beijing Academy of Artificial Intelligence
2024

Shanghai Artificial Intelligence Laboratory
2024

Shanghai Jiao Tong University
2013-2023

McMaster University
2023

University of Kent
2023

Nanjing University of Posts and Telecommunications
2023

Nanjing University of Aeronautics and Astronautics
2020

South China University of Technology
2012-2020

The ICDAR 2019 Challenge on "Scanned receipts OCR and key information extraction" (SROIE) covers important aspects related to the automated analysis of scanned receipts. SROIE tasks play a role in many document systems hold significant commercial potential. Although lot work has been published over years administrative analysis, community advanced relatively slowly, as most datasets have kept private. One contributions is offer first, standardized dataset 1000 whole receipt images...

10.1109/icdar.2019.00244 preprint EN 2019-09-01

In this paper, we introduce a novel end-end framework for multi-oriented scene text detection from an instance-aware semantic segmentation perspective. We present Fused Text Segmentation Networks, which combine multi-level features during the feature extracting as instance may rely on finer expression compared to general objects. It detects and segments jointly simultaneously, leveraging merits both task region proposal based object task. Not involving any extra pipelines, our approach...

10.1109/icpr.2018.8546066 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2018-08-01

Driven by the vision of Internet Things, some research efforts have already focused on designing a network efficient speech recognition for development edge computing. Other researches (such as tpool2) do not make full use spatial and temporal information in acoustic features speech. In this paper, we propose compact with spatio-temporal computing, named EdgeRNN. Alternatively, EdgeRNN uses 1-Dimensional Convolutional Neural Network (1-D CNN) to process overall each frequency domain...

10.1109/access.2020.2990974 article EN cc-by IEEE Access 2020-01-01

This article studies the robust fuzzy attitude control strategy for networked spacecraft consisting of physically independent modules that interact through network communication. The effects inertia uncertainties, delayed feedback, actuator saturation, and external disturbances are simultaneously taken into account when designing law. Based on aperiodic sampling, an adaptive event-triggered scheme avoiding Zeno phenomenon naturally is introduced to reduce communication burden network. By...

10.1109/taes.2020.3012000 article EN IEEE Transactions on Aerospace and Electronic Systems 2020-07-27

Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, it proved that RNN works well in those areas. In this paper, we propose using with long short-term memory (LSTM) units for server load performance prediction. Classical methods prediction focus on building relation between domain, which makes a lot of unrealistic hypotheses. Our model is built based events (user requests), the root cause...

10.1155/2017/8584252 article EN cc-by Complexity 2017-01-01

Cluster assignment of large and complex datasets is a crucial but challenging task in pattern recognition computer vision. In this study, we explore the possibility employing fuzzy clustering deep neural network framework. Thus, present novel evolutionary unsupervised learning representation model with iterative optimization. It implements adaptive (DAFC) strategy that learns convolutional classifier from given only unlabeled data samples. DAFC consists feature quality-verifying model, where...

10.1109/tnnls.2023.3243666 article EN IEEE Transactions on Neural Networks and Learning Systems 2023-02-16

In this paper we present a research on identification of audio recording devices from background noise, thus providing method for forensics. The signal is the sum speech and noise signal. Usually, people pay more attention to signal, because it carries information deliver. So great amount researches have been dedicated getting higher Signal-Noise-Ratio (SNR). There are many enhancement algorithms improve quality speech, which can be seen as reducing noise. However, noises regarded intrinsic...

10.1109/siprocess.2016.7888298 preprint EN 2016-08-01

Recognizing text in images has been a hot research topic computer vision for decades due to its various application. However, the variations appearance term of perspective distortion, line curvature, styles, etc., cause great trouble recognition. Inspired by Transformer structure [1] that achieved outstanding performance many natural language processing related applications, we propose new Transformer-like recognition images, which is referred as Hierarchical Attention Network (HATN). The...

10.1109/icip.2019.8803203 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2019-08-26

Cloud computing has been exploited in managing large-scale IoT systems. cloud servers usually handle a large number of requests from various devices. Due to the fluctuant and heavy workload, require provide high scalability, stable performance, low price necessary functionalities. However, traditional clouds offer service with abstraction virtual machine (VM), which can hardly meet these requirements. Meanwhile, different vendors performance stabilities models, fluctuate according dynamic...

10.23919/jcc.2020.09.001 article EN China Communications 2020-09-01

As for cluster-based wireless sensor networks (WSNs), cluster lifetime is one of the most important subjects in recent researches. Besides reducing energy consumptions clusters, it necessary to make clusters achieve equal lifetimes so that whole network can survive longer. In this paper, we focus on multi-hop WSNs with cooperative multi-input single-output scheme. With a simplified model WSNs, change transmission schemes, sizes and distances investigate their effects lifetimes. Furthermore,...

10.1109/jcn.2012.6292251 article EN Journal of Communications and Networks 2012-08-01

In this paper, we introduce a novel end-end framework for multi-oriented scene text detection from an instance-aware semantic segmentation perspective. We present Fused Text Segmentation Networks, which combine multi-level features during the feature extracting as instance may rely on finer expression compared to general objects. It detects and segments jointly simultaneously, leveraging merits both task region proposal based object task. Not involving any extra pipelines, our approach...

10.48550/arxiv.1709.03272 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Mis- and disinformation online have become a major societal problem as sources of harms different kinds. One common form mis- is out-of-context (OOC) information, where pieces information are falsely associated, e.g., real image combined with false textual caption or misleading description. Although some past studies attempted to defend against OOC through external evidence, they tend disregard the role evidence stances. Motivated by intuition that stance represents bias towards detection...

10.18653/v1/2023.emnlp-main.259 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2023-01-01
Coming Soon ...