The search functionality is under construction.

Author Search Result

[Author] He LI(23hit)

1-20hit(23hit)

  • P2P Based Social Network over Mobile Ad-Hoc Networks

    He LI  KyoungSoo BOK  JaeSoo YOO  

     
    LETTER-Information Network

      Vol:
    E97-D No:3
      Page(s):
    597-600

    In this paper, we design an efficient P2P based mobile social network to facilitate contents search over mobile ad hoc networks. Social relation is established by considering both the locations and interests of mobile nodes. Mobile nodes with common interests and nearby locations are recommended as friends and are connected directly in a mobile social network. Contents search is handled by using social relationships of the mobile social network rather than those of the whole network. Since each mobile node manages only neighboring nodes that have common interests, network management overhead is reduced. Results of experiments have shown that our proposed method outperforms existing methods.

  • Distance between Two Classes: A Novel Kernel Class Separability Criterion

    Jiancheng SUN  Chongxun ZHENG  Xiaohe LI  

     
    LETTER

      Vol:
    E92-D No:7
      Page(s):
    1397-1400

    With a Gaussian kernel function, we find that the distance between two classes (DBTC) can be used as a class separability criterion in feature space since the between-class separation and the within-class data distribution are taken into account impliedly. To test the validity of DBTC, we develop a method of tuning the kernel parameters in support vector machine (SVM) algorithm by maximizing the DBTC in feature space. Experimental results on the real-world data show that the proposed method consistently outperforms corresponding hyperparameters tuning methods.

  • End-to-End Exposure Fusion Using Convolutional Neural Network

    Jinhua WANG  Weiqiang WANG  Guangmei XU  Hongzhe LIU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/11/22
      Vol:
    E101-D No:2
      Page(s):
    560-563

    In this paper, we describe the direct learning of an end-to-end mapping between under-/over-exposed images and well-exposed images. The mapping is represented as a deep convolutional neural network (CNN) that takes multiple-exposure images as input and outputs a high-quality image. Our CNN has a lightweight structure, yet gives state-of-the-art fusion quality. Furthermore, we know that for a given pixel, the influence of the surrounding pixels gradually increases as the distance decreases. If the only pixels considered are those in the convolution kernel neighborhood, the final result will be affected. To overcome this problem, the size of the convolution kernel is often increased. However, this also increases the complexity of the network (too many parameters) and the training time. In this paper, we present a method in which a number of sub-images of the source image are obtained using the same CNN model, providing more neighborhood information for the convolution operation. Experimental results demonstrate that the proposed method achieves better performance in terms of both objective evaluation and visual quality.

  • Computing the k-Error Linear Complexity of q-Ary Sequences with Period 2pn

    Zhihua NIU  Zhe LI  Zhixiong CHEN  Tongjiang YAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:9
      Page(s):
    1637-1641

    The linear complexity and its stability of periodic sequences are of fundamental importance as measure indexes on the security of stream ciphers and the k-error linear complexity reveals the stability of the linear complexity properly. Recently, Zhou designed an algorithm for computing the k-error linear complexity of 2pn periodic sequences over GF(q). In this paper, we develop a genetic algorithm to confirm that one can't get the real k-error linear complexity for some sequenes by the Zhou's algorithm. Analysis indicates that the Zhou's algorithm is unreasonable in some steps. The corrected algorithm is presented. Such algorithm will increase the amount of computation, but is necessary to get the real k-error linear complexity. Here p and q are odd prime, and q is a primitive root (mod p2).

  • AutoRobot: A Multi-Agent Software Framework for Autonomous Robots

    Zhe LIU  Xinjun MAO  Shuo YANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/04/04
      Vol:
    E101-D No:7
      Page(s):
    1880-1893

    Certain open issues challenge the software engineering of autonomous robot software (ARS). One issue is to provide enabling software technologies to support autonomous and rational behaviours of robots operating in an open environment, and another issue is the development of an effective engineering approach to manage the complexity of ARS to simplify the development, deployment and evolution of ARS. We introduce the software framework AutoRobot to address these issues. This software provides abstraction and a model of accompanying behaviours to formulate the behaviour patterns of autonomous robots and enrich the coherence between task behaviours and observation behaviours, thereby improving the capabilities of obtaining and using the feedback regarding the changes. A dual-loop control model is presented to support flexible interactions among the control activities to support continuous adjustments of the robot's behaviours. A multi-agent software architecture is proposed to encapsulate the fundamental software components. Unlike most existing research, in AutoRobot, the ARS is designed as a multi-agent system in which the software agents interact and cooperate with each other to accomplish the robot's task. AutoRobot provides reusable software packages to support the development of ARS and infrastructure integrated with ROS to support the decentralized deployment and running of ARS. We develop an ARS sample to illustrate how to use the framework and validate its effectiveness.

  • An Efficient Method for Graph Repartitioning in Distributed Environments

    He LI  YanNa LIU  XuHua WANG  LiangCai SU  Hang YUAN  JaeSoo YOO  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2020/04/20
      Vol:
    E103-D No:7
      Page(s):
    1773-1776

    Due to most of the existing graph repartitioning methods are known for poor efficiency in distributed environments. In this paper, we introduce a new graph repartitioning method with two phases in distributed environments. In the first phase, a local method is designed to identify all the potential candidate vertices that should be moved to the other partitions at once in each partition locally. In the second phase, a streaming graph processing model is adopted to reassign the candidate vertices to achieve lightweight graph repartitioning. During the reassignment of the vertex, we propose an objective function to balance both the load balance and the number of crossing edges among the distributed partitions. The experimental results with a large set of real word and synthetic graph datasets show that the communication cost can be reduced by nearly 1 to 2 orders of magnitude compared with the existing methods.

  • A Novel Time-Domain DME Interference Mitigation Approach for L-Band Aeronautical Communication System

    Douzhe LI  Zhijun WU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:5
      Page(s):
    1196-1205

    Pulse Pairs (PPs) generated by Distance Measure Equipment (DME) cause severe interference on L-band Digital Aeronautical Communication System type 1 (L-DACS1) which is based on Orthogonal Frequency Division Multiplexing (OFDM). In this paper, a novel and practical PP mitigation approach is proposed. Different from previous work, it adopts only time domain methods to mitigate interference, so it will not affect the subsequent signal processing in frequency domain. At the receiver side, the proposed approach can precisely reconstruct the deformed PPs (DPPs) which are often overlapped and have various parameters. Firstly, a filter bank and a correlation scheme are jointly used to detect non-overlapped DPPs, also a weighted average scheme is used to automatically measure the waveform of DPP. Secondly, based on the measured waveform, sparse estimation is used to estimate the precise positions of DPPs. Finally, the parameters of each DPP are estimated by a non-linear estimator. The key point of this step is, a piecewise linear model is used to approximate the non-linear carrier frequency of each DPP. Numerical simulations show that comparing with existing work, the proposed approach is more robust, closer to interference free environment and its Bit Error Rate is reduced by about 10dB.

  • New Inter-Cluster Proximity Index for Fuzzy c-Means Clustering

    Fan LI  Shijin DAI  Qihe LIU  Guowei YANG  

     
    LETTER-Data Mining

      Vol:
    E91-D No:2
      Page(s):
    363-366

    This letter presents a new inter-cluster proximity index for fuzzy partitions obtained from the fuzzy c-means algorithm. It is defined as the average proximity of all possible pairs of clusters. The proximity of each pair of clusters is determined by the overlap and the separation of the two clusters. The former is quantified by using concepts of Fuzzy Rough sets theory and the latter by computing the distance between cluster centroids. Experimental results indicate the efficiency of the proposed index.

  • MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs

    Anfeng LIU  Xiao LIU  He LI  Jun LONG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2010-2018

    In this paper, a multi-data and multi-ACK verified selective forwarding attacks (SFAs) detection scheme is proposed for containing SFAs. In our scheme, each node (in addition to the nodes in the hotspots area) generates multiple acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. In multiple ACK message, one ACK is returned along the data forwarding path, other ACKs are returned along different routing paths, and thus malicious nodes can be located accurately. At the same time, source node send multiple data routing, one is primary data routing, the others are backup data routing. Primary data is routed to sink directly, but backup data is routed to nodes far from sink, and then waits for the returned ACK of sink when primary data is routed to sink. If a node doesn't receive the ACK, the backup data is routed to sink, thus the success rate of data transmission and lifetime can be improved. For this case, the MDMA scheme has better potential to detect abnormal packet loss and identify suspect nodes as well as resilience against attack. Theoretical analysis and experiments show that MDMA scheme has better ability for ensuring success rate of data transmission, detecting SFA and identifying malicious nodes.

  • 3D Multiple-Contextual ROI-Attention Network for Efficient and Accurate Volumetric Medical Image Segmentation

    He LI  Yutaro IWAMOTO  Xianhua HAN  Lanfen LIN  Akira FURUKAWA  Shuzo KANASAKI  Yen-Wei CHEN  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2023/02/21
      Vol:
    E106-D No:5
      Page(s):
    1027-1037

    Convolutional neural networks (CNNs) have become popular in medical image segmentation. The widely used deep CNNs are customized to extract multiple representative features for two-dimensional (2D) data, generally called 2D networks. However, 2D networks are inefficient in extracting three-dimensional (3D) spatial features from volumetric images. Although most 2D segmentation networks can be extended to 3D networks, the naively extended 3D methods are resource-intensive. In this paper, we propose an efficient and accurate network for fully automatic 3D segmentation. Specifically, we designed a 3D multiple-contextual extractor to capture rich global contextual dependencies from different feature levels. Then we leveraged an ROI-estimation strategy to crop the ROI bounding box. Meanwhile, we used a 3D ROI-attention module to improve the accuracy of in-region segmentation in the decoder path. Moreover, we used a hybrid Dice loss function to address the issues of class imbalance and blurry contour in medical images. By incorporating the above strategies, we realized a practical end-to-end 3D medical image segmentation with high efficiency and accuracy. To validate the 3D segmentation performance of our proposed method, we conducted extensive experiments on two datasets and demonstrated favorable results over the state-of-the-art methods.

  • A Privacy-Preserving Data Feed Scheme for Smart Contracts

    Hao WANG  Zhe LIU  Chunpeng GE  Kouichi SAKURAI  Chunhua SU  

     
    INVITED PAPER

      Pubricized:
    2021/12/06
      Vol:
    E105-D No:2
      Page(s):
    195-204

    Smart contracts are becoming more and more popular in financial scenarios like medical insurance. Rather than traditional schemes, using smart contracts as a medium is a better choice for both participants, as it is fairer, more reliable, more efficient, and enables real-time payment. However, medical insurance contracts need to input the patient's condition information as the judgment logic to trigger subsequent execution. Since the blockchain is a closed network, it lacks a secure network environment for data interaction with the outside world. The Data feed aims to provide the service of the on-chain and off-chain data interaction. Existing researches on the data feed has solved the security problems on it effectively, such as Town Crier, TLS-N and they have also taken into account the privacy-preserving problems. However, these schemes cannot actually protect privacy because when the ciphertext data is executed by the contract, privacy information can still be inferred by analyzing the transaction results, since states of the contract are publicly visible. In this paper, based on zero-knowledge proof and Hawk technology, a on-and-off-chain complete smart contract data feed privacy-preserving scheme is proposed. In order to present our scheme more intuitively, we combined the medical insurance compensation case to implement it, which is called MIPDF. In our MIPDF, the patient and the insurance company are parties involved in the contract, and the hospital is the data provider of data feed. The patient's medical data is sent to the smart contract under the umbrella of the zero-knowledge proof signature scheme. The smart contract verifies the proof and calculates the insurance premium based on the judgment logic. Meanwhile, we use Hawk technology to ensure the privacy of on-chain contract execution, so that no information will be disclosed due to the result of contract execution. We give a general description of our scheme within the Universal Composability (UC) framework. We experiment and evaluate MIPDF on Ethereum for in-depth analysis. The results show that our scheme can securely and efficiently support the functions of medical insurance and achieve complete privacy-preserving.

  • Image Segmentation Using Fuzzy Clustering with Spatial Constraints Based on Markov Random Field via Bayesian Theory

    Xiaohe LI  Taiyi ZHANG  Zhan QU  

     
    PAPER-Image Processing

      Vol:
    E91-A No:3
      Page(s):
    723-729

    Image segmentation is an essential processing step for many image analysis applications. In this paper, a novel image segmentation algorithm using fuzzy C-means clustering (FCM) with spatial constraints based on Markov random field (MRF) via Bayesian theory is proposed. Due to disregard of spatial constraint information, the FCM algorithm fails to segment images corrupted by noise. In order to improve the robustness of FCM to noise, a powerful model for the membership functions that incorporates local correlation is given by MRF defined through a Gibbs function. Then spatial information is incorporated into the FCM by Bayesian theory. Therefore, the proposed algorithm has both the advantages of the FCM and MRF, and is robust to noise. Experimental results on the synthetic and real-world images are given to demonstrate the robustness and validity of the proposed algorithm.

  • BFF R-CNN: Balanced Feature Fusion for Object Detection

    Hongzhe LIU  Ningwei WANG  Xuewei LI  Cheng XU  Yaze LI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/05/17
      Vol:
    E105-D No:8
      Page(s):
    1472-1480

    In the neck part of a two-stage object detection network, feature fusion is generally carried out in either a top-down or bottom-up manner. However, two types of imbalance may exist: feature imbalance in the neck of the model and gradient imbalance in the region of interest extraction layer due to the scale changes of objects. The deeper the network is, the more abstract the learned features are, that is to say, more semantic information can be extracted. However, the extracted image background, spatial location, and other resolution information are less. In contrast, the shallow part can learn little semantic information, but a lot of spatial location information. We propose the Both Ends to Centre to Multiple Layers (BEtM) feature fusion method to solve the feature imbalance problem in the neck and a Multi-level Region of Interest Feature Extraction (MRoIE) layer to solve the gradient imbalance problem. In combination with the Region-based Convolutional Neural Network (R-CNN) framework, our Balanced Feature Fusion (BFF) method offers significantly improved network performance compared with the Faster R-CNN architecture. On the MS COCO 2017 dataset, it achieves an average precision (AP) that is 1.9 points and 3.2 points higher than those of the Feature Pyramid Network (FPN) Faster R-CNN framework and the Generic Region of Interest Extractor (GRoIE) framework, respectively.

  • Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code

    Hongzhe LI  Jaesang OH  Heejo LEE  

     
    LETTER-Software System

      Pubricized:
    2016/06/13
      Vol:
    E99-D No:9
      Page(s):
    2385-2389

    Finding software vulnerabilities in source code before the program gets deployed is crucial to ensure the software quality. Existing source code auditing tools for vulnerability detection generate too many false positives, and only limited types of vulnerability can be detected automatically. In this paper, we propose an extendable mechanism to reveal vulnerabilities in source code with low false positives by specifying security requirements and detecting requirement violations of the potential vulnerable sinks. The experimental results show that the proposed mechanism can detect vulnerabilities with zero false positives and indicate the extendability of the mechanism to cover more types of vulnerabilities.

  • A Novel Four-Point Model Based Unit-Norm Constrained Least Squares Method for Single-Tone Frequency Estimation

    Zhe LI  Yili XIA  Qian WANG  Wenjiang PEI  Jinguang HAO  

     
    PAPER-Digital Signal Processing

      Vol:
    E102-A No:2
      Page(s):
    404-414

    A novel time-series relationship among four consecutive real-valued single-tone sinusoid samples is proposed based on their linear prediction property. In order to achieve unbiased frequency estimates for a real sinusoid in white noise, based on the proposed four-point time-series relationship, a constrained least squares cost function is minimized based on the unit-norm principle. Closed-form expressions for the variance and the asymptotic expression for the variance of the proposed frequency estimator are derived, facilitating a theoretical performance comparison with the existing three-point counterpart, called as the reformed Pisarenko harmonic decomposer (RPHD). The region of performance advantage of the proposed four-point based constrained least squares frequency estimator over the RPHD is also discussed. Computer simulations are conducted to support our theoretical development and to compare the proposed estimator performance with the RPHD as well as the Cramer-Rao lower bound (CRLB).

  • Collaborative Spectrum Sensing via L1/2 Regularization

    Zhe LIU  Feng LI  WenLei DUAN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:1
      Page(s):
    445-449

    This letter studies the problem of cooperative spectrum sensing in wideband cognitive radio networks. Based on the basis expansion model (BEM), the problem of estimation of power spectral density (PSD) is transformed to estimation of BEM coefficients. The sparsity both in frequency domain and space domain is used to construct a sparse estimation structure. The theory of L1/2 regularization is used to solve the compressed sensing problem. Simulation results demonstrate the effectiveness of the proposed method.

  • A Secure and Efficient Certificateless Aggregate Signature Scheme

    He LIU  Mangui LIANG  Haoliang SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:4
      Page(s):
    991-995

    In this letter, we propose a new secure and efficient certificateless aggregate signature scheme which has the advantages of both certificateless public key cryptosystem and aggregate signature. Based on the computational Diffie-Hellman problem, our scheme can be proven existentially unforgeable against adaptive chosen-message attacks. Most importantly, our scheme requires short group elements for aggregate signature and constant pairing computations for aggregate verification, which leads to high efficiency due to no relations with the number of signers.

  • Optimal Power Control of Cognitive Radio under SINR Constraint with Primary User's Cooperation

    Ding XU  Zhiyong FENG  Yizhe LI  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:9
      Page(s):
    2685-2689

    In this letter, we study the power control of a cognitive radio (CR) network, where the secondary user (SU) is allowed to share the spectrum with the primary user (PU) only if the signal to interference plus noise ratio (SINR) at the PU is higher than a predetermined level. Both PU fixed power control and PU adaptive power control are considered. Specifically, for the PU adaptive power control, the PU will cooperate with the SU by transmitting with adaptive power. The optimal power control schemes for the SU to maximize the SU throughput under the PU SINR constraint are derived. It is shown that the SU throughput achieved by the optimal power control with the PU adaptive power control is a significant improvement over the optimal power control with the PU fixed power control, especially under high power constraint and low SINR constraint.

  • Performance Analysis of Lunar Spacecraft Navigation Based on Inter-Satellite Link Annular Beam Antenna

    Lei CHEN  Ke ZHANG  Yangbo HUANG  Zhe LIU  Gang OU  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2016/01/29
      Vol:
    E99-B No:4
      Page(s):
    951-959

    The rapid development of a global navigation satellite system (GNSS) has raised the demand for spacecraft navigation, particularly for lunar spacecraft (LS). First, instead of the traditional approach of combining the united X-band system (UXB) with very-long-baseline interferometry (VLBI) by a terrestrial-based observing station in Chinese deep-space exploration, the spacecraft navigation based on inter-satellite link (ISL) is proposed because the spatial coverage of the GNSS downstream signals is too narrow to be used for LS navigation. Second, the feasibility of LS navigation by using ISL wide beam signals has been analyzed with the following receiving parameters: the geometrical dilution of precision (GDOP) and the carrier-to-noise ratio (C/N0) for satellites autonomously navigation of ISL and LS respectively; the weighting distance root-mean-square (wdrms) for the combination of both navigation modes. Third, to be different from all existing spacecraft ISL and GNSS navigation methods, an ISL annular beam transmitting antenna has been simulated to minimize the wdrms (1.138m) to obtain the optimal beam coverage: 16°-47° on elevation angle. Theoretical calculations and simulations have demonstrated that both ISL autonomous navigation and LS navigation can be satisfied at the same time. Furthermore, an onboard annular wide beam ISL antenna with optimized parameters has been designed to provide a larger channel capacity with a simpler structure than that of the existing GPS ISL spot beam antenna, a better anti-jamming performance than that of the former GPS ISL UHF-band wide band antenna, and a wider effectively operating area than the traditional terrestrial-based measurement. Lastly, the possibility and availability of applying an ISL receiver with an annular wide beam antenna on the Chinese Chang'E-5T (CE-5T) reentry experiment for autonomous navigation are analyzed and verified by simulating and comparing the ISL receiver with the practiced GNSS receiver.

  • Exposure Fusion Using a Relative Generative Adversarial Network

    Jinhua WANG  Xuewei LI  Hongzhe LIU  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2021/03/24
      Vol:
    E104-D No:7
      Page(s):
    1017-1027

    At present, the generative adversarial network (GAN) plays an important role in learning tasks. The basic idea of a GAN is to train the discriminator and generator simultaneously. A GAN-based inverse tone mapping method can generate high dynamic range (HDR) images corresponding to a scene according to multiple image sequences of a scene with different exposures. However, subsequent tone mapping algorithm processing is needed to display it on a general device. This paper proposes an end-to-end multi-exposure image fusion algorithm based on a relative GAN (called RaGAN-EF), which can fuse multiple image sequences with different exposures directly to generate a high-quality image that can be displayed on a general device without further processing. The RaGAN is used to design the loss function, which can retain more details in the source images. In addition, the number of input image sequences of multi-exposure image fusion algorithms is often uncertain, which limits the application of many existing GANs. This paper proposes a convolutional layer with weights shared between channels, which can solve the problem of variable input length. Experimental results demonstrate that the proposed method performs better in terms of both objective evaluation and visual quality.

1-20hit(23hit)