scispace - formally typeset
Search or ask a question
Institution

National University of Defense Technology

EducationChangsha, China
About: National University of Defense Technology is a education organization based out in Changsha, China. It is known for research contribution in the topics: Radar & Synthetic aperture radar. The organization has 39430 authors who have published 40181 publications receiving 358979 citations. The organization is also known as: Guófáng Kēxuéjìshù Dàxué & NUDT.


Papers
More filters
Proceedings ArticleDOI
04 Dec 2010
TL;DR: Experimental results show that in the presence of faults, FTDR and FTDR-H are better than other fault-Tolerant deflection routing algorithms and a turn model based fault-tolerant routing algorithm.
Abstract: We propose a reconfigurable fault-tolerant deflection routing algorithm (FTDR) based on reinforcement learning for NoC. The algorithm reconfigures the routing table through a kind of reinforcement learning---Q-learning using 2-hop fault information. It is topology-agnostic and insensitive to the shape of the fault region. In order to reduce the routing table size, we also propose a hierarchical Q-learning based deflection routing algorithm (FTDR-H) with area reduction up to 27% for a switch in an 8 x 8 mesh compared to the original FTDR. Experimental results show that in the presence of faults, FTDR and FTDR-H are better than other fault-tolerant deflection routing algorithms and a turn model based fault-tolerant routing algorithm.

83 citations

Journal ArticleDOI
TL;DR: Experiments show that the features extracted by CAE-ELM are superior to existing hand-crafted features and other deep learning methods or ELM models, and the classification accuracy of the proposed architecture is superior to that of other methods on ModelNet10 and ModelNet40.

83 citations

Journal ArticleDOI
TL;DR: A cloud‐based anti‐malware system, called CloudEyes, which provides efficient and trusted security services for resource‐constrained devices and can outperform other existing systems with less time and communication consumption.
Abstract: Summary Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource-constrained devices to guard against potential risks. The traditional host-based security solution becomes puffy and inapplicable with the development of malware attacks. Moreover, it is hard for the cloud-based security solution to achieve both the high performance detection and the data privacy protection simultaneously. This paper proposes a cloud-based anti-malware system, called CloudEyes, which provides efficient and trusted security services for resource-constrained devices. For the cloud server, CloudEyes presents suspicious bucket cross-filtering, a novel signature detection mechanism based on the reversible sketch structure, which provides retrospective and accurate orientations of malicious signature fragments. For the client, CloudEyes implements a lightweight scanning agent which utilizes the digest of signature fragments to dramatically reduce the range of accurate matching. Furthermore, by transmitting sketch coordinates and the modular hashing, CloudEyes guarantees both the data privacy and low-cost communications. Finally, we evaluate the performance of CloudEyes by utilizing both the campus suspicious traffic and normal files. The results demonstrate that the mechanisms in CloudEyes are effective and practical, and our system can outperform other existing systems with less time and communication consumption. Copyright © 2016 John Wiley & Sons, Ltd.

83 citations

Journal ArticleDOI
TL;DR: This letter investigates the secure transmission optimization in a multibeam satellite downlink network with multiple eavesdroppers, where each legitimate user is wiretapped by a corresponding eavesdropper.
Abstract: This letter investigates the secure transmission optimization in a multibeam satellite downlink network with multiple eavesdroppers, where each legitimate user is wiretapped by a corresponding eavesdropper. Our design objective is to maximize the sum secrecy rate of the multibeam satellite network in the presence of imperfect channel state information (CSI) of eavesdroppers, while guaranteeing the total transmit power constraint on-board the satellite. Due to the nonconvexity and intractability resulting from the eavesdroppers’ CSI uncertainty, a robust beamforming scheme is proposed to transform the initial optimization problem into a convex framework by jointly applying the Taylor expansion, S-Procedure, and Cauchy–Schwarz inequality. Meanwhile, an iterative algorithm is introduced to obtain the optimal solution. Finally, the validity and superiority of the proposed scheme are confirmed through comparisons with the existing nonrobust and perfect CSI approaches.

83 citations

Proceedings Article
12 Jun 2014
TL;DR: In this article, the authors created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets and features exclusively human models, in a variety of body shapes and poses.
Abstract: We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets Our dataset features exclusively human models, in a variety of body shapes and poses 3D models of humans are commonly used within computer graphics and vision, and so the ability to distinguish between body shapes is an important shape retrieval problem In this track nine groups have submitted the results of a total of 22 different methods which have been tested on our new dataset

83 citations


Authors

Showing all 39659 results

NameH-indexPapersCitations
Rui Zhang1512625107917
Jian Li133286387131
Chi Lin1251313102710
Wei Xu103149249624
Lei Liu98204151163
Xiang Li97147242301
Chang Liu97109939573
Jian Huang97118940362
Tao Wang97272055280
Wei Liu96153842459
Jian Chen96171852917
Wei Wang95354459660
Peng Li95154845198
Jianhong Wu9372636427
Jianhua Zhang9241528085
Network Information
Related Institutions (5)
Harbin Institute of Technology
109.2K papers, 1.6M citations

94% related

Tsinghua University
200.5K papers, 4.5M citations

91% related

University of Science and Technology of China
101K papers, 2.4M citations

90% related

City University of Hong Kong
60.1K papers, 1.7M citations

89% related

Dalian University of Technology
71.9K papers, 1.1M citations

89% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
202397
2022468
20212,986
20203,468
20193,695