Institution
National University of Defense Technology
Education•Changsha, China•
About: National University of Defense Technology is a education organization based out in Changsha, China. It is known for research contribution in the topics: Radar & Synthetic aperture radar. The organization has 39430 authors who have published 40181 publications receiving 358979 citations. The organization is also known as: Guófáng Kēxuéjìshù Dàxué & NUDT.
Topics: Radar, Synthetic aperture radar, Laser, Fiber laser, Radar imaging
Papers published on a yearly basis
Papers
More filters
••
04 Dec 2010TL;DR: Experimental results show that in the presence of faults, FTDR and FTDR-H are better than other fault-Tolerant deflection routing algorithms and a turn model based fault-tolerant routing algorithm.
Abstract: We propose a reconfigurable fault-tolerant deflection routing algorithm (FTDR) based on reinforcement learning for NoC. The algorithm reconfigures the routing table through a kind of reinforcement learning---Q-learning using 2-hop fault information. It is topology-agnostic and insensitive to the shape of the fault region. In order to reduce the routing table size, we also propose a hierarchical Q-learning based deflection routing algorithm (FTDR-H) with area reduction up to 27% for a switch in an 8 x 8 mesh compared to the original FTDR. Experimental results show that in the presence of faults, FTDR and FTDR-H are better than other fault-tolerant deflection routing algorithms and a turn model based fault-tolerant routing algorithm.
83 citations
••
TL;DR: Experiments show that the features extracted by CAE-ELM are superior to existing hand-crafted features and other deep learning methods or ELM models, and the classification accuracy of the proposed architecture is superior to that of other methods on ModelNet10 and ModelNet40.
83 citations
••
TL;DR: A cloud‐based anti‐malware system, called CloudEyes, which provides efficient and trusted security services for resource‐constrained devices and can outperform other existing systems with less time and communication consumption.
Abstract: Summary
Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource-constrained devices to guard against potential risks. The traditional host-based security solution becomes puffy and inapplicable with the development of malware attacks. Moreover, it is hard for the cloud-based security solution to achieve both the high performance detection and the data privacy protection simultaneously. This paper proposes a cloud-based anti-malware system, called CloudEyes, which provides efficient and trusted security services for resource-constrained devices. For the cloud server, CloudEyes presents suspicious bucket cross-filtering, a novel signature detection mechanism based on the reversible sketch structure, which provides retrospective and accurate orientations of malicious signature fragments. For the client, CloudEyes implements a lightweight scanning agent which utilizes the digest of signature fragments to dramatically reduce the range of accurate matching. Furthermore, by transmitting sketch coordinates and the modular hashing, CloudEyes guarantees both the data privacy and low-cost communications. Finally, we evaluate the performance of CloudEyes by utilizing both the campus suspicious traffic and normal files. The results demonstrate that the mechanisms in CloudEyes are effective and practical, and our system can outperform other existing systems with less time and communication consumption. Copyright © 2016 John Wiley & Sons, Ltd.
83 citations
••
TL;DR: This letter investigates the secure transmission optimization in a multibeam satellite downlink network with multiple eavesdroppers, where each legitimate user is wiretapped by a corresponding eavesdropper.
Abstract: This letter investigates the secure transmission optimization in a multibeam satellite downlink network with multiple eavesdroppers, where each legitimate user is wiretapped by a corresponding eavesdropper. Our design objective is to maximize the sum secrecy rate of the multibeam satellite network in the presence of imperfect channel state information (CSI) of eavesdroppers, while guaranteeing the total transmit power constraint on-board the satellite. Due to the nonconvexity and intractability resulting from the eavesdroppers’ CSI uncertainty, a robust beamforming scheme is proposed to transform the initial optimization problem into a convex framework by jointly applying the Taylor expansion, S-Procedure, and Cauchy–Schwarz inequality. Meanwhile, an iterative algorithm is introduced to obtain the optimal solution. Finally, the validity and superiority of the proposed scheme are confirmed through comparisons with the existing nonrobust and perfect CSI approaches.
83 citations
•
Cardiff University1, National University of Defense Technology2, Peking University3, Toyohashi University of Technology4, Concordia University5, Tel Aviv University6, University of Lugano7, Northwestern Polytechnical University8, University of Verona9, University of Tennessee10, National Institute of Standards and Technology11, Nanyang Technological University12, Beijing Technology and Business University13, Texas State University14, Swansea University15, Central South University16, Pennsylvania State University17
TL;DR: In this article, the authors created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets and features exclusively human models, in a variety of body shapes and poses.
Abstract: We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets Our dataset features exclusively human models, in a variety of body shapes and poses 3D models of humans are commonly used within computer graphics and vision, and so the ability to distinguish between body shapes is an important shape retrieval problem In this track nine groups have submitted the results of a total of 22 different methods which have been tested on our new dataset
83 citations
Authors
Showing all 39659 results
Name | H-index | Papers | Citations |
---|---|---|---|
Rui Zhang | 151 | 2625 | 107917 |
Jian Li | 133 | 2863 | 87131 |
Chi Lin | 125 | 1313 | 102710 |
Wei Xu | 103 | 1492 | 49624 |
Lei Liu | 98 | 2041 | 51163 |
Xiang Li | 97 | 1472 | 42301 |
Chang Liu | 97 | 1099 | 39573 |
Jian Huang | 97 | 1189 | 40362 |
Tao Wang | 97 | 2720 | 55280 |
Wei Liu | 96 | 1538 | 42459 |
Jian Chen | 96 | 1718 | 52917 |
Wei Wang | 95 | 3544 | 59660 |
Peng Li | 95 | 1548 | 45198 |
Jianhong Wu | 93 | 726 | 36427 |
Jianhua Zhang | 92 | 415 | 28085 |