scispace - formally typeset
Search or ask a question
Institution

National University of Defense Technology

EducationChangsha, China
About: National University of Defense Technology is a education organization based out in Changsha, China. It is known for research contribution in the topics: Radar & Synthetic aperture radar. The organization has 39430 authors who have published 40181 publications receiving 358979 citations. The organization is also known as: Guófáng Kēxuéjìshù Dàxué & NUDT.


Papers
More filters
Journal ArticleDOI
TL;DR: A new network architecture based on the faster R-CNN is proposed to further improve the detection performance by using squeeze and excitation mechanism and shows results that are 9.7% better than the state-of-the-art method when using F1 as matric and executes 14% faster.
Abstract: Synthetic aperture radar (SAR) ship detection is an important part of marine monitoring. With the development in computer vision, deep learning has been used for ship detection in SAR images such as the faster region-based convolutional neural network (R-CNN), single-shot multibox detector, and densely connected network. In SAR ship detection field, deep learning has much better detection performance than traditional methods on nearshore areas. This is because traditional methods need sea–land segmentation before detection, and inaccurate sea–land mask decreases its detection performance. Though current deep learning SAR ship detection methods still have many false detections in land areas, and some ships are missed in sea areas. In this letter, a new network architecture based on the faster R-CNN is proposed to further improve the detection performance by using squeeze and excitation mechanism. In order to improve performance, first, the feature maps are extracted and concatenated to obtain multiscale feature maps with ImageNet pretrained VGG network. After region of interest pooling, an encoding scale vector which has values between 0 and 1 is generated from subfeature maps. The scale vector is ranked, and only top $K$ values will be preserved. Other values will be set to 0. Then, the subfeature maps are recalibrated by this scale vector. The redundant subfeature maps will be suppressed by this operation, and the detection performance of detector can be improved. The experimental results based on Sentinel-1 images show that the detection performance of the proposed method achieves 0.836 which is 9.7% better than the state-of-the-art method when using F1 as matric and executes 14% faster.

258 citations

Journal ArticleDOI
TL;DR: In this paper, an attack tree based threat model is presented to illustrate the energy-theft behaviors in AMI and summarize the current AMI energytheft detection schemes into three categories, i.e., classification-based, state estimation-based and game theory-based ones.

257 citations

Proceedings ArticleDOI
18 Jun 2018
TL;DR: In this article, the authors propose a network architecture to incorporate all steps of stereo matching, including matching cost calculation, matching cost aggregation, disparity calculation, and disparity refinement, which achieves the state-of-the-art performance on the KITTI 2012 and KittI 2015 benchmarks while maintaining a very fast running time.
Abstract: Stereo matching algorithms usually consist of four steps, including matching cost calculation, matching cost aggregation, disparity calculation, and disparity refinement. Existing CNN-based methods only adopt CNN to solve parts of the four steps, or use different networks to deal with different steps, making them difficult to obtain the overall optimal solution. In this paper, we propose a network architecture to incorporate all steps of stereo matching. The network consists of three parts. The first part calculates the multi-scale shared features. The second part performs matching cost calculation, matching cost aggregation and disparity calculation to estimate the initial disparity using shared features. The initial disparity and the shared features are used to calculate the feature constancy that measures correctness of the correspondence between two input images. The initial disparity and the feature constancy are then fed into a sub-network to refine the initial disparity. The proposed method has been evaluated on the Scene Flow and KITTI datasets. It achieves the state-of-the-art performance on the KITTI 2012 and KITTI 2015 benchmarks while maintaining a very fast running time. Source code is available at http://github.com/leonzfa/iResNet.

252 citations

Journal ArticleDOI
TL;DR: In this paper, high responsivity phototransistors based on few-layer rhenium disulfide (ReS2) are presented, where the maximum attainable photoresponsivity can reach as high as 88 600 A W−1, which is a record value compared to other individual 2D materials with similar device structures and two orders of magnitude higher than that of monolayer MoS2.
Abstract: 2D transition metal dichalcogenides are emerging with tremendous potential in many optoelectronic applications due to their strong light–matter interactions. To fully explore their potential in photoconductive detectors, high responsivity is required. Here, high responsivity phototransistors based on few-layer rhenium disulfide (ReS2) are presented. Depending on the back gate voltage, source drain bias and incident optical light intensity, the maximum attainable photoresponsivity can reach as high as 88 600 A W−1, which is a record value compared to other individual 2D materials with similar device structures and two orders of magnitude higher than that of monolayer MoS2. Such high photoresponsivity is attributed to the increased light absorption as well as the gain enhancement due to the existence of trap states in the few-layer ReS2 flakes. It further enables the detection of weak signals, as successfully demonstrated with weak light sources including a lighter and limited fluorescent lighting. Our studies underscore ReS2 as a promising material for future sensitive optoelectronic applications.

250 citations

Journal ArticleDOI
TL;DR: This work identifies and analyzes a number of security challenges that are specific to VCs, e.g., challenges of authentication of high-mobility vehicles, scalability and single interface, tangled identities and locations, and the complexity of establishing trust relationships among multiple players caused by intermittent short-range communications.
Abstract: In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or rented out over the Internet to various customers. Clearly, if the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to be addressed. The main contribution of this work is to identify and analyze a number of security challenges and potential privacy threats in VCs. Although security issues have received attention in cloud computing and vehicular networks, we identify security challenges that are specific to VCs, e.g., challenges of authentication of high-mobility vehicles, scalability and single interface, tangled identities and locations, and the complexity of establishing trust relationships among multiple players caused by intermittent short-range communications. Additionally, we provide a security scheme that addresses several of the challenges discussed.

247 citations


Authors

Showing all 39659 results

NameH-indexPapersCitations
Rui Zhang1512625107917
Jian Li133286387131
Chi Lin1251313102710
Wei Xu103149249624
Lei Liu98204151163
Xiang Li97147242301
Chang Liu97109939573
Jian Huang97118940362
Tao Wang97272055280
Wei Liu96153842459
Jian Chen96171852917
Wei Wang95354459660
Peng Li95154845198
Jianhong Wu9372636427
Jianhua Zhang9241528085
Network Information
Related Institutions (5)
Harbin Institute of Technology
109.2K papers, 1.6M citations

94% related

Tsinghua University
200.5K papers, 4.5M citations

91% related

University of Science and Technology of China
101K papers, 2.4M citations

90% related

City University of Hong Kong
60.1K papers, 1.7M citations

89% related

Dalian University of Technology
71.9K papers, 1.1M citations

89% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
202397
2022468
20212,986
20203,468
20193,695