scispace - formally typeset
Search or ask a question
Institution

Xidian University

EducationXi'an, China
About: Xidian University is a education organization based out in Xi'an, China. It is known for research contribution in the topics: Antenna (radio) & Computer science. The organization has 32099 authors who have published 38961 publications receiving 431820 citations. The organization is also known as: University of Electronic Science and Technology at Xi'an & Xīān Diànzǐ Kējì Dàxué.


Papers
More filters
Journal ArticleDOI
08 Apr 2005
TL;DR: A preprocessing algorithm is first proposed to convert the non-coherent ISAR data into coherent data, the a keystone formatting algorithm developed for the imaging of slo ground moving targets i SAR is applied to mitigate the MTRCs to rotational motion, and a high resolutio time-frequency analysis based range-instantaneous Doppler (RID) algorithm is used to produce the focused ISAR image.
Abstract: Range-Doppler (RD) algorithms are idely used i inverse synthetic aperture radar (ISAR) imaging. I the standard RD algorithm, envelope alignment and autofocus are first applied to transform the original data into equivalent turntable target data, and the FFT is used for the image formation. Usually, the migratio through resolution cells (MTRCs) due to target rotatio is ignored. ith the improvement of resolutio or the increase of target size, MTRCs cannot be ignored and must be mitigated. For high speed moving targets, the most idely used 'stop-and-go' data model is violated. I this case, the mitigation of MTRCs becomes eve more complicated. I the paper, technical issues associated ith high resolutio ISAR imaging of high speed moving targets are addressed. A preprocessing algorithm is first proposed to convert the non-coherent ra ISAR data into coherent data, the a keystone formatting algorithm developed for the imaging of slo ground moving targets i SAR is applied to mitigate the MTRCs o ing to rotational motion, and, finally, a high resolutio time-frequency analysis based range-instantaneous Doppler (RID) algorithm is used to produce the focused ISAR image. Numerical examples are provided to illustrate the performance of the proposed approach.

112 citations

Journal ArticleDOI
TL;DR: The concept and features of edge computing are introduced, and a number of requirements for its secure data analytics are proposed by analyzing potential security threats in edge computing.
Abstract: Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are generated by IoT devices. Those data after analytics provide significant information that could greatly benefit IoT applications. Different from traditional applications, IoT applications, such as environmental monitoring, smart navigation, and smart healthcare come with new requirements, such as mobility, real-time response, and location awareness. However, traditional cloud computing paradigm cannot satisfy these demands due to centralized processing and being far away from local devices. Hence, edge computing was introduced to perform data processing and storage in the edge of networks, which is closer to data sources than cloud computing, thus efficient and location-aware. Unfortunately, edge computing brings new security and privacy challenges when applied to data analytics. The literature still lacks a thorough review on the recent advances in secure data analytics in edge computing. In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing. Furthermore, we give a comprehensive review on the pros and cons of the existing works on data analytics in edge computing based on our proposed requirements. Based on our literature survey, we highlight current open issues and propose future research directions.

112 citations

Journal ArticleDOI
TL;DR: A privacy-aware multi-authority ciphertext-policy ABE scheme with accountability, which hides the attribute information in the ciphertext and allows to trace the dishonest user identity who shares the decryption key.

112 citations

Proceedings ArticleDOI
23 Jun 2014
TL;DR: This work proposes a collaborative hashing scheme for the data in matrix form to enable fast search in various applications such as image search using bag of words and recommendation using user-item ratings, and demonstrates that the proposed method outperforms state-of-the-art baselines.
Abstract: Hashing technique has become a promising approach for fast similarity search. Most of existing hashing research pursue the binary codes for the same type of entities by preserving their similarities. In practice, there are many scenarios involving nearest neighbor search on the data given in matrix form, where two different types of, yet naturally associated entities respectively correspond to its two dimensions or views. To fully explore the duality between the two views, we propose a collaborative hashing scheme for the data in matrix form to enable fast search in various applications such as image search using bag of words and recommendation using user-item ratings. By simultaneously preserving both the entity similarities in each view and the interrelationship between views, our collaborative hashing effectively learns the compact binary codes and the explicit hash functions for out-of-sample extension in an alternating optimization way. Extensive evaluations are conducted on three well-known datasets for search inside a single view and search across different views, demonstrating that our proposed method outperforms state-of-the-art baselines, with significant accuracy gains ranging from 7.67% to 45.87% relatively.

112 citations

Journal ArticleDOI
TL;DR: A new recommendation algorithm based on deep neural networks is proposed that is initially represented by tags and then a deep neural network model is used to extract the in-depth features from tag space layer by layer, so that the unique structure of tag space will be revealed automatically.

112 citations


Authors

Showing all 32362 results

NameH-indexPapersCitations
Zhong Lin Wang2452529259003
Jie Zhang1784857221720
Bin Wang126222674364
Huijun Gao12168544399
Hong Wang110163351811
Jian Zhang107306469715
Guozhong Cao10469441625
Lajos Hanzo101204054380
Witold Pedrycz101176658203
Lei Liu98204151163
Qi Tian96103041010
Wei Liu96153842459
MengChu Zhou96112436969
Chunying Chen9450830110
Daniel W. C. Ho8536021429
Network Information
Related Institutions (5)
Beihang University
73.5K papers, 975.6K citations

92% related

Southeast University
79.4K papers, 1.1M citations

91% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

91% related

City University of Hong Kong
60.1K papers, 1.7M citations

90% related

Nanyang Technological University
112.8K papers, 3.2M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023117
2022529
20213,751
20203,817
20194,017
20183,382