• Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:赵季中

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Export Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 19 >
Speech2Stroke: Generate Chinese Character Strokes Directly from Speech EI
会议论文 | 2021 , 349 , 83-94 | 16th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020
Abstract&Keyword Cite

Abstract :

Chinese character is composed of spatial arrangement of strokes. A portion of these strokes combines to form phonetic component, which provides a clue to the pronunciation of the entire character, the others combine to form semantic component, which indicates semantic level information for speech context. How closely the connection between the internal strokes of Chinese characters and speech? In this paper, we propose Speech2Stroke, a end-to-end model that exploits the phonetic and morphologic level information of pictographic words. Specifically, we generate strokes directly from the speech by Speech2Stroke. The performance of Speech2Stroke is evaluated by the specific stroke error rate(SER). The SER of the optimal model can achieve 20.61%. Through the experiments and analysis, we show that our model has the ability to capture the alignment between audio and the internal structures of pictographic characters. © 2021, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

Keyword :

Computers Computer science Engineering Industrial engineering Semantics

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Yinhui , Xi, Wei , Yang, Zhao et al. Speech2Stroke: Generate Chinese Character Strokes Directly from Speech [C] . 2021 : 83-94 .
MLA Zhang, Yinhui et al. "Speech2Stroke: Generate Chinese Character Strokes Directly from Speech" . (2021) : 83-94 .
APA Zhang, Yinhui , Xi, Wei , Yang, Zhao , Men, Sitao , Jiang, Rui , Yang, Yuxin et al. Speech2Stroke: Generate Chinese Character Strokes Directly from Speech . (2021) : 83-94 .
Export to NoteExpress RIS BibTex
HMO: Ordering RFID Tags With Static Devices in Mobile Environments (vol 19, pg 74, 2020) SCIE
期刊论文 | 2021 , 20 (4) , 1746-1746 | IEEE TRANSACTIONS ON MOBILE COMPUTING
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Ge , Qian, Chen , Shangguan, Longfei et al. HMO: Ordering RFID Tags With Static Devices in Mobile Environments (vol 19, pg 74, 2020) [J]. | IEEE TRANSACTIONS ON MOBILE COMPUTING , 2021 , 20 (4) : 1746-1746 .
MLA Wang, Ge et al. "HMO: Ordering RFID Tags With Static Devices in Mobile Environments (vol 19, pg 74, 2020)" . | IEEE TRANSACTIONS ON MOBILE COMPUTING 20 . 4 (2021) : 1746-1746 .
APA Wang, Ge , Qian, Chen , Shangguan, Longfei , Ding, Han , Han, Jinsong , Cui, Kaiyan et al. HMO: Ordering RFID Tags With Static Devices in Mobile Environments (vol 19, pg 74, 2020) . | IEEE TRANSACTIONS ON MOBILE COMPUTING , 2021 , 20 (4) , 1746-1746 .
Export to NoteExpress RIS BibTex
Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design EI
期刊论文 | 2021 , 5 (3) | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Abstract&Keyword Cite

Abstract :

This paper presents an anti-spoofing design to verify whether a voice command is spoken by one live legal user, which supplements existing speech recognition systems and could enable new application potentials when many crucial voice commands need a higher-standard verification in applications. In the literature, verifying the liveness and legality of the command's speaker has been studied separately. However, to accept a voice command from a live legal user, prior solutions cannot be combined directly due to two reasons. First, previous methods have introduced various sensing channels for the liveness detection, while the safety of a sensing channel itself cannot be guaranteed. Second, a direct combination is also vulnerable when an attacker plays a recorded voice command from the legal user and mimics this user to speak the command simultaneously. In this paper, we introduce an anti-spoofing sensing channel to fulfill the design. More importantly, our design provides a generic interface to form the sensing channel, which is compatible to a variety of widely-used signals, including RFID, Wi-Fi and acoustic signals. This offers a flexibility to balance the system cost and verification requirement. We develop a prototype system with three versions by using these sensing signals. We conduct extensive experiments in six different real-world environments under a variety of settings to examine the effectiveness of our design. © 2021 ACM.

Keyword :

Speech recognition

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhao, Cui , Li, Zhenjiang , Ding, Han et al. Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design [J]. | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , 2021 , 5 (3) .
MLA Zhao, Cui et al. "Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design" . | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5 . 3 (2021) .
APA Zhao, Cui , Li, Zhenjiang , Ding, Han , Xi, Wei , Wang, Ge , Zhao, Jizhong . Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design . | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , 2021 , 5 (3) .
Export to NoteExpress RIS BibTex
RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition EI
期刊论文 | 2021 , 5 (3) | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Abstract&Keyword Cite

Abstract :

This paper presents a non-invasive design, namely RF-ray, to recognize the shape and material of an object simultaneously. RF-ray puts the object approximate to an RFID tag array, and explores the propagation effect as well as coupling effect between RFIDs and the object for sensing. In contrast to prior proposals, RF-ray is capable to recognize unseen objects, including unseen shape-material pairs and unseen materials within a certain container. To make it real, RF-ray introduces a sensing capability enhancement module and leverages a two-branch neural network for shape profiling and material identification respectively. Furthermore, we incorporate a Zero-Shot Learning based embedding module that incorporates the well-learned linguistic features to generalize RF-ray to recognize unseen materials. We build a prototype of RF-ray using commodity RFID devices. Comprehensive real-world experiments demonstrate our system can achieve high object recognition performance. © 2021 ACM.

Keyword :

Backpropagation Linguistics Object recognition Radio frequency identification (RFID)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ding, Han , Zhai, Linwei , Zhao, Cui et al. RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition [J]. | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , 2021 , 5 (3) .
MLA Ding, Han et al. "RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition" . | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5 . 3 (2021) .
APA Ding, Han , Zhai, Linwei , Zhao, Cui , Hou, Songjiang , Wang, Ge , Xi, Wei et al. RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition . | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , 2021 , 5 (3) .
Export to NoteExpress RIS BibTex
An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network EI SCIE
期刊论文 | 2021 , 68 (8) , 2957-2961 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
WoS CC Cited Count: 3
Abstract&Keyword Cite

Abstract :

Rain removal is an important operation in intelligent visual surveillance systems. Many rain removal algorithms based on convolution neural networks (CNNs) are rarely deployed on resource constrained devices. One of the limiting factors is that memory access leads to high energy consumption. To reduce memory access during computation, previous works usually use a fixed computation pattern for different layers in CNN. For different and massive input and output feature maps, fixed computation pattern would lower the power efficiency. Thus, we propose a reconfigurable architecture to support different convolution mapping method. We use hybrid data reuse pattern to reduce energy consumption by 2.4-5.9 times over fixed computation pattern. The hardware is synthesized in the area of 9.83 mm(2) at TSMC 65 nm technology and can restore a 1280 x 720 real world image in 0.57 s which achieves 56.1 x and 2.1 x speed-up comparing to CPU and GPU implementations. The simulation results show that the power efficiency is 287.7 GOPS/W running rain removal network.

Keyword :

Convolutional neural network hardware implementation rain removal reconfigurable architecture

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Rao, Lei , Zhang, Bin , Zhao, Jizhong . An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network [J]. | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS , 2021 , 68 (8) : 2957-2961 .
MLA Rao, Lei et al. "An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network" . | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 68 . 8 (2021) : 2957-2961 .
APA Rao, Lei , Zhang, Bin , Zhao, Jizhong . An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network . | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS , 2021 , 68 (8) , 2957-2961 .
Export to NoteExpress RIS BibTex
KEEP: Secure and Efficient Communication for Distributed IoT Devices EI SCIE
期刊论文 | 2021 , 8 (16) , 12758-12770 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

Security over mobile Internet-of-Things (IoT) devices is critical due to the open nature of distributed wireless communication. To efficiently establish a secure connection between two communication parties, a fast mobile key extraction protocol, KEEP, is proposed. KEEP fastly generates similar bit sequences from two communication parties' measurements of channel-state information (CSI) of different subcarriers. Then, a distributed "verification-recombination" mechanism is introduced to generate the same encryption key from bit sequences without the public-key authentication, digital signature, or key distribution center of the other party. We implemented real-world experiments using commercial off-the-shelf 802.11n devices to evaluate the performance of KEEP in various scenarios. Theoretical analysis and experimental verification show that KEEP is more secure, effective, and reliable than the state-of-the-art methods.

Keyword :

11n Standard Correlation Distributed computing IEEE 802 Internet of Things Internet of Things (IoT) key generation OFDM Privacy Protocols Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Xi, Wei , Duan, Meichen , Bai, Xiuxiu et al. KEEP: Secure and Efficient Communication for Distributed IoT Devices [J]. | IEEE INTERNET OF THINGS JOURNAL , 2021 , 8 (16) : 12758-12770 .
MLA Xi, Wei et al. "KEEP: Secure and Efficient Communication for Distributed IoT Devices" . | IEEE INTERNET OF THINGS JOURNAL 8 . 16 (2021) : 12758-12770 .
APA Xi, Wei , Duan, Meichen , Bai, Xiuxiu , Zhao, Kun , Mo, Lufeng , Zhao, Jizhong . KEEP: Secure and Efficient Communication for Distributed IoT Devices . | IEEE INTERNET OF THINGS JOURNAL , 2021 , 8 (16) , 12758-12770 .
Export to NoteExpress RIS BibTex
Worker Collaborative group estimation in spatial crowdsourcing EI SCIE
期刊论文 | 2021 , 428 , 385-391 | Neurocomputing
WoS CC Cited Count: 2
Abstract&Keyword Cite

Abstract :

Spatial crowdsourcing (SC) has gained much attention in recent years. On SC platforms, requesters can publish spatial tasks on a specific topic such as taking photos at certain locations which is reflected by some tags of the task, and workers can choose tasks according to their tags. An interesting phenomenon is that workers often form groups based on their social relationships and common interests to perform same tasks. A nature question often raised when a task is published is how to predict which (or how many) workers are attracted by the task if its tags are specified. In particular, the tags of a new task affect the willingness of the workers to choose it. On the other hand, workers are also affected by the willingness of their co-workers or friends when deciding to choose a task or not. In this paper, we study the problem of potential workers estimation for a spatial crowdsourcing task, the Worker Collaborative Group Estimation (WCGE) problem, and model whether workers will join the group of a task as a game. We present efficient algorithms to find the Nash Equilibrium of the game and estimate the potential workers for the new task. Using synthetic datasets, we experimentally study the performance of proposed solutions. Our solutions can also help understand big geospatial data for self-driving cars and more intelligent transportation applications. © 2020 Elsevier B.V.

Keyword :

Computer applications Crowdsourcing Neural networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Zhi , Li, Yubing , Zhao, Kun et al. Worker Collaborative group estimation in spatial crowdsourcing [J]. | Neurocomputing , 2021 , 428 : 385-391 .
MLA Wang, Zhi et al. "Worker Collaborative group estimation in spatial crowdsourcing" . | Neurocomputing 428 (2021) : 385-391 .
APA Wang, Zhi , Li, Yubing , Zhao, Kun , Shi, Wei , Lin, Liangliang , Zhao, Jizhong . Worker Collaborative group estimation in spatial crowdsourcing . | Neurocomputing , 2021 , 428 , 385-391 .
Export to NoteExpress RIS BibTex
Control Your Home with a Smartwatch EI SCIE Scopus
期刊论文 | 2020 , 8 , 131601-131613 | IEEE Access | IF: 3.367
WoS CC Cited Count: 3 SCOPUS Cited Count: 7
Abstract&Keyword Cite

Abstract :

With the wide applications of smart devices and mobile computing, smart home becomes a hot issue in the household appliance industry. The controlling and interaction approach plays a key role in users' experience and turns into one of the most important selling points for profit growth. Considering the robustness and privacy protection, wearable devices equipped with MEMS, e.g., smartphones, smartwatches, or smart wristbands, are thought of one of the most feasible commercial solutions for interaction. However, the low-cost built-in MEMS sensors do not perform well in capturing finely grained human activity directly. In this paper, we propose a method that leverages the arm constraint and historical information recorded by MEMS sensors to estimate the maximum likelihood action in a two-phases model. First, in the arm posture estimation phase, we leverage the kinematics model to analyze the maximum likelihood position of users' arms. Second, in the trajectory recognition phase, we leverage the gesture estimation model to identify the key actions and output the instructions to devices by SVM. Our substantial experiments show that the proposed solution can recognize eight kinds of postures defined for man-machine interaction in the smart home application scene, and the solution implements efficient and effective interaction using low-cost smartwatches, and the interaction accuracy is >87%. The experiments also show that the algorithm proposed in this paper can be well applied to the perceptual control of smart household appliances, and has high practical value for the application design of the perceptual interaction function of household appliances. © 2013 IEEE.

Keyword :

Ambient intelligence Automation Costs Data privacy Domestic appliances Maximum likelihood estimation User experience Wearable computers

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Yubing , Zhao, Kun , Duan, Meichen et al. Control Your Home with a Smartwatch [J]. | IEEE Access , 2020 , 8 : 131601-131613 .
MLA Li, Yubing et al. "Control Your Home with a Smartwatch" . | IEEE Access 8 (2020) : 131601-131613 .
APA Li, Yubing , Zhao, Kun , Duan, Meichen , Shi, Wei , Lin, Liangliang , Cao, Xinyi et al. Control Your Home with a Smartwatch . | IEEE Access , 2020 , 8 , 131601-131613 .
Export to NoteExpress RIS BibTex
HMO: Ordering RFID Tags with Static Devices in Mobile Environments EI SCIE
期刊论文 | 2020 , 19 (1) , 74-89 | IEEE TRANSACTIONS ON MOBILE COMPUTING | IF: 5.577
WoS CC Cited Count: 6
Abstract&Keyword Cite

Abstract :

Passive Radio Frequency Identification (RFID) tags have been widely applied in many applications, such as logistics, retailing, and warehousing. In many situations, the order of objects is more important than their absolute locations. However, state-of-art ordering methods need a continuing movement of tags and readers, which limit the application domain and scalability. In this paper, we propose a 2-dimension ordering approach for passive tags that requires no device movement. Instead, our method utilizes signal changes caused by arbitrary movement of human beings around tags, who carry no device for horizontal dimension ordering. Hence, our method is called Human Movement based Ordering (HMO). The basic idea of HMO is that when people pass between the reader antenna and tags, the received signal strength will change. By observing the time-series RSS changes of tags, HMO can obtain the order of tags along with a specific horizontal direction. For vertical dimension, we employ a linear programming method that is tolerant of tiny errors in practice. We implement HMO with commodity off-the-shelf RFID devices. The experimental results show that HMO can achieve up to 88.71 and 90.86 percent average accuracies in the signal- and multi-person cases, respectively.

Keyword :

IEEE members Logistics Mobile antennas Mobile computing Receiving antennas relative localization RFID RFID tags

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Ge , Qian, Chen , Shangguan, Longfei et al. HMO: Ordering RFID Tags with Static Devices in Mobile Environments [J]. | IEEE TRANSACTIONS ON MOBILE COMPUTING , 2020 , 19 (1) : 74-89 .
MLA Wang, Ge et al. "HMO: Ordering RFID Tags with Static Devices in Mobile Environments" . | IEEE TRANSACTIONS ON MOBILE COMPUTING 19 . 1 (2020) : 74-89 .
APA Wang, Ge , Qian, Chen , Shangguan, Longfei , Ding, Han , Han, Jinsong , Cui, Kaiyan et al. HMO: Ordering RFID Tags with Static Devices in Mobile Environments . | IEEE TRANSACTIONS ON MOBILE COMPUTING , 2020 , 19 (1) , 74-89 .
Export to NoteExpress RIS BibTex
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network EI SCIE
期刊论文 | 2020 , 9 (1) | JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | IF: 3.222
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

Delivering service intelligence to billions of connected devices is the next step in edge computing. Wi-Fi, as the de facto standard for high-throughput wireless connectivity, is highly vulnerable to packet-injection-based identity spoofing attacks (PI-ISAs). An attacker can spoof as the legitimate edge coordinator and perform denial of service (DoS) or even man-in-the-middle (MITM) attacks with merely a laptop. Such vulnerability leads to serious systematic risks, especially for the core edge/cloud backbone network.In this paper, we propose PHYAlert, an identity spoofing attack alert system designed to protect a Wi-Fi-based edge network. PHYAlert profiles the wireless link with the rich dimensional Wi-Fi PHY layer information and enables real-time authentication for Wi-Fi frames. We prototype PHYAlert with commercial off-the-shelf (COTS) devices and perform extensive experiments in different scenarios. The experiments verify the feasibility of spoofing detection based on PHY layer information and show that PHYAlert can achieve an 8x improvement in the false positive rate over the conventional signal-strength-based solution.

Keyword :

Channel state information Identity spoofing attack Wi-Fi Wireless intrusion detection

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Zhiping , Zhao, Kun , Li, Rui et al. PHYAlert: identity spoofing attack detection and prevention for a wireless edge network [J]. | JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS , 2020 , 9 (1) .
MLA Jiang, Zhiping et al. "PHYAlert: identity spoofing attack detection and prevention for a wireless edge network" . | JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS 9 . 1 (2020) .
APA Jiang, Zhiping , Zhao, Kun , Li, Rui , Zhao, Jizhong , Du, Junzhao . PHYAlert: identity spoofing attack detection and prevention for a wireless edge network . | JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS , 2020 , 9 (1) .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 19 >

Export

Results:

Selected

to

Format:
FAQ| About| Online/Total:1605/188897889
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.