16 results on '"Xiaojiang Chen"'
Search Results
2. Combined Use of Tumor Markers in Gastric Cancer:A Novel Method with Promising Prognostic Accuracy and Practicality
- Author
-
Ruopeng Zhang, Xiaojiang Chen, Guo-Ming Chen, Zhou-Kai Zhao, Yi-Cheng Wei, Feiyang Zhang, Jun Lin, Runcong Nie, and Yingbo Chen
- Subjects
History ,Polymers and Plastics ,Business and International Management ,Industrial and Manufacturing Engineering - Published
- 2022
3. Enabling robust and reliable transmission in Internet of Things with multiple gateways
- Author
-
Xiaojiang Chen, Bin Wu, Xu Dan, Wenli Jiao, Zhuang Yin, Yao Peng, Dingyi Fang, and Feng Chen
- Subjects
Routing protocol ,Computer Networks and Communications ,business.industry ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Load balancing (computing) ,Metrics ,Hop (networking) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Computer network ,Data transmission - Abstract
This paper investigates the robust and reliable transmission problem in Internet of Things (IoT) applications, where multiple gateways are deployed. We discover that the reliable routing path with the best link qualities may not always gain the reliable transmission. The main reason is that the majority of existing routing metrics generally do not consider the working state of gateways. And the gateways may significantly reduce the reliability of data transmission at the last hop when they operate at the variable duty cycles (e.g., due to insufficient energy harvesting from ambiance). Last-hop data loss will lead to the inefficient transmission in all previous hops. To address this issue, we propose a novel routing metric ETD (Expected Transmission Direction, ETD), which efficiently selects a proper set of gateways with improved reliability in variable duty-cycled IoT through estimating the working state of gateways. Based on ETD, we design an efficient opportunistic routing protocol PoR to ensure reliable data transmission. Our simulations demonstrate the superior performance of PoR. It is shown that PoR achieves over 98% packet delivery ratio even in the worst network setting, with effective load balancing among selected gateways.
- Published
- 2018
4. EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network
- Author
-
Chen Liu, Dingyi Fang, Xu Dan, Baoying Liu, Xiaojiang Chen, Wen Cui, Hao Chen, Shensheng Tang, Guangquan Xu, and Yue Hu
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Testbed ,Smart device ,020206 networking & telecommunications ,Geographic routing ,02 engineering and technology ,Energy consumption ,020202 computer hardware & architecture ,law.invention ,law ,0202 electrical engineering, electronic engineering, information engineering ,business ,Wireless sensor network ,Computer network - Abstract
With the fast increasing popularity of smart device communication technologies, the wireless networks on mobile sensing applications have received much attention. Wireless Sensor Networks (WSNs) with a strip structure are ubiquitous in real world deployments, such as pipeline monitoring, water quality monitoring as well as Great Wall monitoring. However, the existing routing methods will select the next-hop node that deviates from the transmission direction to sink node in strip networks with high curvature, leading to the high communication failure rate and energy consumption. To this end, we propose a new geographic routing sensing opportunistic approach, named EasyGo, to cope with the routing problem, i.e., the transmission success rate decreases in the complicated strip networks. Specifically, by investigating the transmission direction, we propose a new candidate selection algorithm SLS, which introduces the concepts of layer slicing and virtual sinks to improve the transmission success rate in strip WSNs. Theoretical analysis and extensive simulations illustrate the high efficiency and transmission performance of the proposed EasyGo strategy for strip WSNs. Furthermore, we implement the EasyGo on the testbed with Z-Stack™ nodes. Compared with the classic algorithms, our EasyGo improves the transmission success rate by up to 10%, reduces the communication overhead and the energy consumption rate by up to 11.8% and 5%, respectively.
- Published
- 2018
5. Cas9 activities with truncated 16-nucleotide RNA guides are tuned by target duplex stability beyond the RNA/DNA hybrid
- Author
-
Yue Li, Brendon Cooper, Yukang Liu, Difei Wu, Jiemin Zhao, Jing Lin, Xiaojiang Chen, Remo Rohs, and Peter Z. Qin
- Subjects
Biophysics - Published
- 2022
6. Maximizing throughput for low duty-cycled sensor networks
- Author
-
Xiaojiang Chen, Zhuang Yin, Yao Peng, Xu Dan, Dingyi Fang, Wenli Jiao, Zhanyong Tang, and Huang Junjie
- Subjects
020203 distributed computing ,Computer Networks and Communications ,Computer science ,business.industry ,Event (computing) ,media_common.quotation_subject ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Energy consumption ,0202 electrical engineering, electronic engineering, information engineering ,business ,Duty ,Wireless sensor network ,Energy (signal processing) ,Computer network ,media_common ,Efficient energy use - Abstract
Sensing and communication are foundations of the Internet of Things(IoT). Although energy efficiency is an important issue in MAC protocol design for general energy limited sensor networks, throughput is non trivial for some specific sensor networks. In this paper, we propose a new duty cycling scheme called MaxPut that can maximize throughput without sacrificing energy efficiency through the appropriate combination of random and scheduled duty cycling schemes. MaxPut attempts to identify risky nodes and enables risky nodes to maximize the utilization of active periods of their neighbors such that MaxPut can avoid potential buffer overflow due to aggregation of bursty data. We obtain overall throughput in networks with homogeneous and heterogeneous event occurrence processes respectively. Further, we compare MaxPut against a fully random duty cycling scheme. The simulation results show that MaxPut outperforms prior work with respect to the network throughput, while energy consumption is almost equivalent to the existing duty cycling scheme.
- Published
- 2018
7. Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
- Author
-
Xiaoqing Gong, Kaiyuan Kuang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang, and Zheng Wang
- Subjects
Correctness ,General Computer Science ,business.industry ,Computer science ,Opcode ,020207 software engineering ,Static program analysis ,02 engineering and technology ,computer.software_genre ,Virtualization ,Scheduling (computing) ,Obfuscation (software) ,Bytecode ,Software ,Virtual machine ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,020201 artificial intelligence & image processing ,business ,Law ,computer - Abstract
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis. State-of-the-art VM-based protection approaches use a fixed scheduling structure where the program always follows a single, deterministic execution path for the same input. Such approaches, however, are vulnerable in certain scenarios where the attacker can reuse knowledge extracted from previously seen software to crack applications protected with the same obfuscation scheme. This paper presents Dsvmp, a novel VM-based code obfuscation approach for software protection. Dsvmp brings together two techniques to provide stronger code protection than prior VM-based approaches. Firstly, it uses a dynamic instruction scheduler to randomly direct the program to execute different paths without violating the correctness across different runs. By randomly choosing the program execution path, the application exposes diverse behavior, making it much more difficult for an attacker to reuse the knowledge collected from previous runs or similar applications to launch an attack. Secondly, it employs multiple VMs to further obfuscate the mapping from VM opcode to native machine instructions, so that the same opcode could be mapped to different native instructions at runtime, making code analysis even harder. We have implemented Dsvmp in a prototype system and evaluated it using a set of widely used applications. Experimental results show that Dsvmp provides stronger protection with comparable runtime overhead and code size, when it is compared to two commercial VM-based code obfuscation tools.
- Published
- 2018
8. CS-GAN: Cross-Structure Generative Adversarial Networks for Chinese calligraphy translation
- Author
-
Yun Xiao, Xia Zheng, Xiaojun Chang, Xiaojiang Chen, Lei Wenlong, and Lei Lu
- Subjects
Structure (mathematical logic) ,Information Systems and Management ,business.industry ,Computer science ,Concatenation ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Translation (geometry) ,Management Information Systems ,Domain (software engineering) ,Calligraphy ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,Image translation ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Software ,Generative grammar - Abstract
Generative Adversarial Networks (GANs) have made great progress in cross-domain image translation. In fact, image-to-image translation tasks often encounter structural differences in two domains, such as translation on unpaired Chinese calligraphy dataset. However, existing models can only convert color and texture features and keep the structures unchanged (e.g.: in apples to oranges tasks, these models only convert the color of apples, but maintain the shape of apples). In order to address cross-structure image translation, such as cross-structure translation of Chinese calligraphy, a novel Generative Adversarial Networks (GAN) model, named CS-GAN, is proposed in this paper. In CS-GAN, distribution transform, reparameterization trick and sampling features are used to convert feature maps obtained from domain S to domain T . Then images of domain T are generated through features concatenation. The proposed CS-GAN is verified on three sets of Chinese calligraphic data with structural differences from three famous calligraphers, Yan Zhenqing, Zhao Mengfu and Ouyang Xun. The extensive experimental results show that the proposed CS-GAN successfully transforms the Chinese calligraphy data of different structures and outperforms the state of art models.
- Published
- 2021
9. Content caching with virtual spatial locality in Cellular Network
- Author
-
Xiaojiang Chen, Feng Chen, Xu Dan, Wei Wang, Shaojie Tang, Chen Liu, Dingyi Fang, and Anwen Wang
- Subjects
Exploit ,Computer Networks and Communications ,Wireless network ,business.industry ,Computer science ,Distributed computing ,Locality ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Computer Science Applications ,Base station ,0203 mechanical engineering ,Hardware and Architecture ,Distributed data store ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Locality of reference ,Cache ,business ,Software ,Information Systems ,Computer network - Abstract
Content caching is emerging as a vital mechanism of Wireless Cellular Network. It could reduce the content transmission distance and balance the network load efficiently. Current content caching systems have exploited the content popularity with temporal locality and users’ interests to solving the major questions: when and what to cache? But cannot point out where to cache. Past proposals for addressing these problems rely on online web caching and distributed storage systems, these works focus on wired networks or wireless networks that handsets (also called users) are independent and hence perform inefficiently when faced with complicated correlation in the practical social network, where the request probabilities of the handsets are easily affected by the others. In this paper, we introduce a wireless network content caching algorithm called PreCache that consider the social influence on users’ content requests. Our design exploit social correlation to content popularity, the intuition underlying our design is that the content request probability of handset could be affected by others handsets’ action in a same social network, and thus the content popularity exhibits a feature of spatial locality in the social network, we called the feature as virtual spatial locality. We adopt virtual spatial locality of content popularity for the change of content request probability by using a social influence model. We then design the heuristic algorithm PreCache for the selection of base stations, in which the contents are cached. We evaluate the performance of the PreCache in different network setups. The results show that PreCache could improve the successful content request ratio up to 90 % , and gain an average of 2 hop count reduction compared with ProbCache and Random Caching.
- Published
- 2017
10. A vibration-based multi-user concurrent communication system with commercial devices
- Author
-
Chase Q. Wu, Fei Shang, Tianzhang Xing, Ruilin Li, Jie Wang, and Xiaojiang Chen
- Subjects
Computer Networks and Communications ,business.industry ,Signal reconstruction ,Computer science ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Transmission medium ,Communications system ,Signal ,Transmission (telecommunications) ,Models of communication ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Computer hardware ,Data transmission - Abstract
Multi-user concurrent communication has become an increasingly important issue in mobile computing. Emerging vibration-based communication provides a new multi-to-single (M2S) data communication model for face-to-face tasks as opposed to most existing device-to-device (D2D) communication technologies. However, the transmission of multiple concurrent vibration signals often results in a highly coupled received signal, which makes it very difficult to reconstruct the source signals. This paper proposes ViCom, a vibration-based communication system that performs parallel decoding to achieve M2S transmission between mobile devices. The core of ViCom is a Decomposition Transformation Diagonal Algorithm (DTDA) that decomposes the received signal and constructs an estimated set of source signals, which are first decoupled by an autocorrelation function and then diagonalized to further improve the signal reconstruction accuracy. We implement ViCom using vibration motors and accelerometers embedded in existing smart phones and wearable devices, and evaluate its performance over different distances through disparate transmission media. Experimental results show that ViCom achieves effective data transmission of eight users with an accuracy of 98.6% and exhibits a superior overall performance over existing methods.
- Published
- 2021
11. Dynamic character grouping based on four consistency constraints in topographic maps
- Author
-
Xiaojiang Chen, Qiguang Miao, Xunli Fan, Ruyi Liu, and Pengfei Xu
- Subjects
Pixel ,business.industry ,Group (mathematics) ,Cognitive Neuroscience ,0211 other engineering and technologies ,Computer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing) ,Pattern recognition ,02 engineering and technology ,Optical character recognition ,Thesaurus ,computer.software_genre ,Computer Science Applications ,Constraint (information theory) ,Character (mathematics) ,Artificial Intelligence ,Consistency (statistics) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Data mining ,business ,computer ,Word (group theory) ,021101 geological & geomatics engineering ,Mathematics - Abstract
In optical character recognition, text strings should be extracted from images first. But only the complete text strings can accurately express the meanings of the words, so the extracted individual characters should be grouped into text strings before recognition. There are lots of text strings in topographic maps, and these texts consist of the characters with multi-colored, multi-sized and multi-oriented, and the existing methods cannot effectively group them. In this paper, a dynamic character grouping method is proposed to group the characters into text strings based on four consistency constraints, which are the color, size, spacing and direction respectively. As we know that the characters in the same word have similar colors, sizes and distances between them, and they are also on some curve lines with a certain bending, but the characters in different words are not. Based on these features of the characters, the background pixels around the characters are expanded to link the characters into text strings. In this method, due to the introduction of the color consistency constraint, the characters with different colors can be grouped well. And this method can deal with curved character strings more accurately by the improved direction consistency constraint. The final experimental results show that this method can group the characters more efficiently, especially for the case in which the beginning or the end characters of words are close to the characters of the other words.
- Published
- 2016
12. Semantics-aware obfuscation scheme prediction for binary
- Author
-
Dongxu Peng, Guixin Ye, Yujie Zhao, Dingyi Fang, Zhanyong Tang, Zheng Wang, and Xiaojiang Chen
- Subjects
Source code ,General Computer Science ,Assembly language ,Computer science ,media_common.quotation_subject ,Binary number ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Leverage (statistics) ,Malware ,020201 artificial intelligence & image processing ,Data mining ,Law ,computer ,media_common ,computer.programming_language - Abstract
By restoring the program into an easier understandable form, deobfuscation is an important technique for detecting and analyzing malicious software. To enable deobfuscation, one must know if the target program is obfuscated and what types of obfuscation schemes may be used. However, obtaining such information is challenging without having access to the original program source code. This paper presents a new way to estimate the obfuscation scheme of a compiled binary. It achieves this by using semantic information of the disassembled binary to predict if the program has been obfuscated and if so, what type of obfuscation scheme may be used. At the core of our approach is a set of deep neural networks that can effectively characterize and leverage the contextual information available in the assembly code. Our models are first trained offline, and the learned models can then be applied to new previously unseen obfuscated binaries. We evaluate our approach by applying it to a large dataset of over 277,000 obfuscated samples with different individual obfuscation schemes and their combinations. Experimental results show that our approach is highly effective in identifying the obfuscation scheme, with a prediction accuracy of at least 83% (up to 98%).
- Published
- 2020
13. A multi-direction virtual array transformation algorithm for 2D DOA estimation
- Author
-
Kaijie Xu, Dingyi Fang, Xiaojiang Chen, Da-Zheng Feng, and Nie Weike
- Subjects
Mathematical optimization ,Computational complexity theory ,Direction of arrival ,020206 networking & telecommunications ,02 engineering and technology ,Invariant factor ,Azimuth ,Matrix (mathematics) ,Control and Systems Engineering ,Signal Processing ,Singular value decomposition ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Invariant (mathematics) ,Algorithm ,Software ,Mathematics ,Interpolation - Abstract
In this paper, a multi-direction virtual array transformation algorithm termed MVATA for two dimension (2D) direction of arrival (DOA) estimation is proposed. A kind of multi-direction rotation invariant virtual subarrays is firstly constructed. Secondly, by singular value decomposition (SVD) of the response matrix of the real array to signals from a sector, the interpolation matrices can be estimated and from which the real and virtual signal subspaces are further estimated. Thirdly, a rotational invariant factor matrix is derived from the real and virtual subspaces base on least squares. Subsequently, the azimuth and elevation can be solved through the rotational invariant factor matrix without spectral peak search. Theoretical calculation and time-consuming statistics show that the proposed MVATA has the advantage of computational complexity compared with the conventional interpolated methods. Moreover, the proposed MVATA can be applied to arbitrary structure array, and the estimated 2D angles can be paired automatically. Simulation results demonstrate the proposed MVATA possesses significantly accuracy improvement especially in low SNR and small snapshots. Proposed algorithm need not the support of pairing algorithm.Complexity is reduced without spectrum search and fractal dimension processing.Accuracy is obviously improved especially in low SNR and small snapshots.2D angels have the same azimuth or elevation can be distinguished.Proposed can be applied not only to UCA but also to arbitrary structure arrays.
- Published
- 2016
14. Graphic-based character grouping in topographic maps
- Author
-
Pengfei Xu, Tiange Liu, Qiguang Miao, Xiaojiang Chen, and Nie Weike
- Subjects
Theoretical computer science ,Group (mathematics) ,business.industry ,Cognitive Neuroscience ,0211 other engineering and technologies ,Pattern recognition ,Image processing ,02 engineering and technology ,Construct (python library) ,Topographic map ,Graph model ,Computer Science Applications ,Character (mathematics) ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Undirected graph ,business ,021101 geological & geomatics engineering ,Mathematics - Abstract
In topographic maps, only the complete text strings can accurately express the properties of the geographic elements, so individual characters should be grouped into text strings before recognition. This paper presents a novel character grouping method based on the graph model. In this method, undirected graphs are used to describe different words, where the color and size of the characters are served as the properties of the nodes, while the distance and angle between the characters are served as the weights of the edges connecting pairs of characters. Therefore, the nodes can be connected to construct undirected graphs according to their properties. Then the constructed graphs are simplified according to the weights of the edges. Finally, we can get the final results corresponding to the grouped characters. Experimental results show that this method can especially group the characters with significant wide spacing. Moreover, it has higher efficiency with graphic processing instead of image processing.
- Published
- 2016
15. A novel fast image segmentation algorithm for large topographic maps
- Author
-
Pengfei Xu, Qiguang Miao, Tiange Liu, Xiaojiang Chen, and Jianfeng Song
- Subjects
Image fusion ,Fuzzy classification ,business.industry ,Segmentation-based object categorization ,Cognitive Neuroscience ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-space segmentation ,Pattern recognition ,Image segmentation ,Topographic map ,Computer Science Applications ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial Intelligence ,Segmentation ,Computer vision ,Artificial intelligence ,business ,Cluster analysis ,Mathematics - Abstract
Image segmentation for topographic maps is challenging due to their low quality, high degrees of mixed and false coloring. Besides, many pixels cannot be explicitly separated from each other because of the fuzziness of their colors. Therefore the algorithms based on fuzzy theory are suitable to process such images utilizing their ability to deal with the blurring effect. However, there are still some problems of large-scale data, high time complexity and inaccurate classification. In order to overcome these problems, we propose a novel algorithm for segmenting large topographic maps based on the ideas of fuzzy theory, randomized sampling and multilevel image fusion. In this algorithm, the large topographic map is randomly sampled first. Then the optimal clustering centers are acquired by fuzzy C-means (FCM) clustering. Further, the map is segmented with the fuzzy classification method. Finally, multilevel image fusion is used to fuse the segmented images into the final segmentation maps. Randomized sampling is used to reduce the amount of data, and improve the efficiency of image segmentation. Multilevel fusion can make the final segmentation maps more accurate. The experiments show that our method has higher efficiency and accuracy than the traditional ones. It provides a reliable image segmentation method for large topographic maps.
- Published
- 2015
16. Compile-time code virtualization for android applications
- Author
-
Dingyi Fang, Xiaojiang Chen, Zheng Wang, Zhanyong Tang, Yujie Zhao, Dongxu Peng, and Guixin Ye
- Subjects
General Computer Science ,Computer science ,Open format ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Virtualization ,Execution time ,Obfuscation (software) ,Bytecode ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,020201 artificial intelligence & image processing ,Compiler ,Android (operating system) ,Law ,computer ,Compile time - Abstract
Infringing intellectual property by reverse analysis is a severe threat to Android applications. By replacing the program instructions with virtual instructions that an adversary is unfamiliar with, code obfuscation based on virtualization is a promising way of protecting Android applications against reverse engineering. However, the current code virtualization approaches for Android only target at the DEX bytecode level. The DEX file with the open file format and more semantic information makes the decode-dispatch pattern easier to expose, which has been identified as a severe vulnerability of security and can be exploited by various attacks. Further, decode-dispatch interpretation frequently uses indirect branches in this structure to introduce extra overhead. This paper presents a novel approach to transfer code virtualization from DEX level to native level, which possesses strong security strength and good stealth, with only modest cost. Our approach contains two components: pre-compilation and compile-time virtualization. Pre-compilation is designed for performance improvement by identifying and decompiling the critical functions which consume a significant fraction of execution time. Compile-time virtualization builds upon the widely used LLVM compiler framework. It automatically translates the DEX bytecode into the common LLVM intermediate representations where a unified code virtualization pass can be applied for DEX code. We have implemented a working prototype Dex2VM of our technique and applied it to eight representative Android applications. Our experimental results show that the proposed approach can effectively protect the target code against a state-of-the-art code reverse engineering tool that is specifically designed for code virtualization, and it achieves good stealth with only modest cost.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.