Guangjie Liu
YOU?
Author Swipe
View article: Analysis and research of industrial value chain optimization model based on energy internet environment
Analysis and research of industrial value chain optimization model based on energy internet environment Open
This study conducts an in-depth analysis of the optimization model of the industrial value chain under the Energy Internet environment, and provides strong data support for the optimization of the industrial value chain through the present…
View article: A Bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks
A Bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks Open
In the rapidly evolving landscape of the Internet of Things (IoT), traditional defense mechanisms struggle to counter sophisticated attribution attacks, especially under asymmetric information conditions. This paper introduces a novel Baye…
View article: A Discrete-Event Simulation System for Estimating Passenger Flow in Urban Rail Transit
A Discrete-Event Simulation System for Estimating Passenger Flow in Urban Rail Transit Open
Establishing simulation models is a widely used and effective approach for analysing passenger flow distribution in urban rail transit systems. Recently, multi-agent and discrete event-based simulation models have shown exceptional perform…
View article: Investigating the Impact of Temperature and Humidity on SINR Variations in LTE Networks: A Field Study
Investigating the Impact of Temperature and Humidity on SINR Variations in LTE Networks: A Field Study Open
Network planning and optimization in the telecommunications industry face significant challenges due to fluctuating Signal-to-Interference-plus-Noise Ratio (SINR) conditions, which can lead to inaccuracies in drive test reports and complic…
View article: The segmentation of nanoparticles with a novel approach of HRU2-Net†
The segmentation of nanoparticles with a novel approach of HRU2-Net† Open
Nanoparticles have great potential for the application in new energy and aerospace fields. The distribution of nanoparticle sizes is a critical determinant of material properties and serves as a significant parameter in defining the charac…
View article: Effect of Phosphorus Chemical Solid Waste Modified Landforming Soil on Corn Quality and Safety Evaluation
Effect of Phosphorus Chemical Solid Waste Modified Landforming Soil on Corn Quality and Safety Evaluation Open
View article: Multi-Stage Feature Alignment and Cross-Modality Collaborative Fusion for Visible-Infrared Person Re-Identification
Multi-Stage Feature Alignment and Cross-Modality Collaborative Fusion for Visible-Infrared Person Re-Identification Open
View article: A local-global Transformer-based model for Person Re-Identification
A local-global Transformer-based model for Person Re-Identification Open
Person re-identification (ReID) aims to recognize a specific individual across various camera views. State-of-the-art methods have shown that both Transformer-based and CNN-based methods deliver competitive performance. However, Transforme…
View article: MDTrans: Multi‐scale and dual‐branch feature fusion network based on Swin Transformer for building extraction in remote sensing images
MDTrans: Multi‐scale and dual‐branch feature fusion network based on Swin Transformer for building extraction in remote sensing images Open
Effective extraction of building from remote sensing images requires both global and local information. Despite convolutional neural networks (CNNs) excelling at capturing local details, their intrinsic focus on local operations poses chal…
View article: Covert Surveillance Video Transmission with QAM Constellations Modulation
Covert Surveillance Video Transmission with QAM Constellations Modulation Open
This study explores the covert transmission of surveillance videos using QAM (quadrature amplitude modulation) constellations. By analyzing transmission strategies used in surveillance video systems, we adopt KL divergence as the constrain…
View article: Boosting Adversarial Training with Learnable Distribution
Boosting Adversarial Training with Learnable Distribution Open
In recent years, various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.However, the difference …
View article: FlowCorrGCN: Enhancing Flow Correlation Through Graph Convolutional Networks and Triplet Networks
FlowCorrGCN: Enhancing Flow Correlation Through Graph Convolutional Networks and Triplet Networks Open
Anonymous network tracing is a significant research subject in the field of network security, and flow correlation technology serves as a fundamental technique for deanonymizing network traffic. Existing flow correlation techniques are con…
View article: Passenger Flow Prediction Method based on Hybrid Algorithm: Intelligent Transportation System
Passenger Flow Prediction Method based on Hybrid Algorithm: Intelligent Transportation System Open
Forecasting passenger flow at metro transit stations is a useful method for optimizing the organization of passenger transportation and enhancing operational safety and transportation efficiency. Aiming at the problem that the traditional …
View article: Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest
Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest Open
In the rapidly evolving landscape of smart transportation, the passenger volume in urban rail transit consistently demonstrates an upward trajectory. In this context, precise and scientifically grounded short-term passenger flow prediction…
View article: Investigating the Impact of Feature Selection on Adversarial Transferability in Intrusion Detection System
Investigating the Impact of Feature Selection on Adversarial Transferability in Intrusion Detection System Open
View article: Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables Open
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversa…
View article: Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks Open
In wireless sensor networks (WSNs), unmanned aerial vehicles (UAVs) are considered an effective data collection tool. In this paper, we investigate the energy-efficient data collection problem in a UAV-enabled secure WSN without knowing th…
View article: W-Net: Convolutional neural network for segmenting remote sensing images by dual path semantics
W-Net: Convolutional neural network for segmenting remote sensing images by dual path semantics Open
In the latest research progress, deep neural networks have been revolutionized by frameworks to extract image features more accurately. In this study, we focus on an attention model that can be useful in deep neural networks and propose a …
View article: EITGAN: A Transformation-based Network for recovering adversarial examples
EITGAN: A Transformation-based Network for recovering adversarial examples Open
Adversarial examples have been shown to easily mislead neural networks, and many strategies have been proposed to defend them. To address the problem that most transformation-based defense strategies will degrade the accuracy of clean imag…
View article: Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine
Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine Open
Intradialytic hypotension (IDH) is an adverse event occurred during hemodialysis (HD) sessions with high morbidity and mortality. The key to preventing IDH is predicting its pre-dialysis and administering a proper ultrafiltration prescript…
View article: Directional crossover slime mould algorithm with adaptive Lévy diversity for the optimal design of real-world problems
Directional crossover slime mould algorithm with adaptive Lévy diversity for the optimal design of real-world problems Open
The slime mould algorithm (SMA) has become a classical algorithm applied in many fields since it was presented. Nevertheless, when faced with complex tasks, the algorithm converges slowly and tends to fall into the local optimum. So, there…
View article: Covert Communication Gains from Adversary's Uncertainty of Phase Angles
Covert Communication Gains from Adversary's Uncertainty of Phase Angles Open
This work investigates the phase gain of intelligent reflecting surface (IRS) covert communication over complex-valued additive white Gaussian noise (AWGN) channels. The transmitter Alice intends to transmit covert messages to the legitima…
View article: A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic Open
The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. An intelligent system is essential to analyse and identify network traffic accurately. Network man…
View article: A New Imbalanced Encrypted Traffic Classification Model Based on CBAM and Re-Weighted Loss Function
A New Imbalanced Encrypted Traffic Classification Model Based on CBAM and Re-Weighted Loss Function Open
The accurate classification of traffic data is challenging for network management and security, especially in imbalanced situations. The limitation of the existing convolutional neural networks is that they have problems such as overfittin…
View article: Individualized tourism recommendation based on self-attention
Individualized tourism recommendation based on self-attention Open
Although the era of big data has brought convenience to daily life, it has also caused many problems. In the field of scenic tourism, it is increasingly difficult for people to choose the scenic spot that meets their needs from mass inform…
View article: The Optimal Carrier-Secret Ratio for Wireless Covert Channels Based on Constellation Shaping Modulation
The Optimal Carrier-Secret Ratio for Wireless Covert Channels Based on Constellation Shaping Modulation Open
Wireless covert communication is an emerging communication technique that prevents eavesdropping. This paper considers the bit error ratio (BER) problem of covert communication based on constellation shaping modulation (CSM). The impact of…
View article: Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace
Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace Open
View article: Wireless Covert Channel With Polarized Dirty Constellation in Backscatter Communication
Wireless Covert Channel With Polarized Dirty Constellation in Backscatter Communication Open
Ambient backscatter communication has become a low-cost and green solution to next-generation Internet-of-Things (IoT). In this paper, we investigate a problem of wireless covert communication in backscatter communication system. The purpo…
View article: Bandgap prediction of two-dimensional materials using machine learning
Bandgap prediction of two-dimensional materials using machine learning Open
The bandgap of two-dimensional (2D) materials plays an important role in their applications to various devices. For instance, the gapless nature of graphene limits the use of this material to semiconductor device applications, whereas the …
View article: Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model Open
With the development of wireless communication technology, more and more information leakage is realized through a wireless covert channel, which brings great challenges to the security of wireless communication. Compared with the wireless…