Quanxin Zhang
YOU?
Author Swipe
View article: A Well-Tested Pump Card Classification and Identification Algorithm Based on Time Series Analysis Techniques
A Well-Tested Pump Card Classification and Identification Algorithm Based on Time Series Analysis Techniques Open
To accurately identify the operational conditions of oil pumping wells, promptly monitor the working status of oil wells, expedite responses to sudden pumping well accidents, and ensure orderly production at the oil extraction site, this p…
View article: Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks Open
Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks (CNNs),…
View article: Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure
Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure Open
The Unified Extensible Firmware Interface (UEFI) provides a specification of the software interface between an OS and its underlying platform firmware. UEFI UI is an interactive interface that allows users to configure and manage UEFI sett…
View article: Att&Ck Based Advanced Persistent Threat Attacks Risk Propagation Assessment Model for Zero Trust Networks
Att&Ck Based Advanced Persistent Threat Attacks Risk Propagation Assessment Model for Zero Trust Networks Open
View article: Clean‐label poisoning attacks on federated learning for <scp>IoT</scp>
Clean‐label poisoning attacks on federated learning for <span>IoT</span> Open
Federated Learning (FL) is suitable for the application scenarios of distributed edge collaboration of the Internet of Things (IoT). It can provide data security and privacy, which is why it is widely used in the IoT applications such as I…
View article: Enhancing the Transferability of Adversarial Examples with Random Patch
Enhancing the Transferability of Adversarial Examples with Random Patch Open
Adversarial examples can fool deep learning models, and their transferability is critical for attacking black-box models in real-world scenarios. Existing state-of-the-art transferable adversarial attacks tend to exploit intrinsic features…
View article: Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers Open
Backdoor attacks threaten Deep Neural Networks (DNNs). Towards stealthiness, researchers propose clean-label backdoor attacks, which require the adversaries not to alter the labels of the poisoned training datasets. Clean-label settings ma…
View article: Boosting Adversarial Transferability of MLP-Mixer
Boosting Adversarial Transferability of MLP-Mixer Open
The security of models based on new architectures such as MLP-Mixer and ViTs needs to be studied urgently. However, most of the current researches are mainly aimed at the adversarial attack against ViTs, and there is still relatively littl…
View article: Design of Transmitting Antenna for Aero-engine Telemetry Information Transmission System
Design of Transmitting Antenna for Aero-engine Telemetry Information Transmission System Open
The demand of aero-engine for non-contact telemetry information transmission is very urgent. Based on the analysis of the characteristics of aero-engine telemetry information transmission system, the rotor disk and stator disk suitable for…
View article: Design of Wireless Charging Coils for Aero-engine Telemetry Information Transmission System
Design of Wireless Charging Coils for Aero-engine Telemetry Information Transmission System Open
In order to meet the need of non-contact transmission of aero-engine telemetry information, first of all, a rotor disk and a stator disk suitable for near field communication are designed in this paper, then, the coil design of wireless ch…
View article: Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity Open
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples. Adversarial examples are malicious images with visually imperceptible perturbations. While these carefully crafted perturbations restricted with tight Lp…
View article: Study on Slag Forming Route of Dephosphorization in Combined Blown Converter
Study on Slag Forming Route of Dephosphorization in Combined Blown Converter Open
In order to achieve the purpose of high-efficiency dephosphorization by single-slag method during the combined blown converter steelmaking process, the CaO-SiO2-FetO-MgO-MnO-P2O5 slag system was taken as the research object, and the slag-f…
View article: Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity Open
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples. Adversarial examples are malicious images with visually imperceptible perturbations. While these carefully crafted perturbations restricted with tight $\…
View article: Towards cross-task universal perturbation against black-box object detectors in autonomous driving
Towards cross-task universal perturbation against black-box object detectors in autonomous driving Open
View article: Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation
Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation Open
These years, Deep Neural Networks (DNNs) have shown unprecedented performance in many areas. However, some recent studies revealed their vulnerability to small perturbations added on source inputs. Furthermore, we call the ways to generate…
View article: A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images
A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images Open
Data hiding technology plays an important role in many areas related to people's life, such as military and medical images. However, it is difficult to obtain high embedding capacity in compressed images, and it may cause obvious image dis…
View article: A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment
A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment Open
In the existing network covert channel research, the transmission of secret messages is one-way, lacking confirmation feedback on whether the secret message is successfully accepted. However, voice over LTE (VoLTE) has real-time interactiv…
View article: A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks Open
Deep neural networks(DNNs) are widely used in AI-controlled Cyber-Physical Systems (CPS) to controll cars, robotics, water treatment plants and railways. However, DNNs have vulnerabilities to well-designed input samples that are called adv…
View article: Attacking Black-Box Image Classifiers With Particle Swarm Optimization
Attacking Black-Box Image Classifiers With Particle Swarm Optimization Open
In order to better solve the shortcomings of Deep Neural Networks (DNNs) susceptible to adversarial examples, evaluating existing neural network classification performance and increasing training sets to improve the robustness of classific…
View article: An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks Open
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protoc…
View article: An end-to-end covert channel via packet dropout for mobile networks
An end-to-end covert channel via packet dropout for mobile networks Open
Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality of service for Internet protocol–based services such as audio, video, and multimedia messaging. The res…
View article: A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application Open
Telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. Group-oriented communication is an important application for telemedicine. However, transmission of information over an inse…
View article: An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services
An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services Open
Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real‐time transactions between two entities, while the central cloud server is offline and network edg…
View article: Oscillation Criteria for Second-Order Nonlinear Neutral Delay Dynamic Equations with Damping on Time Scales
Oscillation Criteria for Second-Order Nonlinear Neutral Delay Dynamic Equations with Damping on Time Scales Open
In this paper, we discuss oscillation criteria for second-order nonlinear neutral delay dynamic equations with damping on time scales by using the generalized Riccati transformation and the inequality technique. Under certain conditions, w…
View article: Improving the Power Conversion Efficiency of Carbon Quantum Dot-Sensitized Solar Cells by Growing the Dots on a TiO2 Photoanode In Situ
Improving the Power Conversion Efficiency of Carbon Quantum Dot-Sensitized Solar Cells by Growing the Dots on a TiO2 Photoanode In Situ Open
Dye-sensitized solar cells (DSSCs) are highly promising since they can potentially solve global energy issues. The development of new photosensitizers is the key to fully realizing perspectives proposed to DSSCs. Being cheap and nontoxic, …
View article: Microwave assisted synthesis of MoS<sub>2</sub>/nitrogen-doped carbon shell–core microspheres for Pt-free dye-sensitized solar cells
Microwave assisted synthesis of MoS<sub>2</sub>/nitrogen-doped carbon shell–core microspheres for Pt-free dye-sensitized solar cells Open
Novel MoS2/nitrogen-doped carbon shell–core microsphere counter electrodes of dye-sensitized solar cells with a high efficiency of 6.2%.
View article: Determining Image Base of Firmware Files for ARM Devices
Determining Image Base of Firmware Files for ARM Devices Open
Disassembly, as a principal reverse-engineering tool, is the process of recovering the equivalent assembly instructions of a program's machine code from its binary representation. However, when disassembling a firmware file, the disassembl…
View article: Research on Allocator Strategy of FAT32 File System Based on Linux a Windows
Research on Allocator Strategy of FAT32 File System Based on Linux a Windows Open
As FAT32 file system implemented on Windows is not open source, this paper tries to analyze its allocator strategy by analyzing the structure and principle of DBR, FSINFO sectors on FAT32, as well as the source code of FAT32 file system im…
View article: New Oscillation Criteria for the Second Order Nonlinear Differential Equations with Damping
New Oscillation Criteria for the Second Order Nonlinear Differential Equations with Damping Open
In this paper, we are concerned with a class of second-order nonlinear differential equations with damping term. By using the generalized Riccati technique and the integral averaging technique of Philos-type, two new oscillation criteria a…
View article: Large Scale Network Topology Visualization System Based on Three.JS
Large Scale Network Topology Visualization System Based on Three.JS Open
with the rapid development of visualization, network visualization has become an important branch, which is applied in many aspects of life such as business, education and virtual community.But existed network visualization systems are bas…