Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Adversarial Training Based on Latent Distribution Calibration

    Deep neural networks show vulnerability to adversarial examples, so it is necessary to study adversarial defense techniques in depth to improve the robustness of deep learning models. Most of the existing defe...

    Qingan Da, Guoyin Zhang, Wenshan Wang in Computational and Experimental Simulations… (2024)

  2. No Access

    Chapter and Conference Paper

    Path Planning with Improved Dueling DQN Algorithm for UAVs in Unknown Dynamic Environment

    Unmanned Aerial Vehicles (UAVs) have been widely used in emergency rescue because of their small size and low cost, which can effectively reduce casualties and improve rescue efficiency. However, for UAV colli...

    Wenshan Wang, Guoyin Zhang, Qingan Da in Computational and Experimental Simulations… (2024)

  3. No Access

    Article

    A data authentication scheme for UAV ad hoc network communication

    In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network ...

    Jianguo Sun, Wenshan Wang, Liang Kou, Yun Lin, Liguo Zhang in The Journal of Supercomputing (2020)

  4. No Access

    Article

    A multi-focus image fusion algorithm in 5G communications

    In this paper, we first build a mobile cloud platform that users can upload multi-focus images or download full-focus images through the 5G network. Then we design a method named Region Mosaicking on Contrast ...

    Jianguo Sun, Wenshan Wang, Kejia Zhang, Liguo Zhang in Multimedia Tools and Applications (2019)

  5. No Access

    Article

    An intelligent method of cancer prediction based on mobile cloud computing

    In recent years, mobile medical services have gradually become the common focus of the communications and healthcare industries. People can get medical information and services efficiently and conveniently any...

    Guoyin Zhang, Liang Kou, Ye Yuan, Jianguo Sun, Yun Lin, Qingan Da in Cluster Computing (2019)

  6. No Access

    Article

    A Novel Hybrid Information Security Scheme for 2D Vector Map

    Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity....

    Qingan Da, Jianguo Sun, Liguo Zhang, Liang Kou in Mobile Networks and Applications (2018)

  7. No Access

    Chapter and Conference Paper

    A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication

    In this paper, we use a grou** method and feature marking to ensure a good localization accuracy. Then, on the basis of vertex insertion and an embedding strategy that can resist rotation, translation and sc...

    Guoyin Zhang, Qingan Da, Liguo Zhang in Advances in Multimedia Information Process… (2018)

  8. No Access

    Chapter and Conference Paper

    A Fragile Watermarking Scheme of Anti-deleting Features for 2D Vector Map

    This paper proposes a fragile watermarking scheme of anti-deleting features for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. I...

    Guoyin Zhang, Qingan Da, Liguo Zhang, Jianguo Sun in Advanced Hybrid Information Processing (2018)