no code implementations • 23 Jul 2024 • Wensheng Deng, Bin Qiu, Wenchi Cheng
This paper introduces a multi-beam secure communication scheme for mixed near-field and far-field (hNF) scenarios, primarily designed to address the challenges faced by sixth-generation (6G) networks in simultaneously managing near-field and far-field communications.
no code implementations • 19 Jul 2024 • Bin Qiu, Wenchi Cheng, Wei zhang
The goal of this paper is to address the physical layer (PHY) security problem for multi-user multi-input single-output (MU-MISO) Internet of Things (IoT) systems in the presence of passive eavesdroppers (Eves).
no code implementations • 19 Jul 2024 • Bin Qiu, Wenchi Cheng, Wei zhang
In this paper, we consider the physical layer (PHY) security problem for hybrid wiretapping wireless systems in millimeter wave transmission, where active eavesdroppers (AEs) and passive eavesdroppers (PEs) coexist to intercept the confidential messages and emit jamming signals.
no code implementations • 18 Jul 2024 • Bin Qiu, Wenchi Cheng, Wei zhang
This paper presents an AN-aided decomposed and distributed directional modulation (D3M) scheme for secure wireless communications, which takes advantage of the spatial signatures to achieve an extra range-dimension security apart from the angles.
2 code implementations • IEEE Transactions on Medical Imaging 2022 • Mufeng Geng, Xiangxi Meng, Jiangyuan Yu, Lei Zhu, Lujia Jin, Zhe Jiang, Bin Qiu, Hui Li, Hanjing Kong, Jianmin Yuan, Kun Yang, Hongming Shan, Hongbin Han, Zhi Yang, Qiushi Ren, Yanye Lu
In this study, we propose a simple yet effective strategy, the content-noise complementary learning (CNCL) strategy, in which two deep learning predictors are used to learn the respective content and noise of the image dataset complementarily.
1 code implementation • 29 Dec 2021 • Lei Zhu, Qi She, Qian Chen, Xiangxi Meng, Mufeng Geng, Lujia Jin, Zhe Jiang, Bin Qiu, Yunfei You, Yibao Zhang, Qiushi Ren, Yanye Lu
In our B-CAM, two image-level features, aggregated by pixel-level features of potential background and object locations, are used to purify the object feature from the object-related background and to represent the feature of the pure-background sample, respectively.
no code implementations • 14 Dec 2017 • Ning Li, Haopeng Liu, Bin Qiu, Wei Guo, Shijun Zhao, Kungang Li, Jie He
This paper proposes a novel and efficient method to build a Computer-Aided Diagnoses (CAD) system for lung nodule detection based on Computed Tomography (CT).