• Augmented Data Selector to Initiate Text-Based CAPTCHA Attack 

      Che, Aolin; Liu, Yalin; Xiao, Hong; Wang, Hao; Zhang, Ke; Dai, Hong-Ning (Peer reviewed; Journal article, 2021)
      In the past decades, due to the low design cost and easy maintenance, text-based CAPTCHAs have been extensively used in constructing security mechanisms for user authentications. With the recent advances in machine/deep ...
    • Blockchain Dividing Based on Node Community Clustering in Intelligent Manufacturing CPS 

      Li, Suisheng; Xiao, Hong; Wang, Hao; Wang, Tao; Qiao, Jingwei; Liu, Shaofeng (Chapter, 2019)
      The blockchain technology becomes a key facilitator for Intelligent Manufacturing as it enables intelligent nodes to participate in global manufacturing networks with secure ledgers and smart contracts features. However, ...
    • Control Strategy for Denitrification Efficiency of Coal-fired Power Plant Based on Deep Reinforcement Learning 

      Fu, Jigao; Xiao, Hong; Wang, Hao; Zhou, Junhao (Peer reviewed; Journal article, 2020)
      The optimal control of denitrification system in coal-fired power plants in China has recently received widespread attention. The accurate prediction of denitrification efficiency and formulate control strategy of ...
    • MHDT: A Deep-Learning-Based Text Detection Algorithm for Unstructured Data in Banking 

      Ma, Shenglan; Yang, Lingling; Wang, Hao; Xiao, Hong; Dai, Hong-Ning; Cheng, Shuhan; Wang, Tongsen (Chapter, 2019)
      Text detection in natural scene images becomes highly demanded for unstructured data in banking. In this paper, we propose a new deep learning algorithm called MSER, Hu-moment and Deep learning for Text detection (MHDT) ...
    • Multi-Scale Feature Pair Based R-CNN Method for Defect Detection 

      Huang, Zihao; Xiao, Hong; Zhang, Rongyue; Wang, Hao; Zhang, Cheng; Shi, Xiucong (Chapter, 2019)
      The traditional defect detection algorithms based on image registration, image contrast and other image processing algorithms are only limited to a single defect. Though deep-learning-based object detection algorithms can ...
    • On Modeling Eavesdropping Attacs in Underwater Acoustic Sensor Networks 

      Wang, Qiu; Dai, Hong-Ning; Li, Xuran; Wang, Hao; Xiao, Hong (Journal article; Peer reviewed, 2016)
      The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the ...
    • On performance analysis of protective jamming schemes in wireless sensor networks 

      Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong (Peer reviewed; Journal article, 2016)
      Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious ...
    • R-PCNN Method to Rapidly Detect Objects on THz Images in Human Body Security Checks 

      Xiao, Hong; Zhang, Rongyue; Wang, Hao; Zhu, Feng; Zhang, Cheng; Dai, Hong-Ning; Zhou, Yubin (Chapter, 2018)
      Terahertz human body security images have low resolution and a low signal-to-noise ratio. In the traditional method, image segmentation, positioning, and identification are applied to detect objects carried by humans in ...
    • Sentiment Analysis of Chinese Microblog Based on Stacked Bidirectional LSTM 

      Zhou, Junhao; Lu, Yue; Dai, Hong-Ning; Wang, Hao; Xiao, Hong (Journal article; Peer reviewed, 2019)
      Sentiment analysis on Chinese microblogs has received extensive attention recently. Most previous studies focus on identifying sentiment orientation by encoding as many wordproperties as possible while they fail to consider ...