Biblio

Filters: Author is Liu, Cong  [Clear All Filters]
2022-08-12
Liu, Cong, Liu, Yunqing, Li, Qi, Wei, Zikang.  2021.  Radar Target MTD 2D-CFAR Algorithm Based on Compressive Detection. 2021 IEEE International Conference on Mechatronics and Automation (ICMA). :83—88.
In order to solve the problem of large data volume brought by the traditional Nyquist sampling theorem in radar signal detection, a compressive detection (CD) model based on compressed sensing (CS) theory is proposed by analyzing the sparsity of the radar target in the range domain. The lower sampling rate completes the compressive sampling of the radar signal on the range field. On this basis, the two-dimensional distribution of the Doppler unit is established by moving target detention moving target detention (MTD), and the detection of the target is achieved with the two-dimensional constant false alarm rate (2D-CFAR) detection algorithm. The simulation experiment results prove that the algorithm can effectively detect the target without the need for reconstruction signals, and has good detection performance.
2018-05-16
Dong, Zhen, Liu, Cong, Li, Yanhua, Bao, Jie, He, Tian.  2017.  REC: Predictable Charging Scheduling for Electric Taxi Fleets. IEEE Real-Time Systems Symposium (RTSS 2017). :1–10.
2017-04-24
Ye, Conghuan, Ling, Hefei, Xiong, Zenggang, Zou, Fuhao, Liu, Cong, Xu, Fang.  2016.  Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain. ACM Trans. Multimedia Comput. Commun. Appl.. 12:61:1–61:23.

With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the meantime, social networking platforms based on cloud computing have made multimedia big data sharing in social networks easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use, such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social networks. In this article, a joint fingerprinting and encryption (JFE) scheme based on tree-structured Haar wavelet transform (TSHWT) is proposed with the purpose of protecting media distribution in social network environments. The motivation is to map hierarchical community structure of social networks into a tree structure of Haar wavelet transform for fingerprinting and encryption. First, fingerprint code is produced using social network analysis (SNA). Second, the content is decomposed based on the structure of fingerprint code by the TSHWT. Then, the content is fingerprinted and encrypted in the TSHWT domain. Finally, the encrypted contents are delivered to users via hybrid multicast-unicast. The proposed method, to the best of our knowledge, is the first scalable JFE method for fingerprinting and encryption in the TSHWT domain using SNA. The use of fingerprinting along with encryption using SNA not only provides a double layer of protection for social multimedia sharing in social network environment but also avoids big data superposition effect. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.