Alex X. Liu’s research while affiliated with Midea Group and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (392)


Reliable Open-Set Network Traffic Classification
  • Article

January 2025

·

6 Reads

IEEE Transactions on Information Forensics and Security

Xueman Wang

·

Yipeng Wang

·

·

[...]

·

Alex X. Liu

The widespread use of modern network communications necessitates effective resource control and management in TCP/IP networks. However, most existing network traffic classification methods are limited to labeled known classes and struggle to handle open-set scenarios, where known classes coexist with significant volumes of unknown classes of traffic. To solve this problem more accurately and reliably, we propose RoNeTC. This method achieves high-precision classification by enhancing feature extraction and quantifying the reliability of classification decisions through uncertainty estimation. For feature extraction, we divide each packet of a flow into three views for parallel training, integrating both local and global feature representations across multiple packets to enhance accuracy. We devise a second-order classification probability to quantify the reliability of the classifier’s results and to visualize the reliability of open-set flow classification in terms of uncertainty. Additionally, we dynamically fuse classification decisions from multiple views, evaluating decision uncertainty to classify known and unknown flows and ensure robust, reliable results. We compare RoNeTC with four state-of-the-art (SOTA) methods in six open-set scenarios. RoNeTC outperforms the other methods by an average of 25.94% in F1 across all open-set scenarios, indicating its superior performance in open-set network traffic classification.


Advanced schematic diagram of the PredRNN-V2 architecture [20].
Architectural framework diagram with jump connection strategy.
On the left is the Schematic Diagram of the Time Memory Flow Architecture in the PredRNN Model, and on the right is the Improved Schematic Diagram of the Time Memory Flow Architecture with Jump Connections Introduced.
(a) Improved architecture incorporating temporal correlation attention mechanism. (b) Traditional SDPA architecture and proposed temporal correlation attention architecture.
Display of prediction results on the Moving-MNIST test dataset.

+9

Enhanced Precipitation Nowcasting via Temporal Correlation Attention Mechanism and Innovative Jump Connection Strategy
  • Article
  • Full-text available

October 2024

·

33 Reads

This study advances the precision and efficiency of precipitation nowcasting, particularly under extreme weather conditions. Traditional forecasting methods struggle with precision, spatial feature generalization, and recognizing long-range spatial correlations, challenges that intensify during extreme weather events. The Enhanced Temporal Correlation Jump Prediction Network (ETCJ-PredNet) introduces a novel attention mechanism that optimally leverages spatiotemporal data correlations. This model scrutinizes and encodes information from previous frames, enhancing predictions of high-intensity radar echoes. Additionally, ETCJ-PredNet addresses the issue of gradient vanishing through an innovative jump connection strategy. Comparative experiments on the Moving Modified National Institute of Standards and Technology (Moving-MNIST) and Hong Kong Observatory Dataset Number 7 (HKO-7) validate that ETCJ-PredNet outperforms existing models, particularly under extreme precipitation conditions. Detailed evaluations using Critical Success Index (CSI), Heidke Skill Score (HSS), Probability of Detection (POD), and False Alarm Ratio (FAR) across various rainfall intensities further underscore its superior predictive capabilities, especially as rainfall intensity exceeds 30 dbz,40 dbz, and 50 dbz. These results confirm ETCJ-PredNet’s robustness and utility in real-time extreme weather forecasting.

Download

Application of Quantum Recurrent Neural Network in Low Resource Language Text Classification

January 2024

·

84 Reads

·

7 Citations

IEEE Transactions on Quantum Engineering

Text sentiment analysis is an important task in natural language processing and has always been a hot research topic. However, in low-resource regions such as South Asia, where languages like Bengali are widely used, the research interest is relatively low compared to high-resource regions due to limited computational resources, flexible word order, and high inflectional nature of the language. With the development of quantum technology, quantum machine learning models leverage the superposition property of qubits to enhance model expressiveness and achieve faster computation compared to classical systems. To promote the development of quantum machine learning in low-resource language domains, we propose a quantum-classical hybrid architecture. This architecture utilizes a pre-trained multilingual BERT model to obtain vector representations of words and combines the proposed Batched Upload Quantum Recurrent Neural Network (BUQRNN) and Parameter Non-shared Batched Upload Quantum Recurrent Neural Network (PN-BUQRNN) as feature extraction models for sentiment analysis in Bengali. Our numerical results demonstrate that the proposed BUQRNN structure achieves a maximum accuracy improvement of 0.993% in Bengali text classification tasks while reducing average model complexity by 12%. The PN-BUQRNN structure surpasses the BUQRNN structure once again and outperforms classical architectures in certain tasks.


Cooperative Localization Using Expected Minimum Segment for Irregular Multi-Hop Networks

January 2024

·

7 Reads

IEEE/ACM Transactions on Networking

For the creation of wireless network applications, node locations are frequently necessary. However, communication effectiveness, measurement accuracy, and localization stability will be low in irregular multi-hop networks when locating nodes using conventional algorithms. To this end, a novel cooperative localization algorithm using expected minimum segments (LEMS, for short) is proposed in this paper. LEMS begins by measuring the distance between paired nodes, which is completed along with network initialization. Then, each unlocated node constructs its own sub-network, including it, based on the error characteristics among anchor nodes. Finally, each unlocated node searches for its estimated location in its sub-region based on the objective function generated by the chaotic mapping. Simulation results demonstrate that the proposed algorithm significantly outperforms the state-of-the-art regarding efficiency, accuracy, and stability for various irregular networks. Specifically, our proposed algorithm achieves a median improvement in localization accuracy of 0.62 to 29.57 times and a reduction in the range of localization errors of 0.06 to 16.8 times.




A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal–Spatial Data

January 2023

·

75 Reads

·

11 Citations

Anomaly detection in multivariate time series is an important problem with applications in several domains. However, the key limitation of the approaches that have been proposed so far lies in the lack of a highly parallel model that can fuse temporal and spatial features. In this paper, we propose TDRT, a three-dimensional ResNet and transformer-based anomaly detection method. TDRT can automatically learn the multi-dimensional features of temporal–spatial data to improve the accuracy of anomaly detection. Using the TDRT method, we were able to obtain temporal–spatial correlations from multi-dimensional industrial control temporal–spatial data and quickly mine long-term dependencies. We compared the performance of five state-of-the-art algorithms on three datasets (SWaT, WADI, and BATADAL). TDRT achieves an average anomaly detection F1 score higher than 0.98 and a recall of 0.98, significantly outperforming five state-of-the-art anomaly detection methods.


A Near-Optimal Protocol for Continuous Tag Recognition in Mobile RFID Systems

January 2023

·

9 Reads

·

8 Citations

IEEE/ACM Transactions on Networking

Mobile radio frequency identification (RFID) systems typically experience the continual movement of many tags rapidly going in and out of the interrogating range of readers. Readers that are deployed to maintain a current, real-time list of tags, which are present in the interrogating zone at any moment, must repeatedly execute a series of reading cycles. Each of these reading cycles provides the readers very limited time to identify unknown tags (those newly entering into the reader’s range), and, at the same time, to detect missing tags (those just leaving the reader’s range). In this paper, we study the continuous tag recognition problem, which is critical for mobile RFID systems. First, we obtain a lower bound on communication time for solving this problem. We then design a near-OPTimal protocoL, called OPT-L, and prove that its communication time is approximately equal to the lower bound. Finally, we present extensive simulation and experimental results that demonstrate OPT-L’s superior performance over other existing protocols.


Hybrid Physical-Layer Authentication

January 2023

·

34 Reads

·

7 Citations

IEEE Transactions on Mobile Computing

Physical-Layer Authentication (PLA) attracts a lot of research interests because of its significant advantages over upper-layer authentication mechanisms: high security and low complexity. The PLA schemes can be categorized into passive and active schemes. In this paper, we extensively leverage the advantages of both the active and passive schemes as a reference scheme, named as the Direct Hybrid (DH) scheme. Although the DH scheme improves the authentication performance of the prior PLA schemes, it has limitations, e.g., high communication overhead. Then, we further propose two hybrid PLA schemes to overcome the limitations of the DH scheme. The first proposed scheme further uses the advantage of the Challenge-Response Authentication Mechanism (CRAM) scheme, named as the CR-based Hybrid (CRH) scheme. Although both DH and CRH schemes significantly improve the authentication performance of the prior PLA schemes, they do not address one significant limitation of the active scheme, i.e., to set the power allocation of a tag empirically. Thus, based on the CRH scheme, we further propose the Adaptive CR-Based Hybrid (ACRH) scheme to adaptively set the parameter instead of the empirical setting. Moreover, we provide the theoretical analysis of the proposed schemes over wireless fading channels and derive their closed-form expressions in terms of the Probability of Detection (PD), Probability of False Alarm (PFA), and optimal threshold, respectively. At last, we discuss the advantages and disadvantages of the proposed schemes and give some useful suggestions for seeking a better tradeoff. Our experimental results show that, in comparison with the active scheme, the DH scheme has better robustness, and the CRH scheme has better both robustness and compatibility but it sacrifices the security. The ARCH scheme achieves a better tradeoff than the remaining schemes.


Omnidirectional Chargability With Directional Antennas

January 2023

·

7 Reads

·

8 Citations

IEEE Transactions on Mobile Computing

Wireless Power Transfer (WPT) has received more and more attention for its convenience and reliability. In this paper, we first propose the notion of omnidirectional charging. First, we consider the problem of detecting whether the target area achieves omnidirectional charging given a deterministic deployment of chargers. We use piecewise constant approximation and area discretization techniques to partition the target area and approximate charging power as constants. Next, we propose the Minimum Coverage Set extraction technique to design a fast detection algorithm. Second, we design a charger deployment scheme that satisfies omnidirectional charging. By placing the chargers at the triangle lattice points, we estimate the length of triangle lattice side length that satisfies omnidirectional charging, and derive the error bound with the optimal length. Third, we determine the probability that the target area achieves omnidirectional charging given a random deployment of chargers. We devise both analytical and numerical solutions for the problem with good accuracy. Finally, we conduct simulation and field experiments, and the results show that the running speed of our omnidirectional charging detection algorithm is at least 1×1\times faster than comparison algorithms, and the consistency degree of our theoretical results and field experimental results is larger than 93.6%93.6 \% .


Citations (60)


... These methods secure sensitive data in medical imaging and other critical domains [258][289]. • Image Enhancement and Reconstruction: Quantum-based enhancement techniques, such as quantum histogram equalization, improve visual quality for degraded images, while quantum image reconstruction algorithms restore images with higher fidelity [260][261] [262]. ...

Reference:

Comprehensive Survey of QML: From Data Analysis to Algorithmic Advancements
Application of Quantum Recurrent Neural Network in Low Resource Language Text Classification

IEEE Transactions on Quantum Engineering

... Overall, these studies have collectively advanced the FEND field by integrating diverse methodologies and innovative frameworks [35][36][37][38] . The ongoing DL-based technique development has significantly been beneficial to identify and mitigate the impact of misinformation across various social contexts and everyday life scenarios. ...

A Near-Optimal Protocol for Continuous Tag Recognition in Mobile RFID Systems
  • Citing Article
  • January 2023

IEEE/ACM Transactions on Networking

... Some works study the directional charger problem, but their solutions have not been applied in our research. In [21], the authors proposed a method to detect omnidirectional charging capability for a given topology of directional chargers. They also studied how to place directional chargers to maximize charging utility in [22] to resolve the wireless charger deployment optimization problem. ...

Omnidirectional Chargability With Directional Antennas
  • Citing Article
  • January 2023

IEEE Transactions on Mobile Computing

... Traditional emotion recognition methods in educational settings have struggled with low efficiency and accuracy due to their reliance on explicit feature extraction and the complex nature of human emotion perception [15]. Furthermore, existing neural network approaches often fail to fully capture the nuances of emotional expression [16], particularly in side-view expressions. To achieve adaptive interaction at the affective level of intelligent learning environments and to facilitate learners to learn easily, engagingly, and effectively, this study proposes an image sentiment analysis method based on dual-stream coding of facial and background actions. ...

A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal–Spatial Data

... Physical-layer authentication (PLA) has attracted lots of attentions due to its unique advantages, e.g., high security and low-complexity. The information theoretic security can be obtained by the PLA since the physical layer introduces uncertainty into the adversary, whilst the low-complexity of PLA is because the intrinsic physical-layer features can be utilized for authentication instead of a complex encryption algorithm [2]. Compared to upper-layer authentication mechanisms ensuring the security by using conventional cryptography-based algorithms, PLA is more applicable for emerging wireless communication systems, e.g., internet of vehicles (IoV), smart grids (SG) networks, cognitive radio (CR) networks, and unmanned aerial vehicles (UAV) [3]. ...

Hybrid Physical-Layer Authentication
  • Citing Article
  • January 2023

IEEE Transactions on Mobile Computing

... On the other side, responding multiple tags at the same time creates tag collision leads to inaccurate vehicle identification. ALOHA-based and tree-based algorithms are used to prevent tag collisions [10]. The proposed scenario for ETC is designed in such a way that two reader antennas (no. of antenna can be varied according to the toll gate area) installed at the top of the toll gate. ...

Identifying RFID Tags in Collisions
  • Citing Article
  • January 2022

IEEE/ACM Transactions on Networking

... Besides, authentication in downlink communications is more challenging because UAVs do not have sufficient sensing capabilities like the BS to capture recognizable identity features. In comparison, tag-based scheme can achieve more reliable authentication due to its independence from the observed physical layer attributes [32], [33]. Specifically, a tag can be generated by a one-way non-linear mapping of the key and the message, similar to the message authentication code (MAC) in the upper layer blockchain-based authentication, but MAC is required to be completely correct while the tag can be with tolerable errors [26], [27]. ...

An Optimization Framework for Active Physical-Layer Authentication
  • Citing Article
  • January 2022

IEEE Transactions on Mobile Computing

... In addition, the works in [3,9,18,22,27,41] evaluate the performance of their flow classifiers with various numbers of packets or time intervals. Notably, in [53], the authors classify flows using their first several initial packets. However, this number of packets is a hyper parameter optimized on each training dataset, i.e., deployment network, rather than on a per flow level. ...

A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic
  • Citing Article
  • January 2022

IEEE/ACM Transactions on Networking

... RSSI represents the signal strength of the received radio frequency signal. A clustering RFID system is mostly focused on the large-scale RFID Network [26], [45]- [47]. When huge numbers of nodes have participated in a network, the existing tracking algorithms are not guaranteed for the efficiency of the network. ...

Unknown Tag Identification Protocol Based on Collision Slot Resolution in Large-Scale and Battery-Less RFID System
  • Citing Article
  • January 2022

IEEE Sensors Journal

... In recent years, wireless sensing has become a hot research area. Diverse wireless signals have been employed for vital sign monitoring, such as WiFi [10,11], RFID [12], radar [13], LoRa [14,15], and visible light [16,17]. Different from traditional sensor-based sensing, wireless sensing relies on analyzing the wireless signals reflected from the target to obtain vital sign information. ...

On Goodness of WiFi Based Monitoring of Sleep Vital Signs in the Wild
  • Citing Article
  • January 2021

IEEE Transactions on Mobile Computing