Gerhard P. Hancke’s research while affiliated with Nanjing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (483)


Figure 2: The pipeline of our proposed LuSh-NeRF. It contains two novel modules: (a) SND module: Decompose the noise in each view from the origin training image with a Noise NeRF architecture, and utilize the multi-view consistency characteristic in 3D scenario to separate the scene information and noise better; (b) CTP module: To minimize the interference of noise in low-light images on blur kernel predictions, the high frequency domain of the low light regions which are severely affected by noise are abandoned. In the rendering stage, we discard the Noise Estimator and Blur Kernel, and only use the Scenario-NeRF to render the enhanced scene.
Figure 3: Different degradations in the real low light images. (a) Low intensity (b) Noise (c) Blur.
Figure 6: Ablation study of LuSh-NeRF on a real scenario.
LuSh-NeRF: Lighting up and Sharpening NeRFs for Low-light Scenes
  • Preprint
  • File available

November 2024

·

·

Gerhard Petrus Hancke

·

Rynson W. H. Lau

Neural Radiance Fields (NeRFs) have shown remarkable performances in producing novel-view images from high-quality scene images. However, hand-held low-light photography challenges NeRFs as the captured images may simultaneously suffer from low visibility, noise, and camera shakes. While existing NeRF methods may handle either low light or motion, directly combining them or incorporating additional image-based enhancement methods does not work as these degradation factors are highly coupled. We observe that noise in low-light images is always sharp regardless of camera shakes, which implies an implicit order of these degradation factors within the image formation process. To this end, we propose in this paper a novel model, named LuSh-NeRF, which can reconstruct a clean and sharp NeRF from a group of hand-held low-light images. The key idea of LuSh-NeRF is to sequentially model noise and blur in the images via multi-view feature consistency and frequency information of NeRF, respectively. Specifically, LuSh-NeRF includes a novel Scene-Noise Decomposition (SND) module for decoupling the noise from the scene representation and a novel Camera Trajectory Prediction (CTP) module for the estimation of camera motions based on low-frequency scene information. To facilitate training and evaluations, we construct a new dataset containing both synthetic and real images. Experiments show that LuSh-NeRF outperforms existing approaches. Our code and dataset can be found here: https://github.com/quzefan/LuSh-NeRF.

Download

Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN

October 2024

·

58 Reads

Future Internet

Long-Range Wide-Area Network (LoRaWAN) technology offers efficient connectivity for numerous end devices over a wide coverage area in the Internet of Things (IoT) network, enabling the exchange of data over the Internet between even the most minor Internet-connected devices and systems. One of LoRaWAN’s hallmark features is the Adaptive Data Rate (ADR) algorithm. ADR is a resource allocation function which dynamically adjusts the network’s data rate, airtime, and energy dissipation to optimise its performance. The allocation of spreading factors plays a critical function in defining the throughput of the end device and its robustness to interference. However, in practical deployments, LoRaWAN networks experience considerable interference, severely affecting the packet delivery ratio, energy utilisation, and general network performance. To address this, we present a novel ADR framework, SSFIR-ADR, which utilises randomised spreading factor allocation to minimise energy consumption and packet collisions while maintaining optimal network performance. We implement a LoRa network composed of a single gateway that connects loads of end nodes to a network server. In terms of energy use, packet delivery rate, and interference rate (IR), our simulation implementation does better than LoRaWAN’s legacy ADR scheme for a range of application data intervals.


Boosting Weakly-Supervised Referring Image Segmentation via Progressive Comprehension

October 2024

·

2 Reads

Zaiquan Yang

·

Yuhao Liu

·

Jiaying Lin

·

[...]

·

Rynson W. H. Lau

This paper explores the weakly-supervised referring image segmentation (WRIS) problem, and focuses on a challenging setup where target localization is learned directly from image-text pairs. We note that the input text description typically already contains detailed information on how to localize the target object, and we also observe that humans often follow a step-by-step comprehension process (\ie, progressively utilizing target-related attributes and relations as cues) to identify the target object. Hence, we propose a novel Progressive Comprehension Network (PCNet) to leverage target-related textual cues from the input description for progressively localizing the target object. Specifically, we first use a Large Language Model (LLM) to decompose the input text description into short phrases. These short phrases are taken as target-related cues and fed into a Conditional Referring Module (CRM) in multiple stages, to allow updating the referring text embedding and enhance the response map for target localization in a multi-stage manner. Based on the CRM, we then propose a Region-aware Shrinking (RaS) loss to constrain the visual localization to be conducted progressively in a coarse-to-fine manner across different stages. Finally, we introduce an Instance-aware Disambiguation (IaD) loss to suppress instance localization ambiguity by differentiating overlapping response maps generated by different referring texts on the same image. Extensive experiments show that our method outperforms SOTA methods on three common benchmarks.


Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study

October 2024

·

30 Reads

IEEE Access

Near-Field Communication (NFC) has enabled mobile devices to emulate contactless smart cards, which has also rendered them susceptible to relay attacks. Numerous countermeasures have been proposed that use ambient sensors as an anti-relay mechanism. However, there are concerns regarding their efficacy in time-critical scenarios, such as transport ticketing and contactless payments. This paper empirically and comprehensively evaluates whether ambient sensors are an effective anti-relay mechanism for such NFC-based contactless transactions. To this end, we examine 17 sensors available via the Android platform. Each sensor, where feasible, was used to record measurements in 1,000 contactless transactions with 252 users across four physical locations. We then conduct an extensive four-part evaluation using similarity metrics, traditional machine learning models, and deep learning methods used in existing work and beyond. We conclude that mobile ambient sensors are currently unsuitable for detecting relay attacks on NFC contactless transactions under realistic timing constraints, contrary to the suggestions and proposals made in existing work.




Phidias: A Generative Model for Creating 3D Content from Text, Image, and 3D Conditions with Reference-Augmented Diffusion

September 2024

·

8 Reads

In 3D modeling, designers often use an existing 3D model as a reference to create new ones. This practice has inspired the development of Phidias, a novel generative model that uses diffusion for reference-augmented 3D generation. Given an image, our method leverages a retrieved or user-provided 3D reference model to guide the generation process, thereby enhancing the generation quality, generalization ability, and controllability. Our model integrates three key components: 1) meta-ControlNet that dynamically modulates the conditioning strength, 2) dynamic reference routing that mitigates misalignment between the input image and 3D reference, and 3) self-reference augmentations that enable self-supervised training with a progressive curriculum. Collectively, these designs result in a clear improvement over existing methods. Phidias establishes a unified framework for 3D generation using text, image, and 3D conditions with versatile applications.


Markov Decision Process Based Energy Aware MAC Protocol for IoT WBAN Systems

September 2024

·

17 Reads

IEEE Sensors Journal

Internet of Things (IoT) enabled WBAN systems play a crucial role in healthcare monitoring, enhancing patients’ well-being at an affordable cost. However, their primary challenge lies in energy constraints. To optimize the limited energy resources and extend the lifetime of devices within the network, a multi-channel MAC protocol with Markov decision process (MDP-HYMAC) is proposed. This protocol improves energy efficiency, throughput, and network lifetime, and minimizes delays by using separate channels for communication between biomedical devices and access points (APs). In addition, a Markov decision process is employed to stochastically model the systems’ transition states and explore optimal communication strategies between biomedical devices and APs. Furthermore, an adaptive power allocation scheme, a time-slot allocation scheme, and a back-off strategy are designed to minimize time-slot wastage, energy consumption, and delays. The proposed protocol outperforms the baseline methods by achieving significant improvements in energy efficiency from 4% to 22%. The findings of this research strongly indicate that the proposed protocol has the potential to significantly improve the performance of WBAN systems, particularly in the context of sustainable healthcare monitoring.


Homomorphic Encryption Based Resilient Distributed Energy Management Under Cyber-Attack of Micro-Grid With Event-Triggered Mechanism

September 2024

·

19 Reads

·

1 Citation

IEEE Transactions on Smart Grid

Privacy disclosures and malevolent data intrusions targeting adversarial agents pose significant menaces to cyber-physical systems, a reality that extends to the intricate realm of micro-grid energy management. This paper proposes a homomorphic encryption based resilient distributed algorithm with an event-triggered mechanism to address this problem. Due to the potential information disclosure issue, exchange information is encrypted to an arbitrary neighbor and decrypted with a private key to protect agents. Considering the potential security attacks on adversary agents, an event-trigger based resilient distributed optimization with trusted agents (ETRDO-T) is proposed. It ensures the convergence of distributed algorithms, as well as relives the communication burden caused by homomorphic encryption. The simulation results, it can be seen that even under data attacks from malicious nodes, this method can effectively protect privacy information in information exchange while ensuring the convergence of energy management.



Citations (59)


... DreamFusion [33] first introduces the SDS loss to distill 3D content from a pre-trained image diffusion model. Following this, several studies explore combining SDS loss with various 3D representations and refining the optimization framework [17,23,42,44,47,49]. However, these per-scene training approaches are inherently timeconsuming and computationally expensive. ...

Reference:

Style3D: Attention-guided Multi-view Style Transfer for 3D Object Generation
ThemeStation: Generating Theme-Aware 3D Assets from Few Exemplars
  • Citing Conference Paper
  • July 2024

... También en (Dai et al., 2024) consideran que los agentes industriales constituyen una de las tecnologías clave en los ámbitos de operación, información y comunicación para sustentar la transición digital y ecológica de los sistemas de automatización industrial con ICPS (Industrial CPS), ya que heredan los principios de inteligencia, autonomía y cooperación de los agentes software al tiempo que satisfacen los requisitos y normas de los entornos industriales. Así, los agentes industriales proporcionan capacidades de control e inteligencia distribuida para apoyar la toma de decisiones que combinadas con las características autónomas y cooperativas transforman las máquinas tradicionales en máquinas inteligentes para control, supervisión, optimización y diagnóstico. ...

Synergies of Operation, Information, and Communication Technology for Solving New Societal and Industrial Challenges: Future Directions
  • Citing Article
  • June 2024

IEEE Industrial Electronics Magazine

... W ITH rising global temperatures and environmental pollution, countries have put forward national policies to address energy exploitation and utilization [1], [2]. For instance, USA has announced carbon-free power generation and carbon-neutral ambitions by 2050; China has proposed carbon peak and carbon neutrality targets by 2060 [3]. ...

Optimal demand response based dynamic pricing strategy via Multi-Agent Federated Twin Delayed Deep Deterministic policy gradient algorithm
  • Citing Article
  • July 2024

Engineering Applications of Artificial Intelligence

... Traditionally, cellular network connections are established using RA on the physical random access channel (PRACH) [6]. During this process, each user synchronizes with the network and sends a scheduling request for data transfer in the initial RA phase. ...

A Survey on NB-IoT Random Access: Approaches for Uplink Radio Access Network Congestion Management

IEEE Access

... have a strong correlation with location information [14,15], and some of these data can be processed by an edge computing device, such as a coordinator, rather than the central node. Additionally, in a network that is constituted by high-speed nodes, such as a Vehicular Ad Hoc Network (VANET) [16], location information is also necessary for geographic routing [17], where the processing of related data can be achieved by an edge computing device, such as a Roadside Unit (RSU), rather than the control center [18]. In the cases above, attackers cannot listen to or falsify the location information of the nodes by attacking the remote server, thus improving location privacy. ...

A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs

IEEE Access

... There are multiple research on the mitigation of errors occurring due to NLOS situations and are all described in these comprehensive review articles [18,19]. However, only a limited number of research among them are aimed towards mitigating the effects of NLOS caused by human body [7,[20][21][22][23][24][25][26], a typical NLOS situation of 3D AHM application. ...

NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions
  • Citing Article
  • May 2024

ACM Computing Surveys

... The authors in [9] focus their study on designing a resilient distributed algorithm utilizing homomorphic encryption and an event-triggered mechanism to protect privacy and ensure the convergence of microgrid energy management systems despite potential data intrusions and attacks. Focusing on the resilience against cyberattacks, the authors in [10] introduce a distributionally robust recovery resource allocation method using a tri-level defender-attacker-defender model, and they ultimately optimize the recovery processes. ...

Homomorphic Encryption Based Resilient Distributed Energy Management Under Cyber-Attack of Micro-Grid With Event-Triggered Mechanism
  • Citing Article
  • September 2024

IEEE Transactions on Smart Grid

... In the field of Vision Language, weakly supervised [33, 42,34,4] have gained significant attention and great progress. These approaches aim to tackle the challenge of limited or incomplete annotations by leveraging alternative supervised data or weakly labeled data. ...

Referring Image Segmentation Using Text Supervision
  • Citing Conference Paper
  • October 2023

... Recent shadow removal techniques predominantly adopt deep learning-based approaches, leveraging publicly available datasets containing pairs of shadowed and shadow-free images (Wang, Li, and Yang 2018;Le and Samaras 2019;Qu et al. 2017) or shadow masks (Vicente et al. 2016;Sun et al. 2023). These datasets, derived from real-world captures, often suffer from limitations in both quantity and quality. ...

Adaptive Illumination Mapping for Shadow Detection in Raw Images
  • Citing Conference Paper
  • October 2023

... Diffusion Models [SDWMG15] [HJA20] are generative models which learn distributions of real images by the Gaussian noise blurring process and the reverse denoising process. They have been successfully applied to various computer vision tasks, e.g., image super-resolution [SHC * 22], inpainting [LDR * 22], color harmonization [XHL23] and image restoration [GWY * 23b] [ZCDH24]. ...

Learning Image Harmonization in the Linear Color Space
  • Citing Conference Paper
  • October 2023