Xiaohu Zhao’s research while affiliated with China University of Mining and Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (20)


Enhancing face anti-spoofing through domain generalization with nonlinear spinning neural P neuron fusion and dual feature extractors
  • Article

April 2025

·

3 Reads

Computers & Electrical Engineering

Xingyi You

·

Yue Wang

·

Xiaohu Zhao



Framework for 3D face point cloud recognition.
Column 1 is the face we generated, and columns 2, 3, and 4 are the noisy data after adding real-face guidance.
Our KPConv-based dual-branch network architecture for 3D face recognition.
The core weight matrix Ωθ multiplies each input point feature fi, and the correlation coefficient hiθ is determined by the spatial relationship of the point with respect to the core point.
In our adaptive feature learning (AFL) module in the local region R, each feature Pi experiences the influence of other features, and the strength and direction of this influence are dynamically determined by the coefficients (i) and j based on the differences in feature vectors. This adaptive learning process aims to enhance the descriptive power of the output Pi′ to better capture the characteristics of the entire region.

+8

A 3D Face Recognition Algorithm Directly Applied to Point Clouds
  • Article
  • Full-text available

January 2025

·

21 Reads

Face recognition technology, despite its widespread use in various applications, still faces challenges related to occlusions, pose variations, and expression changes. Three-dimensional face recognition with depth information, particularly using point cloud-based networks, has shown effectiveness in overcoming these challenges. However, due to the limited extent of extensive 3D facial data and the non-rigid nature of facial structures, extracting distinct facial representations directly from point clouds remains challenging. To address this, our research proposes two key approaches. Firstly, we introduce a learning framework guided by a small amount of real face data based on morphable models with Gaussian processes. This system uses a novel method for generating large-scale virtual face scans, addressing the scarcity of 3D data. Secondly, we present a dual-branch network that directly extracts non-rigid facial features from point clouds, using kernel point convolution (KPConv) as its foundation. A local neighborhood adaptive feature learning module is introduced and employs context sampling technology, hierarchically downsampling feature-sensitive points critical for deep transfer and aggregation of discriminative facial features, to enhance the extraction of discriminative facial features. Notably, our training strategy combines large-scale face scanning data with 967 real face data from the FRGC v2.0 subset, demonstrating the effectiveness of guiding with a small amount of real face data. Experiments on the FRGC v2.0 dataset and the Bosphorus dataset demonstrate the effectiveness and potential of our method.

Download

IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things

November 2024

·

12 Reads

Cluster Computing

The timeliness of shared data is one of the important factors affecting efficient collaboration among smart factories (SFs). Although the blockchain-based edge computing data sharing scheme has achieved certain results in data sharing efficiency and security, the PBFT consensus algorithm widely used in the industrial Internet of Things (IIoT) still faces the problems of large communication overhead, single selection of master nodes, and lack of processing of malicious nodes. In order to solve the above problems, we propose a secure and efficient intelligent grouping PBFT (IG-PBFT) consensus algorithm for the industrial internet of things. First, we design and implement the consensus group intelligent construction method, divide the simulated SF into different consensus groups, and reduce the communication overhead of the blockchain network through two consensus processes within and among the consensus groups. Then, we propose a group leader smart factory intelligent selection method, which selects a SF for each consensus group based on the trust degree of the SF, and the SF represents the consensus group to participate in the consensus among the consensus groups, which improves the security of the blockchain network. Then, we design and implement a constrained smart factory intelligent labeling method that labels SFs based on the category of SFs in the current consensus cycle to prevent constrained SFs from participating in the consensus process. Finally, we conducted simulation experiments on the IG-PBFT consensus algorithm. Through theoretical and simulation experiments, it is proven that the IG-PBFT consensus algorithm can reduce the communication overhead of the traditional PBFT consensus algorithm, improve the security of the consensus process, and have obvious advantages in the IIoT.




A Lightweight Sensing Data Integrity Detection Method for the Industrial Internet of Things

August 2024

·

13 Reads

IEEE Sensors Journal

Data sharing provides necessary data support for collaborative production among Smart Factories (SFs) and improves the production efficiency of the manufacturing industry. However, the quality of shared data cannot meet the needs of collaborative production of high-precision manufacturing processes among SFs, which hinders in-depth cooperation among SFs to a certain extent. In order to solve the above problems, we propose a lightweight sensing data integrity detection method for the Industrial Internet of Things that performs integrity detection on the shared sensing data before the SF shares the data. Firstly, we design and implement a sensing data integrity feature extraction method to extract the integrity features of sensing data. Then, we design and implement a lightweight sensing data integrity detection method based on fuzzy support vector machines that detects the integrity of sensing data based on the integrity characteristics of sensing data. Finally, we conduct simulation experiments on the proposed method. Through theoretical and simulation experiments, it has been proven that compared with the traditional method, the accuracy of the proposed method is improved by 11.40%, the False Alarm Rate (FAR) is reduced by 79.49%, the Missing Alarm Rate (MAR) is reduced by 71.80%, the detection time is reduced by 72.40%, and the energy consumption is reduced by 12.04%.



Figure 15. Visualization results of t-SNE: (a) the distribution of the original sample; (b) the distribution of samples after VMD; (c) the distribution of samples after CSADBO-VMD; (d) the distribution Figure 15. Visualization results of t-SNE: (a) the distribution of the original sample; (b) the distribution of samples after VMD; (c) the distribution of samples after CSADBO-VMD; (d) the distribution of samples after recognition by the CSADBO-VMD-CNN-BiLSTM model (where the hyperparameters of CNN-BiLSTM are not optimized); (e) the distribution of samples after model recognition in this article (optimizing hyperparameters for VMD and CNN-BiLSTM).
Sample data of bearing fault.
Fault diagnosis accuracy of model under different parameters.
Accuracy of fault diagnosis for different models.
Optimization of Variational Mode Decomposition-Convolutional Neural Network-Bidirectional Long Short Term Memory Rolling Bearing Fault Diagnosis Model Based on Improved Dung Beetle Optimizer Algorithm

July 2024

·

21 Reads

·

6 Citations

(1) Background: Rolling bearings are important components in mechanical equipment, but they are also components with a high failure rate. Once a malfunction occurs, it will cause mechanical equipment to malfunction and may even affect personnel safety. Therefore, studying the fault diagnosis methods for rolling bearings is of great significance and is also a current research hotspot and frontier. However, the vibration signals of rolling bearings usually exhibit nonlinear and non-stationary characteristics, and are easily affected by industrial environmental noise, making it difficult to accurately diagnose bearing faults. (2) Methods: Therefore, this article proposes a rolling bearing fault diagnosis model based on an improved dung beetle optimizer (DBO) algorithm-optimized variational mode decomposition-convolutional neural network-bidirectional long short-term memory (VMD-CNN-BiLSTM). Firstly, an improved DBO algorithm named CSADBO is proposed by integrating multiple strategies such as chaotic mapping and cooperative search. Secondly, the optimal parameter combination of VMD was adaptively determined through the CSADBO algorithm, and the optimized VMD algorithm was used to perform modal decomposition on the bearing vibration signal. Then, CNN-BiLSTM was used as the model for fault classification, and hyperparameters of the model were optimized using the CSADBO algorithm. (3) Results: Finally, multiple experiments were conducted on the bearing dataset of Case Western Reserve University, and the proposed method achieved an average diagnostic accuracy of 99.6%. (4) Conclusions: Experimental comparisons were made with other models to verify the effectiveness of the proposed model. The experimental results show that the proposed model based on an improved DBO algorithm optimized VMD-CNN-BiLSTM can effectively be used for rolling bearing fault diagnosis, with high diagnostic accuracy, and can provide a theoretical reference for other related fault diagnosis problems.


Citations (7)


... Organizations can be assisted by decisionmaking, especially when facing uncertainty, to determine what details to rely on, how to resolve this disputed and inconsistent data, and whether to take action based on imprecise information. Various approaches like game theory [19], probabilistic theory [20]Optimizing theory offers a methodological approach to making well-informed decisions by reducing uncertainty risks. Integrating the fuzzy environment into a decision-making framework for evaluating blockchain-based tracking and tracing systems assists in tackling ambiguity and imprecision when dealing with a real-world problem. ...

Reference:

Evaluation of Blockchain-Based Tracking and Tracing System With Uncertain Information: A Multi-Criteria Decision-Making Approach
Blockchain and game theory enable high-efficiency data sharing in the IIoT
  • Citing Article
  • September 2024

Computers & Electrical Engineering

... Next, the SHODLM-CEIDS technique employs the CNN-BiLSTM approach for automated and accurate ID and classification. CNN can examine the inherent relationship among data and efficiently mine deep features (Sun et al., 2024). The CNN-BiLSTM methodology is appropriate for automated and accurate ID and classification due to its ability to efficiently handle both spatial and temporal features of time-series data. ...

Optimization of Variational Mode Decomposition-Convolutional Neural Network-Bidirectional Long Short Term Memory Rolling Bearing Fault Diagnosis Model Based on Improved Dung Beetle Optimizer Algorithm

... Finally, the generated concept-centric images may bring data privacy and ethical concerns. This challenge has garnered increasing attention in the research community, with recent works [24,39,61] making notable advances in privacy-preserving generation techniques. We anticipate that continued research in GenAI safety will yield effective solutions to mitigate these concerns, enabling more responsible use of synthetic data generation methods. ...

Generation of Face Privacy-Protected Images Based on the Diffusion Model

... Convolutional Neural Networks (CNNs) have been widely used to analyze and reconstruct facial structures by learning patterns from large datasets. (You et al., 2023). CNN architectures such as VGGNet, ResNet, and Inception Net have been employed to identify facial features and predict tissue depth based on skeletal morphology (Mao et al., 2022). ...

A Lightweight Monocular 3D Face Reconstruction Method Based on Improved 3D Morphing Models

... It can define and control the network in the form of software programming, which offers an innovative perspective on how the future network will be developed. Figure 1 depicts the basic architecture of SDN, which consists of three layers: the data layer, the control layer, and the application layer [5]. Among them, the control layer features a logic-centric controller that manages various forwarding rules and retains comprehensive global network information. ...

Analysis of Mobile Communication Network Architecture Based on SDN

Journal of Grid Computing

... También [33] exploran los impactos multifacéticos de la tecnología blockchain en la valoración empresarial y la seguridad de la información a partir de una revisión de estudios de casos, encuestas y análisis estadísticos. También en otro estudio, se propone un esquema de intercambio de seguridad de información de privacidad basado en blockchain en el Internet industrial de las cosas (IIoT) para resolver el problema de compartir información privada en fábricas inteligentes [34]. ...

A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things

... This model is examined utilizing the Milan city network traffic dataset, and MGCN-LSTM gained better prediction performance but has a complex structure as a drawback. By integrating GCN and GRU models, Zhang et al. [7] suggested a spatialtemporal graph convolutional gated recurrent unit (STGCGRU) model for CTP. This method is evaluated on the GEANT dataset and achieved an accuracy of 91%, MAE of 0.00279, RMSE of 0.0069 and R-square of 0.88 for the execution time of 15 minutes. ...

Network Traffic Prediction via Deep Graph-Sequence Spatiotemporal Modeling Based on Mobile Virtual Reality Technology

Wireless Communications and Mobile Computing