Xuanang Feng’s research while affiliated with Nagoya University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


Genetic Algorithm-based Optimization of Deep Neural Network Ensemble
  • Article

March 2021

·

26 Reads

·

13 Citations

The Review of Socionetwork Strategies

Xuanang Feng

·

Jianing Zhao

·

Eisuke Kita

Personal identification is the task of authenticating a person using individual biological features. Deep neural networks (DNNs) have demonstrated an impressive performance in this field. Since no general algorithm is available for the design of network structures and the parameters adopted in DNNs for every application problem, DNNs should be determined according to the programmers’ experiments and know-how. For a new application task, it is very time-consuming for non-experts to design network structure, hyperparameters and an ensemble of base models adequately and effectively. In this paper, we present a genetic algorithm (GA)-based approach to construct network structures, tune their hyperparameters, and generate base models for the ensemble algorithm. The ensemble is constructed from base models with different network structures according to the voting ensemble algorithm. Our original personal identification dataset is employed as the numerical example to illustrate the performance of the proposed method. The results show that the prediction accuracy of the ensemble model is better than that of the base models and that the prediction of walking behavior toward the Kinect at 90 degrees and 225 degrees is more difficult than other walking behaviors.



An Algorithm of Recommending Apposite ID Photos

December 2019

·

4 Reads

The Review of Socionetwork Strategies

This article proposes an algorithm to recommend apposite ID photos for users by judging the photo of which the facial expression is apposite or not as the ID photo. Microsoft’s Kinect sensor is used for taking photos. Parts of the face, such as eyes, nose, and mouth, are analyzed as explanatory variables for judging face expression. Some body coordinate information such as head and shoulders is used to trim the photos. Neural networks and support vector machines are employed and compared to our proposed method. To achieve accurate results, ten examinees including specialized staff are selected for taking ID photo used for training models. A series of experiments are conducted to examine the validity. As a result, the accuracy of neural networks is better than that of the support vector machine. Furthermore, we analyze and discuss the difference between system results and specialized staffs’ opinions.




Personal Identification Through Pedestrians’ Behavior

October 2018

·

29 Reads

·

4 Citations

The Review of Socionetwork Strategies

This article focuses on a new approach for personal identification by exploring the features of pedestrian behavior. The recent progress of a motion capture sensor system enables personal identification using human behavioral data observed from the sensor. Kinect is a motion sensing input device developed by Microsoft for Xbox 360 and Xbox One. Personal identification using the Microsoft Kinect sensor (hereafter referred to as Kinect) is presented in this study. Kinect is used to estimate body sizes and the walking behaviors of pedestrians. Body sizes such as height and width, and walking behavior such as joint angles and stride lengths, for example, are used as explanatory variables for personal identification. An algorithm for the personal identification of pedestrians is defined by a traditional neural network and by a support vector machine. In the numerical experiments, pictures of body sizes and the walking behaviors are captured from fifteen examinees through Kinect. The walking direction of pedestrians was specified as 0°, 90°, 180°, and 225°, and then the accuracies were compared. The results indicate that identification accuracy was best when the walking direction was 180°. In addition, the accuracy of the vector machine was better than that of the neural network.



Personal Authentication Using a Kinect Sensor

November 2017

·

54 Reads

·

2 Citations

The Review of Socionetwork Strategies

This article proposes a new approach to personal authentication by exploring the features of a person’s face and voice. Microsoft’s Kinect sensor is used for facial and voice recognition. Parts of the face including the eyes, nose, and mouth, etc., are analyzed as position vectors. For voice recognition, a Kinect microphone array is adopted to record personal voices. Mel-frequency cepstrum coefficients, logarithmic power, and related values involved in the analysis of personal voice are also estimated from the voices. Neural networks,support vector machines and principal components analysis are employed and compared for personal authentication. To achieve accurate results, 20 examinees were selected for face and voice data used for training the authentication models. The experimental results show that the best accuracy is achieved when the model is trained by a support vector machine using both facial and voice features.




Citations (4)


... It's crucial to note that, in order to guarantee the predictive performance of the ensemble learning model, the selection of basic learners must consider both model accuracy as well as model diversity. GA [14,31] mimics the natural process of chromosomal recombination evolution and has been demonstrated to be wellsuited for optimization problems related to genomics. To streamline and automate this process, we utilize the "GA" package to optimize the selected basic learners. ...

Reference:

Architecting the metabolic reprogramming survival risk framework in LUAD through single-cell landscape analysis: three-stage ensemble learning with genetic algorithm optimization
Genetic Algorithm-based Optimization of Deep Neural Network Ensemble
  • Citing Article
  • March 2021

The Review of Socionetwork Strategies

... Many researchers have validated the effectiveness of optimization algorithms in deep learning model structure and key parameter design [14][15][16]. Feng et al. [17] verified that the ensembled depth model optimized by the optimization algorithm has better performance than the single model. Doaa [18] proposed a usage prediction method based on a weighted ensemble of machine learning models, which uses example swarm optimization guided whale optimization algorithm to optimize the weights of the base model. ...

Genetic Algorithm Based Optimization of Deep Neural Network Ensemble for Personal Identification in Pedestrians Behaviors
  • Citing Conference Paper
  • November 2019

... Telephone conversation is considered as one of the most concerning privacy and security issues because it involves with users' personal information, such as user identification [1], financial information [2], passwords To address these challenges, in this paper, we propose Vibphone, a new side-channel attacking method exploiting a built-in zero-permission accelerometer to eavesdrop on telephone conversations as illustrated in Fig. 1. We have validated that smartphone accelerometers are sensitive to SIV signals, and the device diversity does have a decisive impact on the performance of Vibphone (see Section 3). ...

Personal Identification Through Pedestrians’ Behavior
  • Citing Article
  • October 2018

The Review of Socionetwork Strategies

... In previous study, the Mel-frequency cepstrum coefficients, the logarithmic power and their related values are calculated from the personal voice [8]. Another study in [9] was on facial depth data of a speaking subject, captured by the Kinect device, as an additional speech informative modality to incorporate to a traditional audiovisual automatic speech recognizer. ...

Personal Identification with Face and Voice Features Extracted through Kinect Sensor
  • Citing Conference Paper
  • December 2016