Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Liang Kou is active.

Publication


Featured researches published by Liang Kou.


The Journal of Supercomputing | 2017

A data authentication scheme for UAV ad hoc network communication

Jianguo Sun; Wenshan Wang; Liang Kou; Yun Lin; Liguo Zhang; Qingan Da; Lei Chen

In this paper, we propose an efficient and energy-saving distributed network architecture based on clustering stratification to solve the information security problem of unmanned aerial vehicle ad hoc network communication. And a double-authentication watermarking strategy is designed. In order to ensure that the data collected by nodes can be sent securely to the cluster head node, we use the self-characteristic of the collected data to generate the authentication watermark and insert it into the collected data at random. The cluster head node first verifies the integrity of collected data and deletes the suspicious data. Then, the authentication information is generated by combining the chaotic mapping method, and the watermark is hidden by changing the parity of the least significant bits of the data. Experimental results show that the proposed security strategy can resist most attacks, such as selective forwarding, data replay and tampering. Meanwhile, it has low energy consumption and low latency.


Mobile Networks and Applications | 2018

A Novel Hybrid Information Security Scheme for 2D Vector Map

Qingan Da; Jianguo Sun; Liguo Zhang; Liang Kou; Wenshan Wang; Qilong Han; Ruolin Zhou

Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity. This paper proposes a novel hybrid information security scheme for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. In order to locate the batch features deletion attack, we design a feature group correlation technique based on vertex insertion. And a fragile watermark is generated by combining with polar coordinate transformation and hash function, which is robust to resist rotation, uniform scaling and translation (RST) operations. And we embed the watermark with an RST invariant watermarking method. We construct two datasets for experimentation and the results compared with previous methods indicate that the proposed scheme has good invisibility and high tampering localization accuracy on the feature addition and deletion attack.


Security and Communication Networks | 2017

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Guoyin Zhang; Liang Kou; Liguo Zhang; Chao Liu; Qingan Da; Jianguo Sun

Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW) strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.


Cluster Computing | 2017

An intelligent method of cancer prediction based on mobile cloud computing

Guoyin Zhang; Liang Kou; Ye Yuan; Jianguo Sun; Yun Lin; Qingan Da; Wenshan Wang

In recent years, mobile medical services have gradually become the common focus of the communications and healthcare industries. People can get medical information and services efficiently and conveniently anytime, anywhere. However, due to the limitations of the mobile terminal’s own computing and storage capabilities, mobile therapy is greatly challenged. Therefore, we propose a mobile medical health system based on cloud computing. Firstly, principal component analysis was used to obtain representative features. Then, a simplified feature subset was applied to support vector machine (SVM) based on Sigmoid kernel function. The data set was categorized by SVM as cancer patient and normal object experimental results show that the method is improved in accuracy, sensitivity, and specificity.


PLOS ONE | 2018

A multi-focus image fusion method via region mosaicking on Laplacian pyramids

Liang Kou; Liguo Zhang; Kejia Zhang; Jianguo Sun; Qilong Han; Zilong Jin

In this paper, a method named Region Mosaicking on Laplacian Pyramids (RMLP) is proposed to fuse multi-focus images that is captured by microscope. First, the Sum-Modified-Laplacian is applied to measure the focus of multi-focus images. Then the density-based region growing algorithm is utilized to segment the focused region mask of each image. Finally, the mask is decomposed into a mask pyramid to supervise region mosaicking on a Laplacian pyramid. The region level pyramid keeps more original information than the pixel level. The experiment results show that RMLP has best performance in quantitative comparison with other methods. In addition, RMLP is insensitive to noise and can reduces the color distortion of the fused images on two datasets.


Multimedia Tools and Applications | 2018

A multi-focus image fusion algorithm in 5G communications

Jianguo Sun; Wenshan Wang; Kejia Zhang; Liguo Zhang; Yun Lin; Qilong Han; Qingan Da; Liang Kou

In this paper, we first build a mobile cloud platform that users can upload multi-focus images or download full-focus images through the 5G network. Then we design a method named Region Mosaicking on Contrast Pyramid (RMCP) for image fusion on the cloud platform. In the RMCP method, we apply the Sum-Modified-Laplacian to measure the focus of the multi-focus image, and use the density-based region growth algorithm to segment the focus region mask for each image. Finally, the mask is decomposed into a mask pyramid to monitor the mosaic region of the contrast pyramid. The experimental results show that RMCP based on 5G network outperforms other methods. In addition, RMCP is suitable for mobile devices.


Journal of Inequalities and Applications | 2018

Existence of weak solutions of stochastic delay differential systems with Schrödinger–Brownian motions

Jianguo Sun; Liang Kou; Gang Guo; Guodong Zhao; Yong Wang

By using new Schrödinger type inequalities appearing in Jiang and Usó (J.xa0Inequal. Appl. 2016:233, 2016), we study the existence of weak solutions of stochastic delay differential systems with Schrödinger–Brownian motions.


International Conference on E-Learning, E-Education, and Online Training | 2018

Regarding Engineering Education Professional Certification as a Starting Point, Do a Good Job of Audit Assessment

Jianguo Sun; Duo Liu; Liang Kou; Yun Lin

With the gradual implementation and deepening of engineering education in colleges and universities. Student-centered, guided by training objectives and graduation requirements. The teaching evaluation system aiming at improving students’ learning ability and ability tends to be more accurate, comprehensive and scientific. The development of intelligent talents with student development as the core. Clear new professional development trend of “Computational Complexity of System, Technology-Driven Innovation Driven and Entrepreneurial Driven, and Promotion of Interdisciplinary Formation”. Improving the students’ ability to solve complex problems and the normal monitoring of basic state data have become the important means of teaching quality assurance.


International Conference on E-Learning, E-Education, and Online Training | 2018

Taking Students as the Center, Discussing Some Thoughts on the Certification of Engineering Education Major

Yun Lin; Duo Liu; Liang Kou; Jianguo Sun

This article from the audit evaluation and professional certification two aspects of engineering education professional certification conducted a series of studies. In accordance with the “five in one” evaluation system proposed by the state to improve professional quality, “students” “learning effectiveness” as the center to achieve the goal of personnel training, develop students’ ability to learn for life, training students’ positivist and logical thinking. It is an inevitable trend to innovate the model of school-enterprise cooperation and education, promote the combination of teaching and research, and make clear that the evaluation orientation of “taking output as the mainstay” is the construction of engineering education. Finally, deepen the development of higher education informatization through innovation.


International Conference on E-Learning, E-Education, and Online Training | 2018

Construction of Teaching Quality Assurance System in the Context of Engineering Education Certification

Jianguo Sun; Duo Liu; Liang Kou; Yu Lin

The teaching quality assurance system involves all aspects of personnel training. It effectively monitors, analyzes and improves all the processes and factors that affect the quality of personnel training, which is the key to ensuring and continuously improving the teaching quality. Taking Computer Engineering College of Harbin Engineering University as an example, this paper summarizes a set of effective teaching quality assurance system through undergraduate teaching reform and practice. This article introduces the overall situation of the construction of college teaching quality assurance system, sorts out the main monitoring points in the teaching quality assurance system, and expounds the evaluation mechanism of teachers’ teaching level. After a year of teaching practice, this teaching guarantee system has achieved good results.

Collaboration


Dive into the Liang Kou's collaboration.

Top Co-Authors

Avatar

Jianguo Sun

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Wenshan Wang

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Liguo Zhang

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Qilong Han

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Qingan Da

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Yun Lin

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Guodong Zhao

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Duo Liu

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Guoyin Zhang

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Kejia Zhang

Harbin Engineering University

View shared research outputs
Researchain Logo
Decentralizing Knowledge