Bing Su

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
CD-YOLOv8s: an optimized high-altitude real-time UAV recognition method based on image detection.
J. Supercomput., June, 2025

SPACE: Your Genomic Profile Predictor is a Powerful DNA Foundation Model.
CoRR, June, 2025

Learning Structure-enhanced Temporal Point Processes with Gromov-Wasserstein Regularization.
CoRR, March, 2025

Variational global clue inference for weakly supervised video moment retrieval.
Knowl. Based Syst., 2025

Efficient Drone Detection Method Based on YOLOv8s Improvement.
Comput. Informatics, 2025

DeliteSeg: A Real-Time Semantic Segmentation Model for Predicting Small Objects and Object Contours.
Comput. Informatics, 2025

STOP: Integrated Spatial-Temporal Dynamic Prompting for Video Understanding.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

A Plug-and-Play Bregman ADMM Module for Inferring Event Branches in Temporal Point Processes.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Research on Secure Community Opportunity Network Based on Trust Model.
Future Internet, April, 2024

MIDWRSeg: Acquiring Adaptive Multi-Scale Contextual Information for Road-Scene Semantic Segmentation.
Comput. Informatics, 2024

Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

2023
Lightweight zero-knowledge authentication scheme for IoT embedded devices.
Comput. Networks, November, 2023

Secure Transmission Method of Power Quality Data in Power Internet of Things Based on the Encryption Algorithm.
Int. J. Data Warehous. Min., March, 2023

K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks.
Sensors, February, 2023

Transmission Protocol of Emergency Messages in VANET Based on the Trust Level of Nodes.
IEEE Access, 2023

Do We Really Need Temporal Convolutions in Action Segmentation?
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Monocular contextual constraint for stereo matching with adaptive weights assignment.
Image Vis. Comput., 2022

Efficient U-Transformer with Boundary-Aware Loss for Action Segmentation.
CoRR, 2022

Semi-WTC: A Practical Semi-supervised Framework for Attack Categorization through Weight-Task Consistency.
CoRR, 2022

Convolutional Transformer with Similarity-based Boundary Prediction for Action Segmentation.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Software Misconfiguration Troubleshooting Based on State Analysis.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Trusted Opportunistic Routing Based on Node Trust Model.
IEEE Access, 2020

Bi-Objective Vehicle Routing for Muck Transportation in Urban Road Networks.
IEEE Access, 2020

2018
Digital Twin of Solid Rocket Motor, Problem and Challenge.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

2017
Short-term traffic flow prediction based on optimised support vector regression.
Int. J. Appl. Decis. Sci., 2017

2016
Research on the coordination strategy in the supply chain with substituting procurement financing based on option contract.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

2015
Multitask Oriented GPU Resource Sharing and Virtualization in Cloud Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
A Study on Online Decision Model for Information Technology Adoption.
Proceedings of the 12th Wuhan International Conference on E-Business, 2013

2010
Research on Dynamic Connectivity of Urban Road Network.
Proceedings of the Information and Automation - International Symposium, 2010

Comet: batched stream processing for data intensive distributed computing.
Proceedings of the 1st ACM Symposium on Cloud Computing, 2010

2009
Wave Computing in the Cloud.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

2008
Finding the anti-block vital edge of a shortest path between two nodes.
J. Comb. Optim., 2008

An SVM-Based Algorithm for Classifying Promoter-Associated CpG Islands in the Human and Mouse Genomes.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008

1995
A Novel Closed Contour Extractor, Principle and Algorithm.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995


  Loading...