Bo Meng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Deep Reinforcement Learning for Power Grid Multi-Stage Cascading Failure Mitigation.
CoRR, May, 2025

Multiscale welding defect detection method based on image adaptive enhancement.
Knowl. Based Syst., 2025

Event-triggered integral sliding mode control for discrete-time networked control systems: A data-driven method.
J. Frankl. Inst., 2025

2024
SEAOP: a statistical ensemble approach for outlier detection in quantitative proteomics data.
Briefings Bioinform., May, 2024

Robust deadline-aware network function parallelization framework under demand uncertainty.
Knowl. Based Syst., 2024

ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator.
IET Blockchain, 2024

QD-VMR: Query Debiasing with Contextual Understanding Enhancement for Video Moment Retrieval.
CoRR, 2024

Fusion of Machine Learning and Deep Neural Networks for Pulmonary Arteries and Veins Segmentation in Lung Cancer Surgery Planning.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

2023
Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets.
Neural Networks, November, 2023

K-Go: An executable formal semantics of Go language in K framework.
IET Blockchain, June, 2023

DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio.
Comput. Secur., June, 2023

Poison Dart Frog: A Clean-Label Attack with Low Poisoning Rate and High Attack Success Rate in the Absence of Training Data.
CoRR, 2023

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023

HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature.
Proceedings of the Advances in Information and Communication, 2023

Automatic Segmentation of Aortic and Mitral Valves for Heart Surgical Planning of Hypertrophic Obstructive Cardiomyopathy.
Proceedings of the Asian Conference on Machine Learning, 2023

2022
Disturbance and state observer-based adaptive finite-time control for quantized nonlinear systems with unknown control directions.
J. Frankl. Inst., 2022

Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

High-speed 850 nm Vertical-cavity Surface-emitting Lasers with Multilayer Oxide Aperture.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

2021
Automatic Rocks Segmentation Based on Deep Learning for Planetary Rover Images.
J. Aerosp. Inf. Syst., November, 2021

GCsT: Graph Convolutional Skeleton Transformer for Action Recognition.
CoRR, 2021

A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy.
IEEE Access, 2021

2020
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model.
Int. J. Netw. Secur., 2020

2019
An Optimized Tightly-Coupled VIO Design on the Basis of the Fused Point and Line Features for Patrol Robot Navigation.
Sensors, 2019

Optimization and Evaluation of Ventilation Mode in Marine Data Center Based on AHP-Entropy Weight.
Entropy, 2019

Research on Spatial Target Classification and Recognition Technology Based on Deep Learning.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Designing, Modeling and Testing of the Flexible Space Probe-Cone Docking and Refueling Mechanism.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

2018
An Optimized Two-Step Magnetic Correction Strategy by Means of a Lagrange Multiplier Estimator with an Ellipsoid Constraint.
Sensors, 2018

Human action recognition based on quaternion spatial-temporal convolutional neural network and LSTM in RGB videos.
Multim. Tools Appl., 2018

Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model.
Int. J. Netw. Secur., 2018

A Highly Sensitive Flexible Piezoresistive Sensor Based on Wrinkled CNT-PDMS.
Proceedings of the 13th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2018

The Extraction and Application of the Color Texture Feature Based on Quaternion Gabor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Epileptic Seizure Detection Based on Time Domain Features and Weighted Complex Network.
Proceedings of the Intelligent Computing Theories and Application, 2018

A Heart Rate Measurement System Based on Ballistocardiogram for Smart Furniture.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017

Dynamic modeling and analysis of docking the GEO satellite interface ring.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

A novel multi-functional self-powered pressure sensor with hierarchical wrinkle structure.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

Flexible fabric-based wearable solid-state supercapacitor.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

Operational availability model of equipment in storage based on periodic inspection modelling.
Proceedings of the 2nd International Conference on System Reliability and Safety, 2017

2016
Energy Window Optimization for X-Ray K-Edge Tomographic Imaging.
IEEE Trans. Biomed. Eng., 2016

Robot-assisted mirror ultrasound scanning for deep venous thrombosis detection using RGB-D sensor.
Multim. Tools Appl., 2016

Exploiting salient semantic analysis for information retrieval.
Enterp. Inf. Syst., 2016

Security Analysis of OpenID Connect Protocol with Cryptoverif in the Computational Model.
Proceedings of the Advances on P2P, 2016

Automatic Verification of Security of OpenID Connect Protocol with ProVerif.
Proceedings of the Advances on P2P, 2016

2015
GCM: A Greedy-Based Cross-Matching Algorithm for Identifying Users Across Multiple Online Social Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015

Floor-based large-area triboelectric generator for active security monitoring.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

2013
Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks.
J. Networks, 2013

Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover.
J. Comput., 2013

Silicon carbide capacitive pressure sensors with arrayed sensing membranes.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Curvelet-based bilinear interpolation method for low-dose CT.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif.
J. Comput., 2012

Query expansion using explicit semantic analysis.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Concept-based document models using explicit semantic analysis.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

2011
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model.
J. Networks, 2011

Selecting good expansion terms based on similarity kernel function.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

2010
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme.
J. Softw., 2010

An Efficient Receiver Deniable Encryption Scheme and Its Applications.
J. Networks, 2010

Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus.
J. Digit. Content Technol. its Appl., 2010

Research on Land-Use Type of Huainan City Based on Flood Risk Perception and Spatial Multi-Criteria Analysis.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Chaotic particle swarm optimization algorithm for support vector machine.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

A new modeling method based on bagging ELM for day-ahead electricity price prediction.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Robust controller design for active queue management system.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext.
J. Networks, 2009

A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol.
J. Comput., 2009

2008
A Formal Analysis of Coercion-Resistance of the Internet Voting Protocol Based on DKR Formal Model.
Proceedings of the International Symposium on Information Processing, 2008

An adaptive fuzzy sliding mode control for AQM systems.
Proceedings of the American Control Conference, 2008

2007
CAD Applications.
Proceedings of the Third International Conference on Semantics, 2007

Mass edge detection in mammography based on plane fitting and dynamic programming.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Resource Allocation and Scheduling Problem Based on Genetic Algorithm and Ant Colony Optimization.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Computer-aided detection of mammographic masses based on content-based image retrieval.
Proceedings of the Medical Imaging 2007: Computer-Aided Diagnosis, San Diego, 2007

A Coercion-Resistant Internet Voting Protocol.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Analyzing and Improving Internet Voting Protocol.
Proceedings of ICEBE 2007, 2007

A Digital Signature Scheme in Web-based Negotiation Support System.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

An Internet Voting Protocol with Receipt-Free and Coercion-Resistant.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Web Personalization Based on Artificial Psychology.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

A weighted average algorithm for edge-preserving smoothing on MRI images.
Proceedings of the Medical Imaging 2006: Image Processing, 2006

Research on Association Rules Based Group Ranking Model with Fuzzy Preference Relation Structure.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Research on Case Generation from Group Decision Making Experience for Evaluation.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

Simulation Modeling and Optimization for Equipment Scheduling in Container Terminals.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

A Distributed Solution for Automatic Name Correspondence in Replicated Solid Modeling Systems.
Proceedings of the 2005 International Conference on Semantics, 2005

The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Research on accountability in electronic transaction.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Design and Implementation of Web Mining System Based on Multi-agent.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

An Electronic Commerce System Prototype and Its Implementations.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Monitoring the Supply of Products in a Supply Chain Environment: A Fuzzy Neural Approach.
Proceedings of the Fourth International Conference on Electronic Business, 2004

A Negotiation Model Based on Fuzzy Multiple Criteria Decision Making Method.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Build W3C XML Schema for UN/EDIFACT Messages with Multilayer and Modular Architecture.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
A Fair Non-Repudiation Protocol.
Proceedings of the Seventh International Conference on CSCW in Design, 2002


  Loading...