Bo Meng

Orcid: 0000-0001-6894-4479

According to our database1, Bo Meng authored at least 111 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fault-tolerant adaptive event-triggered integral sliding mode control for uncertain networked systems under actuator failures.
J. Frankl. Inst., 2024

Spatiotemporal Representation Enhanced ViT for Video Recognition.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

2023
Neural network-based iterative learning control for trajectory tracking of unknown SISO nonlinear systems.
Expert Syst. Appl., December, 2023

Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets.
Neural Networks, November, 2023

K-Go: An executable formal semantics of Go language in K framework.
IET Blockchain, June, 2023

DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio.
Comput. Secur., June, 2023

Fixed-Time Optimal Fault-Tolerant Formation Control With Prescribed Performance for Fixed-Wing UAVs Under Dual Faults.
IEEE Trans. Signal Inf. Process. over Networks, 2023

Design of data-driven mode-free iterative learning controller based higher order parameter estimation for multi-agent systems consistency tracking.
Knowl. Based Syst., 2023

Poison Dart Frog: A Clean-Label Attack with Low Poisoning Rate and High Attack Success Rate in the Absence of Training Data.
CoRR, 2023

Two-Lane Lattice Hydrodynamic Modeling at Sag Sections With the Empirical Lane-Changing Rate.
IEEE Access, 2023

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023

UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction Detection.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature.
Proceedings of the Advances in Information and Communication, 2023

Reinforcement-Learning-Based Finite-Time Fault-Tolerant Formation Control of Fixed-Wing UAVs with Unknown Control Directions.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
Disturbance and state observer-based adaptive finite-time control for quantized nonlinear systems with unknown control directions.
J. Frankl. Inst., 2022

Rethinking the Misalignment Problem in Dense Object Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

High-speed 850 nm Vertical-cavity Surface-emitting Lasers with Multilayer Oxide Aperture.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

2021
Automatic Rocks Segmentation Based on Deep Learning for Planetary Rover Images.
J. Aerosp. Inf. Syst., November, 2021

Stability, bifurcation and chaos of a discrete-time pair approximation epidemic model on adaptive networks.
Math. Comput. Simul., 2021

GCsT: Graph Convolutional Skeleton Transformer for Action Recognition.
CoRR, 2021

Rethinking the Aligned and Misaligned Features in One-stage Object Detection.
CoRR, 2021

EPP-Net: Extreme-Point-Prediction-Based Object Detection.
CoRR, 2021

Event-based secure H∞ load frequency control for delayed power systems subject to deception attacks.
Appl. Math. Comput., 2021

A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy.
IEEE Access, 2021

Complete Video-Level Representations for Action Recognition.
IEEE Access, 2021

Objects as Extreme Points.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

A Motion-based Seq-bbox Matching Method for Video Object Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Causal Intervention for Object Detection.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

2020
Extended dissipative synchronization for semi-Markov jump complex dynamic networks via memory sampled-data control scheme.
J. Frankl. Inst., 2020

Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model.
Int. J. Netw. Secur., 2020

Necessary and sufficient conditions for normalization and sliding mode control of singular fractional-order systems with uncertainties.
Sci. China Inf. Sci., 2020

Dynamical analysis for a fractional-order prey-predator model with Holling III type functional response and discontinuous harvest.
Appl. Math. Lett., 2020

Further results on fuzzy sampled-data stabilization of chaotic nonlinear systems.
Appl. Math. Comput., 2020

A Scale Balanced Loss for Bounding Box Regression.
IEEE Access, 2020

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.
IEEE Access, 2020

2019
An Optimized Tightly-Coupled VIO Design on the Basis of the Fused Point and Line Features for Patrol Robot Navigation.
Sensors, 2019

Optimization and Evaluation of Ventilation Mode in Marine Data Center Based on AHP-Entropy Weight.
Entropy, 2019

Asynchronous <i>H</i><sub>∞</sub> filtering for nonlinear persistent dwell-time switched singular systems with measurement quantization.
Appl. Math. Comput., 2019

Passivity-based state synchronization for semi-Markov jump coupled chaotic neural networks with randomly occurring time delays.
Appl. Math. Comput., 2019

Non-fragile extended dissipativity-based state feedback control for 2-D Markov jump delayed systems.
Appl. Math. Comput., 2019

Stability and Hopf Bifurcation of Fractional-Order Complex-Valued Neural Networks With Time-Delay.
IEEE Access, 2019

Synthesis of Sliding Mode Control for a Class of Uncertain Singular Fractional-Order Systems-Based Restricted Equivalent.
IEEE Access, 2019

A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
IEEE Access, 2019

Research on Spatial Target Classification and Recognition Technology Based on Deep Learning.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Designing, Modeling and Testing of the Flexible Space Probe-Cone Docking and Refueling Mechanism.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Inference Adaptive Thresholding based Non-Maximum Suppression for Object Detection in Video Image Sequence.
Proceedings of the ICIAI 2019: The 3rd International Conference on Innovation in Artificial Intelligence, 2019

2018
An Optimized Two-Step Magnetic Correction Strategy by Means of a Lagrange Multiplier Estimator with an Ellipsoid Constraint.
Sensors, 2018

Human action recognition based on quaternion spatial-temporal convolutional neural network and LSTM in RGB videos.
Multim. Tools Appl., 2018

Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model.
Int. J. Netw. Secur., 2018

A Secure and Efficient Distributed Storage Scheme SAONT-RS Based on an Improved AONT and Erasure Coding.
IEEE Access, 2018

A Highly Sensitive Flexible Piezoresistive Sensor Based on Wrinkled CNT-PDMS.
Proceedings of the 13th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2018

The Extraction and Application of the Color Texture Feature Based on Quaternion Gabor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Epileptic Seizure Detection Based on Time Domain Features and Weighted Complex Network.
Proceedings of the Intelligent Computing Theories and Application, 2018

A Heart Rate Measurement System Based on Ballistocardiogram for Smart Furniture.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017

Dynamic modeling and analysis of docking the GEO satellite interface ring.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

A novel multi-functional self-powered pressure sensor with hierarchical wrinkle structure.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

Flexible fabric-based wearable solid-state supercapacitor.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

Operational availability model of equipment in storage based on periodic inspection modelling.
Proceedings of the 2nd International Conference on System Reliability and Safety, 2017

2016
Energy Window Optimization for X-Ray K-Edge Tomographic Imaging.
IEEE Trans. Biomed. Eng., 2016

Robot-assisted mirror ultrasound scanning for deep venous thrombosis detection using RGB-D sensor.
Multim. Tools Appl., 2016

Exploiting salient semantic analysis for information retrieval.
Enterp. Inf. Syst., 2016

Security Analysis of OpenID Connect Protocol with Cryptoverif in the Computational Model.
Proceedings of the Advances on P2P, 2016

Automatic Verification of Security of OpenID Connect Protocol with ProVerif.
Proceedings of the Advances on P2P, 2016

2015
GCM: A Greedy-Based Cross-Matching Algorithm for Identifying Users Across Multiple Online Social Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015

Floor-based large-area triboelectric generator for active security monitoring.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

2013
Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks.
J. Networks, 2013

Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover.
J. Comput., 2013

Silicon carbide capacitive pressure sensors with arrayed sensing membranes.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Curvelet-based bilinear interpolation method for low-dose CT.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif.
J. Comput., 2012

Query expansion using explicit semantic analysis.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Concept-based document models using explicit semantic analysis.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

2011
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model.
J. Networks, 2011

Selecting good expansion terms based on similarity kernel function.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

2010
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme.
J. Softw., 2010

An Efficient Receiver Deniable Encryption Scheme and Its Applications.
J. Networks, 2010

Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus.
J. Digit. Content Technol. its Appl., 2010

Research on Land-Use Type of Huainan City Based on Flood Risk Perception and Spatial Multi-Criteria Analysis.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Chaotic particle swarm optimization algorithm for support vector machine.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

A new modeling method based on bagging ELM for day-ahead electricity price prediction.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Robust controller design for active queue management system.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext.
J. Networks, 2009

A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol.
J. Comput., 2009

2008
A Formal Analysis of Coercion-Resistance of the Internet Voting Protocol Based on DKR Formal Model.
Proceedings of the International Symposium on Information Processing, 2008

An adaptive fuzzy sliding mode control for AQM systems.
Proceedings of the American Control Conference, 2008

2007
CAD Applications.
Proceedings of the Third International Conference on Semantics, 2007

Mass edge detection in mammography based on plane fitting and dynamic programming.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Resource Allocation and Scheduling Problem Based on Genetic Algorithm and Ant Colony Optimization.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Computer-aided detection of mammographic masses based on content-based image retrieval.
Proceedings of the Medical Imaging 2007: Computer-Aided Diagnosis, 2007

A Coercion-Resistant Internet Voting Protocol.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Analyzing and Improving Internet Voting Protocol.
Proceedings of ICEBE 2007, 2007

A Digital Signature Scheme in Web-based Negotiation Support System.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

An Internet Voting Protocol with Receipt-Free and Coercion-Resistant.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Web Personalization Based on Artificial Psychology.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

A weighted average algorithm for edge-preserving smoothing on MRI images.
Proceedings of the Medical Imaging 2006: Image Processing, 2006

Research on Association Rules Based Group Ranking Model with Fuzzy Preference Relation Structure.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Research on Case Generation from Group Decision Making Experience for Evaluation.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

Simulation Modeling and Optimization for Equipment Scheduling in Container Terminals.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

A Distributed Solution for Automatic Name Correspondence in Replicated Solid Modeling Systems.
Proceedings of the 2005 International Conference on Semantics, 2005

The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Research on accountability in electronic transaction.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Design and Implementation of Web Mining System Based on Multi-agent.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

An Electronic Commerce System Prototype and Its Implementations.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Monitoring the Supply of Products in a Supply Chain Environment: A Fuzzy Neural Approach.
Proceedings of the Fourth International Conference on Electronic Business, 2004

A Negotiation Model Based on Fuzzy Multiple Criteria Decision Making Method.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Build W3C XML Schema for UN/EDIFACT Messages with Multilayer and Modular Architecture.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
A Fair Non-Repudiation Protocol.
Proceedings of the Seventh International Conference on CSCW in Design, 2002


  Loading...