Chao Feng

Orcid: 0000-0001-5440-9758

According to our database1, Chao Feng authored at least 158 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Wi-AM: Enabling Cross-Domain Gesture Recognition with Commodity Wi-Fi.
Sensors, March, 2024

Towards driver distraction detection: a privacy-preserving federated learning approach.
Peer Peer Netw. Appl., March, 2024

When Does UPW Model Become Invalid for XL-MIMO With Directional Array Elements?
IEEE Commun. Lett., February, 2024

Multilevel Laser-Induced Pain Measurement with Wasserstein Generative Adversarial Network - Gradient Penalty Model.
Int. J. Neural Syst., January, 2024

Double-attention mechanism-based segmentation grasping detection network.
J. Electronic Imaging, 2024

Asset-driven Threat Modeling for AI-based Systems.
CoRR, 2024

Vision-Flan: Scaling Human-Labeled Tasks in Visual Instruction Tuning.
CoRR, 2024

Binding Touch to Everything: Learning Unified Multimodal Tactile Representations.
CoRR, 2024

GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware.
CoRR, 2024

2023
Model-based optimal action selection for Dyna-Q reverberation suppression cognitive sonar.
EURASIP J. Adv. Signal Process., December, 2023

A Light Vehicle License-Plate-Recognition System Based on Hybrid Edge-Cloud Computing.
Sensors, November, 2023

A Combination of OBIA and Random Forest Based on Visible UAV Remote Sensing for Accurately Extracted Information about Weeds in Areas with Different Weed Densities in Farmland.
Remote. Sens., October, 2023

Analysis and Validation of the Aerosol Optical Depth of MODIS Products in Gansu Province, Northwest China.
Remote. Sens., June, 2023

Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.
IEEE Internet Things J., May, 2023

Toward Multi-area Contactless Museum Visitor Counting with Commodity WiFi.
ACM Journal on Computing and Cultural Heritage, March, 2023

RF-CM: Cross-Modal Framework for RF-enabled Few-Shot Human Activity Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

A Novel Type of Boundary Extraction Method and Its Statistical Improvement for Unorganized Point Clouds Based on Concurrent Delaunay Triangular Meshes.
Sensors, February, 2023

Reinforcement Routing on Proximity Graph for Efficient Recommendation.
ACM Trans. Inf. Syst., January, 2023

Multi-objective evolutionary algorithms are generally good: Maximizing monotone submodular functions over sequences.
Theor. Comput. Sci., 2023

Assessing the Sustainability and Trustworthiness of Federated Learning Models.
CoRR, 2023

Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL.
CoRR, 2023

Sentinel: An Aggregation Function to Secure Decentralized Federated Learning.
CoRR, 2023

Knowledge Solver: Teaching LLMs to Search for Domain Knowledge from Knowledge Graphs.
CoRR, 2023

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation.
CoRR, 2023

RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports.
CoRR, 2023

Fedstellar: A Platform for Decentralized Federated Learning.
CoRR, 2023

Near-Field Modelling and Performance Analysis for Extremely Large-Scale IRS Communications.
CoRR, 2023

Robust Human Upper-Limbs Trajectory Prediction Based on Gaussian Mixture Prediction.
IEEE Access, 2023

Differentiable Optimized Product Quantization and Beyond.
Proceedings of the ACM Web Conference 2023, 2023

Demo: Utilizing SRv6 to Optimize the Routing Behavior for Tactical Networks.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

YNU-HPCC at SemEval-2023 Task7: Multi-evidence Natural Language Inference for Clinical Trial Data Based a BioBERT Model.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

RF-Bouncer: A Programmable Dual-band Metasurface for Sub-6 Wireless Networks.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Learning Balanced Tree Indexes for Large-Scale Vector Retrieval.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Wireless Communication Using Metal Reflectors: Reflection Modelling and Experimental Verification.
Proceedings of the IEEE International Conference on Communications, 2023

Self-Supervised Video Forensics by Audio-Visual Anomaly Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Calming the customers by AI: Investigating the role of chatbot acting-cute strategies in soothing negative customer emotions.
Electron. Mark., December, 2022

Branch Identification and Junction Points Location for Apple Trees Based on Deep Learning.
Remote. Sens., 2022

A data hiding scheme based on the difference of image interpolation algorithms.
J. Inf. Secur. Appl., 2022

Earmonitor: In-ear Motion-resilient Acoustic Sensing Using Commodity Earphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Wi-Learner: Towards One-shot Learning for Cross-Domain Wi-Fi based Gesture Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Pusher: an augmented fuzzer based on the connection between input and comparison operand.
Frontiers Comput. Sci., 2022

Automated detection on the security of the linked-list operations.
Frontiers Comput. Sci., 2022

Wireless Communication Using Metal Reflectors: Reflection Modelling and Experimental Verification.
CoRR, 2022

CAF-RRT<sup>*</sup>: A 2D Path Planning Algorithm Based on Circular Arc Fillet Method.
IEEE Access, 2022

Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

An Overview and Ontology of Privacy to Preserve Privacy in Ultra-Wideband Networks.
Proceedings of the IEEE Smartworld, 2022

Forest-based Deep Recommender.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Ls-liquid: towards container-irrelevant liquid sensing on smartphones.
Proceedings of the SIGCOMM '22 Poster and Demo Sessions, 2022

Recommender Forest for Efficient Retrieval.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

a low-cost and reconfigurable metasurface for mmWave networks: poster abstract.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Protego: securing wireless communication via programmable metasurface.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

AVA-AVD: Audio-visual Speaker Diarization in the Wild.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Discharge Test of Unmanned Aerial Vehicles and Live High-voltage Wires.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

Design of a Novel Rotary Transformer with Accurate Prediction of N anocrystalline Alloy Core Loss using Improved Steinmetz Formulation.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022

2021
Adversarial robustness via attention transfer.
Pattern Recognit. Lett., 2021

An intelligent virtual reality technology in the teaching of art creation and design in colleges and universities.
J. Intell. Fuzzy Syst., 2021

RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

AVA-AVD: Audio-visual Speaker Diarization in the Wild.
CoRR, 2021

Scalable Data Annotation Pipeline for High-Quality Large Speech Datasets Development.
CoRR, 2021

Exploiting Network Structures to Improve Semantic Representation for the Financial Domain.
CoRR, 2021

Reducing Test Cases with Attention Mechanism of Neural Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

A Simple Voting Mechanism for Online Sexist Content Identification.
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2021) co-located with the Conference of the Spanish Society for Natural Language Processing (SEPLN 2021), 2021

Pushing the Limits of Respiration Sensing with Reconfigurable Metasurface.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

RFlens: metasurface-enabled beamforming for IoT communication and sensing.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Nuc2Vec: Learning Representations of Nuclei in Histopathology Images with Contrastive Loss.
Proceedings of the Medical Imaging with Deep Learning, 7-9 July 2021, Lübeck, Germany., 2021

Wireless Communication with Extremely Large-Scale Intelligent Reflecting Surface.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

Android malicious application detection based on Support Filtering and Lasso LR Algorithm.
Proceedings of the International Conference on Communications, 2021

Multi-Objective Submodular Maximization by Regret Ratio Minimization with Theoretical Guarantee.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.
Sci. Program., 2020

Demand-Aware Route Planning for Shared Mobility Services.
Proc. VLDB Endow., 2020

The role of interactive practice in business performance.
Ind. Manag. Data Syst., 2020

Data Driven Models for Human Motion Prediction in Human-Robot Collaboration.
IEEE Access, 2020

Towards Adversarial Robustness via Feature Matching.
IEEE Access, 2020

Automated Data-Processing Function Identification Using Deep Neural Network.
IEEE Access, 2020

Transfer Learning for Semi-supervised Classification of Non-stationary Data Streams.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Detection of Android Malicious Family Based on Manifest Information.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

An Effective Nuclear Extraction Mask Method for SVM Classification.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

An Efficient Evolutionary Algorithm for Subset Selection with General Cost Constraints.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Subset Selection by Pareto Optimization with Recombination.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Stability Analysis for a Class of Discrete-Time Switched Systems With Partial Unstable Subsystems.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

Sensing Our World Using Wireless Signals.
IEEE Internet Comput., 2019

Local outlier detection based on information entropy weighting.
Int. J. Sens. Networks, 2019

Marking Key Segment of Program Input via Attention Mechanism.
IEEE Access, 2019

NeuralTaint: A Key Segment Marking Tool Based on Neural Network.
IEEE Access, 2019

Program State Sensitive Parallel Fuzzing for Real World Software.
IEEE Access, 2019

Locating Vulnerability in Binaries Using Deep Neural Networks.
IEEE Access, 2019

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks.
IEEE Access, 2019

Product-Aware Helpfulness Prediction of Online Reviews.
Proceedings of the World Wide Web Conference, 2019

Reading Customer Reviews to Answer Product-related Questions.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Next Generation Blockchain Network (NGBN).
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Driver torque steering assisting control considering the uncertainties of the driver's behavior in following large curvature path.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Preliminary Study on Efficient Named Entity Recognition.
Proceedings of the ICIAI 2019: The 3rd International Conference on Innovation in Artificial Intelligence, 2019

A Queueing-Theoretic Framework for Vehicle Dispatching in Dynamic Car-Hailing.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

WiMi: Target Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Reinforced Product Metadata Selection for Helpfulness Assessment of Customer Reviews.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

UAV 3D Path Planning Based on Multi-Population Ensemble Differential Evolution.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2019

IT Capability and Firm Performance: The Mediating Roles of Interaction Praxis.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Unsupervised Feature Selection by Pareto Optimization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.
Secur. Commun. Networks, 2018

Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing.
IET Softw., 2018

Perfect Gaussian Integer Sequence Pairs from Cyclic Difference Set Pairs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Construction of User Concurrent Profile Based on Usage Logs.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Distributed Pareto Optimization for Subset Selection.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Sequence Selection by Pareto Optimization.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploring Scalable Computing Architectures for Interactions Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Parallelization of Extracting Binary Program Execution Trace Offline.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

A Large-scale Parallel Fuzzing System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

The establishment of diabetes diet classification model based on BL_WSmote.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

2017
基于种群多样性的FPSO算法在空中加油区域配置中的应用 (Diversity-guided FPSO Algorithm for Solving Air Refueling Region Deplaying Problem).
计算机科学, 2017

The recognition of traffic speed limit sign in hazy weather.
J. Intell. Fuzzy Syst., 2017

A Software Reliability Prediction Model: Using Improved Long Short Term Memory Network.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Target Material Identification with Commodity RFID Devices.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

Demo: Material Identification with Commodity RFID Devices.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Research on Method of Emergency Cases Retrieval Based on Case-Based Reasoning.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

An improved ferrite choke RLC model and its parameters determination method.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Distributional Robustness Analysis for Nonlinear Uncertainty Structures.
IEEE Trans. Autom. Control., 2016

Detecting integer overflow in Windows binary executables based on symbolic execution.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

A Method Based on Meta-model for the Translation from UML into Event-B.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Analyzing network protocol binary software with joint symbolic execution.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

Detection of drivers visual attention using smartphone.
Proceedings of the 12th International Conference on Natural Computation, 2016

Wired/wireless integrated multi-screen display endoscopic system.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Testing Network Protocol Binary Software with Selective Symbolic Execution.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Predicting buffer overflow using semi-supervised learning.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2014
A Weakly Homomorphic Encryption with LDN.
J. Networks, 2014

Drift Detection for Multi-label Data Streams Based on Label Grouping and Entropy.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Mixed-precision models for calculation of high-order virial coefficients on GPUs.
Proceedings of the 21st International Conference on High Performance Computing, 2014

Evaluating affective features of 3D motionscapes.
Proceedings of the ACM Symposium on Applied Perception, 2014

2013
Classification of tea using LED-induced fluorescence.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

CMOS 1.2V bandgap voltage reference design.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2012
Toolset to explore visual motion designs in a video game.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

A convex approach to generalized fixed order interpolation.
Proceedings of the American Control Conference, 2012

2011
A Kinship Function Approach to Robust and Probabilistic Optimization Under Polynomial Uncertainty.
IEEE Trans. Autom. Control., 2011

Identifying stable fixed order systems from time and frequency response data.
Proceedings of the American Control Conference, 2011

2010
Asymptotic performance of amplify-and-forward MIMO relaying with transmit antenna selection.
Sci. China Inf. Sci., 2010

Hybrid system identification: An SDP approach.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Hybrid system identification via sparse polynomial optimization.
Proceedings of the American Control Conference, 2010

2009
Diversity order analysis of a sub-optimal transmit antenna selection strategy for non-regenerative MIMO relay channel.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Distributional robustness analysis for polynomial uncertainty.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Robust and chance-constrained optimization under polynomial uncertainty.
Proceedings of the American Control Conference, 2009

2007
On control system design using random samples of contractive block Toeplitz matrices.
Int. J. Control, 2007

Robust LMIs with polynomial dependence on the uncertainty.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

2006
Uniform Sample Generations from Contractive Block Toeplitz Matrices.
IEEE Trans. Autom. Control., 2006

Dynamical Gaussian mixture model for tracking elliptical living objects.
Pattern Recognit. Lett., 2006

1996
Adaptive System-Level Diagnosis for Hypercube Multiprocessors.
IEEE Trans. Computers, 1996

1995
On the Embedding of Cycles in Pancake Graphs.
Parallel Comput., 1995

A New Diagnosis Approach for Short Faults in Interconnects.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
A divide-and-conquer methodology for system-level diagnosis of processor arrays.
Proceedings of the Sixth IEEE Symposium on Parallel and Distributed Processing, 1994

1993
On the testability of array structures for FFT computation.
J. Electron. Test., 1993

An Adaptive System-Level Diagnosis Approach for Hypercube Multiprocessors.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

An Adaptive System-Level Diagnosis Approach for Mesh Connected Multiprocessors.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
Detection and Location of Multiple Faults in Baseline Interconnection Networks.
IEEE Trans. Computers, 1992


  Loading...