Chao Xu

According to our database1, Chao Xu authored at least 107 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Compressed-Sensing Assisted Spatial Multiplexing Aided Spatial Modulation.
IEEE Trans. Wireless Communications, 2018

A Flexible Sensing Unit Manufacturing Method of Electrochemical Seismic Sensor.
Sensors, 2018

Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
J. Cryptology, 2018

Estimation of Position and Intensity of Multi-Light Sources Based on Specular Sphere.
JACIII, 2018

An improved noise immune level-shifter via IGBT gate-emitter voltage detection [IEICE Electronics Express Vol. 15(2018) No. 9 pp. 20180293].
IEICE Electronic Express, 2018

An improved noise immune level-shifter via IGBT gate-emitter voltage detection.
IEICE Electronic Express, 2018

Fast Near Collision Attack on the Grain v1 Stream Cipher.
IACR Cryptology ePrint Archive, 2018

YTH Domain: A Family of N6-methyladenosine (m6A) Readers.
Genomics, Proteomics & Bioinformatics, 2018

NDDVD: an integrated and manually curated Neurodegenerative Diseases Variation Database.
Database, 2018

Joint Motion Error Estimation Algorithm for Multibeam Synthetic Aperture Sonar.
IEEE Access, 2018

Hypergraph k-Cut in Randomized Polynomial Time.
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 2018

OMCO: Online Multiple Coflow Scheduling in Optical Circuit Switch.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Autoencoder Inspired Unsupervised Feature Selection.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Fast Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Environment Upgrade Reinforcement Learning for Non-Differentiable Multi-Stage Pipelines.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Efficient 3G/4G Budget Utilization in Mobile Sensing Applications.
IEEE Trans. Mob. Comput., 2017

An Electrochemical, Low-Frequency Seismic Micro-Sensor Based on MEMS with a Force-Balanced Feedback System.
Sensors, 2017

Fusing shape and spatio-temporal features for depth-based dynamic hand gesture recognition.
Multimedia Tools Appl., 2017

Fault detection in finite frequency domain for constrained networked systems under multi-packet transmission.
J. Franklin Institute, 2017

Stability analysis of neutral stochastic delay differential equations by a generalisation of Banach's contraction principle.
Int. J. Control, 2017

Erratum to: Object representation for multi-beam sonar image using local higher-order statistics.
EURASIP J. Adv. Sig. Proc., 2017

Object representation for multi-beam sonar image using local higher-order statistics.
EURASIP J. Adv. Sig. Proc., 2017

Real-Time Linear BRDF MIP-Mapping.
Comput. Graph. Forum, 2017

Global Illumination of Dynamic 3D Scene Based on Light Transport Path Reusing.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Reliable Homomorphic Matrix Disguising Scheme.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Research on the development of heterogeneous network transmission system for seismic exploration wireless data acquisition.
Proceedings of the 2017 International Conference on Information Networking, 2017

Deep multi-view robust representation learning.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A Combined Security Scheme for Network Coding.
Proceedings of the Advances in Internetworking, 2017

Improvement on Tracking Based on Motion Model and Model Updater.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

Study on identification of Rice False Smut based on CNN in natural environment.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

TennisMaster: an IMU-based online serve performance evaluation system.
Proceedings of the 8th Augmented Human International Conference, 2017

Modeling and Verifying Identity Authentication Security of HDFS Using CSP.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Global and Fixed-Terminal Cuts in Digraphs.
Proceedings of the Approximation, 2017

Air-to-ground shepherd problem: An action-delay reinforcement learning approach.
Proceedings of the 2017 American Control Conference, 2017

2016
Simulation of the Impact of a Sensor's PSF on Mixed Pixel Decomposition: 1. Nonuniformity Effect.
Remote Sensing, 2016

APPOS: An adaptive partial occlusion segmentation method for multiple vehicles tracking.
J. Visual Communication and Image Representation, 2016

Partly random multiple weighting matrices selection for orthogonal random beamforming.
Journal of Communications and Networks, 2016

Big traffic data processing framework for intelligent monitoring and recording systems.
Neurocomputing, 2016

Multi-view stereo via depth map fusion: A coordinate decent optimization method.
Neurocomputing, 2016

Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0.
IACR Cryptology ePrint Archive, 2016

A Logic of Knowing Why.
CoRR, 2016

Global and fixed-terminal cuts in digraphs.
CoRR, 2016

A novel navigation system to guide metallic foreign body extraction.
Int. J. Computer Assisted Radiology and Surgery, 2016

Non-Asymptotic Outage Probability of Large-Scale MU-MIMO Systems with Linear Receivers.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

A Tangible Embedded Programming System to Convey Event-Handling Concept.
Proceedings of the TEI '16: Tenth International Conference on Tangible, 2016

3D positioning information on augmented identification for indoor localization.
Proceedings of the 2nd International Conference on Communication and Information Processing, 2016

Evaluation of the DAG Ready Tasks Maximization Algorithms in Multi-core Computing Platforms.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

An improved feature matching algorithm with low memory requirement.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Parameter estimation for Ginzburg-Landau equation via implicit sampling.
Proceedings of the 2016 American Control Conference, 2016

2015
Consensus modeling with nonlinear utility and cost constraints: A case study.
Knowl.-Based Syst., 2015

A New Stabilization Method for the Elasticity Problem.
J. Sci. Comput., 2015

A Short-Text Oriented Clustering Method for Hot Topics Extraction.
International Journal of Software Engineering and Knowledge Engineering, 2015

RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
IJDSN, 2015

The Implementation of Hadoop-based Crawler System and Graphlite-based PageRank-Calculation In Search Engine.
CoRR, 2015

Realtime Rendering Glossy to Glossy Reflections in Screen Space.
Comput. Graph. Forum, 2015

Stabilization of a second order ODE-heat system coupling at intermediate point.
Automatica, 2015

On consensus models with utility preferences and limited budget.
Appl. Soft Comput., 2015

Compressive Channel Estimation in Space Domain for Massive MIMO Systems.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Hygeia: A Practical and Tailored Data Collection Platform for Mobile Health.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Application Research of Ternary Optical Computer on Gaussian Elimination.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

A scan chain optimization method for diagnosis.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

Fast FPGA system for microarchitecture optimization on synthesizable modern processor design.
Proceedings of the 25th International Conference on Field Programmable Logic and Applications, 2015

Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Online Scheduling of Multiple Deadline-Constrained Workflow Applications in Distributed Systems.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Subsample time delay estimation of chirp signals using FrFT.
Signal Processing, 2014

RiceWiki: a wiki-based database for community curation of rice genes.
Nucleic Acids Research, 2014

Hopf Bifurcation in a Dual Model of Internet Congestion Control System Using Dynamic Delayed Feedback.
JNW, 2014

Dynamic adaptive chemistry with operator splitting schemes for reactive flow simulations.
J. Comput. Physics, 2014

Linear Cryptanalysis of FASER128/256 and TriviA-ck.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Two consensus models based on the minimum cost and the maximum return.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

A wear-leveling-aware dynamic stack for PCM memory in embedded systems.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Vague C-means clustering algorithm.
Pattern Recognition Letters, 2013

Anisotropic Nonconforming $${ EQ}_1^{rot}$$ Quadrilateral Finite Element Approximation to Second Order Elliptic Problems.
J. Sci. Comput., 2013

False Data Identification Method Based on Watermarking.
JCP, 2013

A long-term sensitivity analysis of the denitrification and decomposition model.
Environmental Modelling and Software, 2013

The Evolutionary Game Analysis of Credit Behavior of SME in Guaranteed Loans Organization.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

A Dynamic Polling Strategy Based on Prediction Model for Large-Scale Network Monitoring.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

A Nonconforming Characteristic Finite Element Method for Nonlinear Advection-Dominated Diffusion Equation with Memory Term.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
The preservation of bidirectional promoter architecture in eukaryotes: what is the driving force?
BMC Systems Biology, 2012

A Research of All-Derivable Points.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

Real-time endpoint detection of upper limb movement based on energy threshold and residual methods.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Hydrodynamic optimization of channelling device for hydro turbine based on lattice Boltzmann method.
Computers & Mathematics with Applications, 2011

Detecting selective forwarding attacks in WSNs using watermark.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

A Collaborative Filtering Recommendation System by Unifying User Similarity and Item Similarity.
Proceedings of the Web-Age Information Management, 2011

Multi-Side Multi-Instance Algorithm.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A New Scheme for Information Hiding Based on Digital Images.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Application of immune clonal algorithm and mutual information in nonlinear blind source separation.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Identifying travel mode from GPS trajectories through fuzzy pattern recognition.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
CMOS Baseline Tracking and Cancellation Instrumentation for Nanoparticle-Coated Chemiresistors.
IEEE Trans. Biomed. Circuits and Systems, 2009

CacheBit: A Multisource-Multitarget Cache Instrumentation Tool.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Design, fabrication and characterization of a solid propellant micro-Thruster.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Bi-directional Prediction between Weld Penetration and Processing Parameters in Electron Beam Welding Using Artificial Neural Networks.
Proceedings of the Advances in Neural Networks, 2009

Application of Quantum Evolutionary Algorithm in Blind Source Separation.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
The effect of organic multi-layer periodic structure on carrier balance based on OLEDs.
Displays, 2008

Comparison study on NDII and NDVI based on rice extraction from rice and ginkgo mixed area.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Comparison of Winter Wheat Classification using Multi-Temporal IRS-P6 Images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Analysis of Doppler Ultrasound Blood Flow Signals of Wrist Radial Artery for Discriminating Healthy People from 3 Kinds of Patients.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
A Wireless Sensor Networks Route Protocol Based on Hierarchical Minimum Spanning Tree.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Reliability Analysis on Vertical Bearing Capacity of Bored Pile Determined by CPT Test.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Redesign and Implementation of Evaluation Dataset for Intrusion Detection System.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Remodeling and Simulation of Intrusion Detection Evaluation Dataset.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
Hybrid image coding for real-time computer screen video transmission.
Proceedings of the Visual Communications and Image Processing 2004, 2004

BR-WRR Scheduling Algorithm in PFTS.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A system for Mandarin short phrase recognition on portable devices.
Proceedings of the 2004 International Symposium on Chinese Spoken Language Processing, 2004

2002
Analysis of clock buffer phase noise.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002


  Loading...