Chen Cao

According to our database1, Chen Cao authored at least 63 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Characteristics of the Residual Surface Deformation of Multiple Abandoned Mined-Out Areas Based on a Field Investigation and SBAS-InSAR: A Case Study in Jilin, China.
Remote. Sens., 2020

A 1.02-pJ/b 20.83-Gb/s/Wire USR Transceiver Using CNRZ-5 in 16-nm FinFET.
IEEE J. Solid State Circuits, 2020

Towards Photo-Realistic Facial Expression Manipulation.
Int. J. Comput. Vis., 2020

Automated Segmentation of Brain Gray Matter Nuclei on Quantitative Susceptibility Mapping Using Deep Convolutional Neural Network.
CoRR, 2020

Monitoring Method on Loosened State and Deformational Fault of Transformer Winding Based on Vibration and Reactance Information.
IEEE Access, 2020

Fully Convolutional Mesh Autoencoder using Efficient Spatially Varying Kernels.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020


Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

Research on Optical Fiber Sensor Based on Underwater Deformation Measurement.
Sensors, 2019

Experimental Research on Data Synchronous Acquisition Method of Subsidence Monitoring in Submarine Gas Hydrate Mining Area.
Sensors, 2019

Efficient Neural Networks for Real-time Motion Style Transfer.
Proc. ACM Comput. Graph. Interact. Tech., 2019

A Time-Resolved NIR Lock-In Pixel CMOS Image Sensor With Background Cancelling Capability for Remote Heart Rate Detection.
IEEE J. Solid State Circuits, 2019

ScholarCitation: Chinese Scholar Citation Analysis Based on ScholarSpace in the Field of Computer Science.
Frontiers Big Data, 2019

The Influence of Different Knowledge-Driven Methods on Landslide Susceptibility Mapping: A Case Study in the Changbai Mountain Area, Northeast China.
Entropy, 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Automatic acute ischemic stroke lesion segmentation using semi-supervised learning.
CoRR, 2019

Using discriminative vector machine model with 2DPCA to predict interactions among proteins.
BMC Bioinform., 2019

PRESM: personalized reference editor for somatic mutation discovery in cancer genomics.
Bioinform., 2019

Softening Damage Analysis of Gypsum Rock With Water Immersion Time Based on Laboratory Experiment.
IEEE Access, 2019

Protecting mobile devices from physical memory attacks with targeted encryption.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019


Real-Time Patch-Based Stylization of Portraits Using Generative Adversarial Network.
Proceedings of the 8th ACM/Eurographics Expressive Symposium, 2019

3D Guided Fine-Grained Face Manipulation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Stabilized real-time face tracking via a learned dynamic rigidity prior.
ACM Trans. Graph., 2018

Towards Clinical Diagnosis: Automated Stroke Lesion Segmentation on Multimodal MR Image Using Convolutional Neural Network.
CoRR, 2018

Towards Clinical Diagnosis: Automated Stroke Lesion Segmentation on Multi-Spectral MR Image Using Convolutional Neural Network.
IEEE Access, 2018

A Two-Tap NIR Lock-in Pixel CMOS Image Sensor with Background Light Cancelling Capability for Non-Contact Heart Rate Detection.
Proceedings of the 2018 IEEE Symposium on VLSI Circuits, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Joint Audio-Video Driven Facial Animation.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
A Time-Division Multiplexing Signaling Scheme for Inter-Symbol/Channel Interference Reduction in Low-Power Multi-Drop Memory Links.
IEEE Trans. Circuits Syst. II Express Briefs, 2017

Design and Modeling of Serial Data Transceiver Architecture by Employing Multi-Tone Single-Sideband Signaling Scheme.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

Downscaling Land Surface Temperature in Complex Regions by Using Multiple Scale Factors with Adaptive Thresholds.
Sensors, 2017

Downscaling Land Surface Temperature in an Arid Area by Using Multiple Remote Sensing Indices with Random Forest Regression.
Remote. Sens., 2017

One-bit Transceiver Cluster for Relay Transmission.
IEEE Commun. Lett., 2017

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

An AMP based decoder for massive MU-MIMO-OFDM with low-resolution ADCs.
Proceedings of the 2017 International Conference on Computing, 2017

Enabling jamming-resistant communications in wireless MIMO networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Real-time facial animation with image-based dynamic avatars.
ACM Trans. Graph., 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

A time-based, digitally intensive circuit and system architecture for wireless neural recording with high dynamic range.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

2015
Real-time high-fidelity facial performance capture.
ACM Trans. Graph., 2015

A New Cross-Level Decoding Scheme for LT Codes.
IEEE Commun. Lett., 2015

Physical-Layer Secrecy Performance in Finite Blocklength Case.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
FaceWarehouse: A 3D Facial Expression Database for Visual Computing.
IEEE Trans. Vis. Comput. Graph., 2014

Displaced dynamic expression regression for real-time facial tracking and animation.
ACM Trans. Graph., 2014

Real-time facial animation on mobile devices.
Graph. Model., 2014

Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
3D shape regression for real-time facial animation.
ACM Trans. Graph., 2013

Style Transfer Via Image Component Analysis.
IEEE Trans. Multim., 2013

2012
Online non-feedback image re-ranking via dominant data selection.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Locating high-density clusters with noisy queries.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Automatic motion-guided video stylization and personalization.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

2010
Real-time adaptive fluid simulation with complex boundaries.
Vis. Comput., 2010

Interactive Rendering of Non-Constant, Refractive Media Using the Ray Equations of Gradient-Index Optics.
Comput. Graph. Forum, 2010

2009
Empirical user studies inform the design of an e-notetaking and information assimilation system for students in higher education.
Comput. Educ., 2009

A new adaptive model for real-time fluid simulation with complex boundaries.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

2007
Applying the Support Vector Machine Method to Matching IRAS and SDSS Catalogues.
Data Sci. J., 2007

Synergy Between Education and Research in a Studio-based User Interface Design Class.
Proceedings of the 2007 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2007


  Loading...