Chengpo Mu

According to our database1, Chengpo Mu authored at least 13 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Deep-IRTarget: An Automatic Target Detector in Infrared Imagery Using Dual-Domain Feature Extraction and Allocation.
IEEE Trans. Multim., 2022

2021
Research on Object Detection Algorithm Based on UVA Aerial Image.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

2020
Infrared Target Detection Using Intensity Saliency And Self-Attention.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Facial Component-Landmark Detection With Weakly-Supervised LR-CNN.
IEEE Access, 2019

Synthetic IR Image Refinement Using Adversarial Learning With Bidirectional Mappings.
IEEE Access, 2019

2014
Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec., 2014

2013
The Research of the ATR System Based on Infrared Images and L-M BP Neural Network.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A New Approach for Estimating the Infrared Radiative and Simulation.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Research on Preprocessing Technique of Alert Aggregation.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2010
An intrusion response decision-making model based on hierarchical task network planning.
Expert Syst. Appl., 2010

2008
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory.
Proceedings of the Computer Security, 2008

2007
Geometry-Driven Nonlinear Equation with an Accelerating Coupled Scheme for Image Enhancement.
Proceedings of the Computational Science, 2007

2005
Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...