Donghui Guo

Orcid: 0000-0001-5915-4088

According to our database1, Donghui Guo authored at least 59 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on feeding behaviour of fish by using spatial and temporal features of depth images.
Int. J. Bio Inspired Comput., 2024

2023
Efficient memory reuse methodology for CNN-based real-time image processing in mobile-embedded systems.
J. Real Time Image Process., December, 2023

Front-End Rectifier of Self-Compensation Matching with Parasitic Cancellation for Dual-Band RFID Tag.
J. Circuits Syst. Comput., December, 2023

Dynamic RRT: Fast Feasible Path Planning in Randomly Distributed Obstacle Environments.
J. Intell. Robotic Syst., April, 2023

Refined Self-calibration of an Inductorless Low-noise Amplifier with Non-intrusive Circuit.
J. Electron. Test., February, 2023

2022
Fractional Spiking Neuron: Fractional Leaky Integrate-and-Fire Circuit Described with Dendritic Fractal Model.
IEEE Trans. Biomed. Circuits Syst., December, 2022

Stable Convergence Control of the Buck Converter Based on Iterative Learning Method.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A hybrid fault-tolerant routing based on Gaussian network for wireless sensor network.
J. Commun. Networks, 2022

An Adaptive Rate Allocation Scheme for Time-Varying Graph Signal Quantization.
IEEE Commun. Lett., 2022

New paradigm of FPGA-based computational intelligence from surveying the implementation of DNN accelerators.
Des. Autom. Embed. Syst., 2022

2021
Particle Swarm Optimization Algorithm With Self-Organizing Mapping for Nash Equilibrium Strategy in Application of Multiobjective Optimization.
IEEE Trans. Neural Networks Learn. Syst., 2021

Improving the Generalization Ability of Deep Neural Networks for Cross-Domain Visual Recognition.
IEEE Trans. Cogn. Dev. Syst., 2021

Spiking neural network dynamic system modeling for computation of quantum annealing and its convergence analysis.
Quantum Inf. Process., 2021

Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design.
J. Hardw. Syst. Secur., 2021

Multi-scale patches convolutional neural network predicting the histological grade of hepatocellular carcinoma.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

2020
Global Exponential Stability of Hybrid Non-autonomous Neural Networks with Markovian Switching.
Neural Process. Lett., 2020

2019
A Hardware-Efficient Block Matching Algorithm and Its Hardware Design for Variable Block Size Motion Estimation in Ultra-High-Definition Video Encoding.
ACM Trans. Design Autom. Electr. Syst., 2019

Energy efficiency clustering based on Gaussian network for wireless sensor network.
IET Commun., 2019

2018
Race-Condition-Aware and Hardware-Oriented Task Partitioning and Scheduling Using Entropy Maximization.
IEEE Trans. Parallel Distributed Syst., 2018

An energy efficient authentication scheme for wireless body area networks based on the bilinear pairings.
Int. J. Internet Protoc. Technol., 2018

2017
A high quality compiler tool for application-specific instruction-set processors with library and parallel supports.
Multim. Tools Appl., 2017

A L1-regularized feature selection method for local dimension reduction on microarray data.
Comput. Biol. Chem., 2017

Cache Coherence Scheme for HCS-Based CMP and Its System Reliability Analysis.
IEEE Access, 2017

Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage.
IEEE Access, 2017

2016
FCUDA-NoC: A Scalable and Efficient Network-on-Chip Implementation for the CUDA-to-FPGA Flow.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Modeling of Gaussian Network-Based Reconfigurable Network-on-Chip Designs.
IEEE Trans. Computers, 2016

Enhanced pipelined architecture of H.264/AVC intra prediction.
Signal Process. Image Commun., 2016

A curvature-compensated CMOS bandgap with negative feedback technique.
Microelectron. J., 2016

Gene regulatory network inference using PLS-based methods.
BMC Bioinform., 2016

A Programmable CNN Architecture and Its Hardware-Software Co-design Approach for Image Processing and Stimulating Visual Illusions.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

2015
On the Security Analysis of PBKDF2 in OpenOffice.
J. Softw., 2015

A pairing-based password authentication scheme using smart card with user anonymity.
Int. J. Internet Protoc. Technol., 2015

Comparing Security Notions of Secret Sharing Schemes.
Entropy, 2015

A study on the effects of model-based inquiry pedagogy on students' inquiry skills in a virtual physics lab.
Comput. Hum. Behav., 2015

Uncertainty Analysis of Race Conditions in Real-Time Systems.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Mining Potential Information for Multiclass Microarray Data Using Centroid-Based Dimension Reduction.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

2014
Hybrid circuit-switched network for on-chip communication in large-scale chip-multiprocessors.
J. Parallel Distributed Comput., 2014

Markov parameters tuning prediction to improve cache hit rate.
Int. J. Internet Protoc. Technol., 2014

Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon Nanomaterials.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Analysis of System Reliability for Cache Coherence Scheme in Multi-processor.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

A Parameters Tuning Algorithm in Wireless Networks.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
Novel MPEG-4 video cross-layer algorithm in wireless networks.
Int. J. Comput. Sci. Eng., 2013

Robustness analysis of full implication inference method.
Int. J. Approx. Reason., 2013

2011
Ties within Fault Localization rankings: Exposing and Addressing the Problem.
Int. J. Softw. Eng. Knowl. Eng., 2011

2010
An Evaluation of Tie-Breaking Strategies for Fault Localization Techniques.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

2009
Agent-based Intrusion Detection For Network-based Application.
Int. J. Netw. Secur., 2009

A Genetic Algorithm Based Approach for Event Synchronization Analysis in Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

A Novel Dictionary Design Algorithm for Sparse Representations.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
A race condition graph for concurrent program behavior.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
A New Image Steganography for Internet Communications Based on Chaotic Sequences.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

TCP Performance Improvement through Inter-layer Enhancement with Mobile IPv6.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Agent-Based Intrusion Detection System for Integration.
Proceedings of the ICEIS 2005, 2005

A New Public-Key Encryption Scheme Based on Neural Networks and Its Security Analysis.
Proceedings of the ICEIS 2005, 2005

2003
Mobile IPv6 in WLAN mobile networks and its implementation.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

1999
A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks.
Appl. Intell., 1999


  Loading...