Fei Peng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Dynamic Characterization of SynRM With Dual-Axis Hybrid Excitation Self-Commissioning.
IEEE Trans. Ind. Electron., May, 2024

Magnetic Field Prediction in Cubic Spoke-Type Permanent-Magnet Machine Considering Magnetic Saturation.
IEEE Trans. Ind. Electron., March, 2024

A Discrete-Time Current Control Method for the High-Speed Permanent Magnet Motor Drive Using the Modular Multilevel Converter.
Symmetry, February, 2024

Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction.
IEEE Trans. Multim., 2024

Face De-Morphing Based on Diffusion Autoencoders.
IEEE Trans. Inf. Forensics Secur., 2024

ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image.
IET Image Process., 2024

2023
Time Series Classification Based on Adaptive Feature Adjustment and Multi-scale AGRes2Net.
Neural Process. Lett., December, 2023

Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning.
IEEE Trans. Biom. Behav. Identity Sci., October, 2023

Data augmentation strategy for power inverter fault diagnosis based on wasserstein distance and auxiliary classification generative adversarial network.
Reliab. Eng. Syst. Saf., September, 2023

A Construction for Boolean Cube Ramsey Numbers.
Order, July, 2023

A Novel Mobility Induced Channel Prediction Mechanism for Vehicular Communications.
IEEE Trans. Wirel. Commun., May, 2023

Delay Boundary Analysis of RC Flows in the TTE Switch.
J. Circuits Syst. Comput., May, 2023

Sensing and Communication Co-Design for Status Update in Multiaccess Wireless Networks.
IEEE Trans. Mob. Comput., March, 2023

A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics.
ACM Trans. Multim. Comput. Commun. Appl., 2023

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy.
IEEE Trans. Multim., 2023

Large Dynamic Range and Anti-Fading Phase-Sensitive OTDR Using 2-D Phase Unwrapping via Neural Network.
IEEE Trans. Instrum. Meas., 2023

A General Single-Sensor Damping Framework for LCL-Equipped High-Speed PMSM Drives.
IEEE Trans. Ind. Electron., 2023

A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning.
IEEE Trans. Dependable Secur. Comput., 2023

What Can You Draw?
Am. Math. Mon., 2023

Fuzzy rule-based neural network for high-speed train manufacturing system scheduling problem.
Neural Comput. Appl., 2023

Efficient holistic timing analysis with low pessimism for rate-constrained traffic in TTEthernet.
J. Syst. Archit., 2023

Analysis of Learning Behavior Characteristics and Prediction of Learning Effect for Improving College Students' Information Literacy Based on Machine Learning.
IEEE Access, 2023

Research on Safety Helmet Wearing Detection Based on YOLO.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Application Research on Lightweight Vehicle Detection Based on YOLO.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

A Breast Mass Image Segmentation Method Based on Improved UNet 3+ Network.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Representation Enhancement based Cold Start Model for Elastic Compute Service Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2023

IMA: Implicit Matching and Alignment for Multimodal Named Entity Recognition.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Research on the Application of Finite Element Method in Engineering Mechanics Teaching.
Proceedings of the 8th International Conference on Information and Education Innovations, 2023

Application of finite element method in engineering mechanics teaching.
Proceedings of the 9th International Conference on Education and Training Technologies, 2023

Teaching Practice of Engineering Mechanics Based on Finite Element Method.
Proceedings of the 12th IEEE International Conference on Educational and Information Technology, 2023

Digital Resource Development and Teaching Application Based on Finite Element Method.
Proceedings of the 6th International Conference on Big Data and Education, 2023

Finite Element Modeling and Simulation of Torsion Experiment and Teaching Practice in Vocational Colleges.
Proceedings of the 14th International Conference on E-Education, 2023

Application of Simulation Technology in Vocational Education Skills Competition.
Proceedings of the 14th International Conference on E-Education, 2023

Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Web-Crawling Architecture in Accounting and Finance Research.
J. Comput. Inf. Syst., September, 2022

A Novel Asymmetric-PM Hybrid-Magnetic-Circuit Variable Flux Memory Machine for Traction Applications.
IEEE Trans. Veh. Technol., 2022

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.
ACM Trans. Priv. Secur., 2022

Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision.
IEEE Trans. Inf. Forensics Secur., 2022

Online Inductance Identification Using PWM Current Ripple for Position Sensorless Drive of High-Speed Surface-Mounted Permanent Magnet Synchronous Machines.
IEEE Trans. Ind. Electron., 2022

Discrete-Time Dynamic-Decoupled Current Control for LCL-Equipped High-Speed Permanent Magnet Synchronous Machines.
IEEE Trans. Ind. Electron., 2022

Nonlinear Semianalytical Model for Axial Flux Permanent-Magnet Machine.
IEEE Trans. Ind. Electron., 2022

A Novel Hybrid Analytical Model of Active Magnetic Bearing Considering Rotor Eccentricity and Local Saturation Effect.
IEEE Trans. Ind. Electron., 2022

BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Field-Coupled Nanocomputing Placement and Routing With Genetic and A* Algorithms.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Face morphing attack detection and attacker identification based on a watchlist.
Signal Process. Image Commun., 2022

Presentation attack detection based on two-stream vision transformers with self-attention fusion.
J. Vis. Commun. Image Represent., 2022

Fault detection for power electronic converters based on continuous wavelet transform and convolution neural network.
J. Intell. Fuzzy Syst., 2022

A Blended Learning Model Based on Smart Learning Environment to Improve College Students' Information Literacy.
IEEE Access, 2022

A Self-Supervised Representation Learning Method of Speech Recognition for Smart Grid.
Proceedings of the IEEE Smartworld, 2022

F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Application of Digital Information Technology to the Quality Management System of Power Grid Engineering.
Proceedings of the ICIIT 2022: 7th International Conference on Intelligent Information Technology, Foshan, China, February 25, 2022

Teaching practice of engineering mechanics using simulation technology to solve students' learning problems.
Proceedings of the 2022 5th International Conference on Education Technology Management, 2022

Application of Finite Element Modeling and Simulation Aimed at Solving Students' Learning Problems.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022

2021
Age of Information Optimized MAC in V2X Sidelink via Piggyback-Based Collaboration.
IEEE Trans. Wirel. Commun., 2021

PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics.
IEEE Trans. Dependable Secur. Comput., 2021

A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting.
IEEE Trans. Circuits Syst. Video Technol., 2021

A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models.
IEEE Trans. Circuits Syst. Video Technol., 2021

Spars: A Full Flow Quantum-Dot Cellular Automata Circuit Design Tool.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation.
IEEE Trans. Biom. Behav. Identity Sci., 2021

Software-Defined Network Resource Optimization of the Data Center Based on P4 Programming Language.
Mob. Inf. Syst., 2021

Identifying natural images and computer-generated graphics based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2021

Causality-Network-Based Critical Hazard Identification for Railway Accident Prevention: Complex Network-Based Model Development and Comparison.
Entropy, 2021

Adaptive Nonsingular Finite-Time Terminal Sliding Mode Control for Synchronous Reluctance Motor.
IEEE Access, 2021

MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

2020
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network.
IEEE Trans. Multim., 2020

An Improved Deadbeat Predictive Current Control With Online Parameter Identification for Surface-Mounted PMSMs.
IEEE Trans. Ind. Electron., 2020

Analytical Modeling of Misalignment in Axial Flux Permanent Magnet Machine.
IEEE Trans. Ind. Electron., 2020

A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling.
IEEE Trans. Circuits Syst. Video Technol., 2020

Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics.
IEEE Trans. Circuits Syst. Video Technol., 2020

Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting.
Signal Process. Image Commun., 2020

A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering.
Signal Process., 2020

New Insights in Regional Climate Change: Coupled Land Albedo Change Estimation in Greenland from 1981 to 2017.
Remote. Sens., 2020

Spectral Response Assessment of Moss-Dominated Biological Soil Crust Coverage Under Dry and Wet Conditions.
Remote. Sens., 2020

Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning.
J. Vis. Commun. Image Represent., 2020

Image edge detection algorithm based on fuzzy set.
J. Intell. Fuzzy Syst., 2020

A Coverless Image Information Hiding Algorithm Based on Fractal Theory.
Int. J. Bifurc. Chaos, 2020

Emerging Micro/Nanomotor-Based Platforms for Biomedical Therapy.
Adv. Intell. Syst., 2020

Research on the Harmonics Penetration Characteristics of the Traction Network to Three-Phase 380 V Power System of the Traction Substation and Suppression Scheme.
IEEE Access, 2020

A Levitation Condition Awareness Architecture for Low-Speed Maglev Train Based on Data-Driven Random Matrix Analysis.
IEEE Access, 2020

Position Estimation Method of IPMSM in Full Speed Range by Simplified Quadratic Optimization.
IEEE Access, 2020

Piggyback-Based Distributed MAC Optimization for V2X Sidelink Communications.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

The Evolutionary Deep Learning Model for Electrical Load Forecasting.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Energy Supply Forecasting of Wind Power for Agricultural Integrated Energy System.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Revealing Much While Saying Less: Predictive Wireless for Status Update.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Inspiration from the Employee Incentive Preference Survey of Huawei under the Pressure of the US Government.
Proceedings of the ICEME '20: The 11th International Conference on E-business, 2020

A Facial Privacy Protection Framework Based on Component Difference and Template Morphing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

HRAE: Hardware-assisted Randomization against Adversarial Example Attacks.
Proceedings of the 29th IEEE Asian Test Symposium, 2020

Investigations of Human Psychology and Behavior in the Emergency of Subway.
Proceedings of the Advances in Safety Management and Human Performance, 2020

2019
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
IEEE Trans. Reliab., 2019

Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Inf. Forensics Secur., 2019

Stepwise Magnetization Control Strategy for DC-Magnetized Memory Machine.
IEEE Trans. Ind. Electron., 2019

General Analytical Modeling for Magnet Demagnetization in Surface Mounted Permanent Magnet Machines.
IEEE Trans. Ind. Electron., 2019

A New Hybrid Method for Magnetic Field Calculation in IPMSM Accounting for Any Rotor Configuration.
IEEE Trans. Ind. Electron., 2019

A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.
Signal Process. Image Commun., 2019

Method for Classifying Behavior of Livestock on Fenced Temperate Rangeland in Northern China.
Sensors, 2019

A New Application of Random Forest Algorithm to Estimate Coverage of Moss-Dominated Biological Soil Crusts in Semi-Arid Mu Us Sandy Land, China.
Remote. Sens., 2019

A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multim. Tools Appl., 2019

Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multim. Tools Appl., 2019

Dynamic 3D Simulation of Flood Risk Based on the Integration of Spatio-Temporal GIS and Hydrodynamic Models.
ISPRS Int. J. Geo Inf., 2019

Methods and Application of Archeological Cloud Platform for Grand Sites Based on Spatio-Temporal Big Data.
ISPRS Int. J. Geo Inf., 2019

Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
Int. J. Digit. Crime Forensics, 2019

Establishment of cellular automata image model and its application in image dimension measurement.
EURASIP J. Image Video Process., 2019

Probabilistic duck curve in high PV penetration power system: Concept, modeling, and empirical analysis in China.
CoRR, 2019

Source identification of 3D printed objects based on inherent equipment distortion.
Comput. Secur., 2019

Investigation Study of the Influence of Pole Numbers on Torque Density and Flux-Weakening Ability of Fractional Slot Concentrated Winding Wheel-Hub Machines.
IEEE Access, 2019

FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019

Sliding Mode Control with Neural Network for Active Magnetic Bearing System.
Proceedings of the IECON 2019, 2019

Research on Flexible Production Line Scheduling Considering Multiple Maintenance Mechanisms.
Proceedings of the 5th International Conference on Industrial and Business Engineering, 2019

A Face Privacy Protection Scheme Using CNN Based ROI Editing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Cortical Pitch Response Components Correlate with the Pitch Salience of Resolved and Unresolved components of Mandarin Tones.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

2018
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification.
IEEE Trans. Multim., 2018

A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Inf. Forensics Secur., 2018

Face presentation attack detection using guided scale texture.
Multim. Tools Appl., 2018

Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Vis. Commun. Image Represent., 2018

Separable reversible data hiding and encryption for HEVC video.
J. Real Time Image Process., 2018

Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling.
Int. J. Digit. Crime Forensics, 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Int. J. Digit. Crime Forensics, 2018

Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching.
Digit. Signal Process., 2018

FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.
CoRR, 2018

Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Research on Distributed R&D Strategy of High-end Equipment Manufacturing Industry.
Proceedings of the 9th International Conference on E-business, Management and Economics, 2018

Research on Distributed Innovation Network Ability Collaboration Space.
Proceedings of the 9th International Conference on E-business, Management and Economics, 2018

Research and Application of Block Chain Technology in Crowdsourcing Platform.
Proceedings of the International Conference on E-business and Mobile Commerce, 2018

CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Prototype Performance Analysis for V2V Communications using USRP-based Software Defined Radio Platform.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Neural Representation Of Harmonic Single Sideband Encoder In Inferior Colliculus Of Guinea Pigs.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Signal Process. Image Commun., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017

A novel design and analysis of comparator with XNOR gate for QCA.
Microprocess. Microsystems, 2017

Identifying source camera using guided image estimation and block weighted average.
J. Vis. Commun. Image Represent., 2017

Android多跳D2D通信系统的实现与优化 (Realization and Optimization of Multi-hop D2D Communications System Based on Android Platform).
计算机科学, 2017

High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017

An Improved Three-dimensional DV-Hop Localization Algorithm Optimized by Adaptive Cuckoo Search Algorithm.
Int. J. Online Eng., 2017

A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
Int. J. Digit. Crime Forensics, 2017

Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
Int. J. Bifurc. Chaos, 2017

A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Implementing automatic transfer scheme in a main-tie-main configuration using IEC 61850.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Active damping control of modular multilevel converter with output filter for high-speed PM motor drive.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

DC-bus design with hybrid capacitor bank in single-phase PV inverters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Attitude and Position Control of Quadrotor UAV Using PD-Fuzzy Sliding Mode Control.
Proceedings of the Intelligent Robotics and Applications - 10th International Conference, 2017

Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

2016
Using an Insect Mushroom Body Circuit to Encode Route Memory in Complex Natural Environments.
PLoS Comput. Biol., 2016

Image tamper detection based on noise estimation and lacunarity texture.
Multim. Tools Appl., 2016

An Experimental Study on Multihop D2D Communications Based on Smartphones.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016

Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Scalable Segment Abstraction Method for Advertising Campaign Admission and Inventory Allocation Optimization.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Analysis on temporal-spatial change of vegetation coverage in Hulunbuir Steppe (2000-2014).
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Analysis of surface electromyography of patients with low back pain based on different movement patterns.
Proceedings of the IEEE International Conference on Information and Automation, 2016

OnSeS: A Novel Online Short Text Summarization Based on BM25 and Neural Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Neural representation of different mandarin tones in the inferior colliculus of the guinea pig.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

An Eye Tracking Research on Debugging Strategies towards Different Types of Bugs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Quantitative analysis of spine angle range of individuals with low back pain performing dynamic exercises.
Proceedings of the 13th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2016

Quantitative analysis of lumbar muscles performance of patients with lumbar disc herniation based on surface electromyography.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, 2016

2015
A Novel Adaptive Mobility-Aware MAC Protocol in Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

A High-Frequency-Link Single-Phase PWM Rectifier.
IEEE Trans. Ind. Electron., 2015

An energy-efficient mobility-supporting MAC protocol in wireless sensor networks.
J. Commun. Networks, 2015

A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
Int. J. Digit. Crime Forensics, 2015

The influence of random slowdown process and lock-step effect on the fundamental diagram of the nonlinear pedestrian dynamics: An estimating-correction cellular automaton.
Commun. Nonlinear Sci. Numer. Simul., 2015

A Novel TDMA-MAC Protocol for VANET Using Cooperative and Opportunistic Transmissions.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Algorithms for the Hybrid Fleet Vehicle Routing Problem.
Proceedings of the 1st International Conference on Vehicle Technology and Intelligent Transport Systems, 2015

Vehicle Routing to Minimizing Hybrid Fleet Fuel Consumption.
Proceedings of the Smart Cities, Green Technologies, and Intelligent Transport Systems, 2015

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficient Implementation of MIPS Code Generator for the IonMonkey JavaScript Compiler.
Proceedings of the Advanced Parallel Processing Technologies, 2015

2014
Regenerative Braking System of Electric Vehicle Driven by Brushless DC Motor.
IEEE Trans. Ind. Electron., 2014

The QoS Prediction of Web Service with Location Information Ensemble.
J. Softw., 2014

Population-based Algorithm Portfolios with automated constituent algorithms selection.
Inf. Sci., 2014

Interference Coordination with Vertical Beamforming in 3D MIMO-OFDMA Networks.
IEEE Commun. Lett., 2014

Improved PVO-based reversible data hiding.
Digit. Signal Process., 2014

Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU.
Digit. Investig., 2014

Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Comput. Aided Des., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

128km fully-distributed high-sensitivity fiber-optic intrusion sensor with 15m spatial resolution.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

A phase shifted full bridge converter with ZCS synchronous rectifier for auxiliary power units.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Short-wavelength near infrared stimulation of the inner ear hair cells.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Double Circulation Wear Leveling for PCM-Based Embedded Systems.
Proceedings of the Advanced Computer Architecture - 10th Annual Conference, 2014

2013
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos.
IEEE Trans. Inf. Forensics Secur., 2013

A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Secur. Commun. Networks, 2013

An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System.
Int. J. Digit. Crime Forensics, 2013

Geo-location database based TV white space for interference mitigation in LTE femtocell networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

RNTP-based resource block allocation in LTE downlink indoor scenarios.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Separate Horizontal amp; Vertical Codebook Based 3D MIMO Beamforming Scheme in LTE-A Networks.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

106km fully-distributed fiber-optic fence based on P-OTDR with 2<sup>nd</sup>-order Raman amplification.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Wireless energy transfer system based on high Q flexible planar-Litz MEMS coils.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Consensus Predictive Control for 360MN Extrusion Machine.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
An Application Oriented Power Saving MAC Protocol for Wireless Sensor Networks.
Wirel. Pers. Commun., 2012

Adaptive reversible data hiding scheme based on integer transform.
Signal Process., 2012

A Wireless Magnetic Resonance Energy Transfer System for Micro Implantable Medical Sensors.
Sensors, 2012

Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
Int. J. Digit. Crime Forensics, 2012

Bit error rate improvement for chaos shift keying chaotic communication systems.
IET Commun., 2012

Throughput Modeling of Differentiation Schemes for IEEE 802.11e MAC Protocol.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

TCP Performance Evaluation over GEO and LEO Satellite Links between Performance Enhancement Proxies.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

AntOM: Constructing multi-layer overlays for pervasive environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Information Systems And Hospital Work: A Structuralist Investigation.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Calibration Based Reliable Detector for Detecting LSB Matching Steganography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Comparative study on flight reference symbology for helmet-mounted display based on eye tracking technology.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A framework for the autonomic management of multi-layer P2P overlays.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2012

Reviews on cognitive access to TV White Space.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Control system simulation for 360MN extrusion machine based on physical model.
Proceedings of the 2012 IEEE International Conference on Automation Science and Engineering, 2012

2011
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features.
Int. J. Digit. Crime Forensics, 2011

An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM.
Int. J. Digit. Crime Forensics, 2011

Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication.
IEEE Commun. Lett., 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011

Bio-inspired monitoring of pervasive environments.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Alleviate the Hypervolume Degeneration Problem of NSGA-II.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Reversible image water marking based on prediction-error expansion and compensation.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

A self-management framework for efficient resource discovery in pervasive environments.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

Optimising P2P Overlays for Pervasive Environments.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Population-Based Algorithm Portfolios for Numerical Optimization.
IEEE Trans. Evol. Comput., 2010

Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs.
Eur. Trans. Telecommun., 2010

Mobile Networks Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs.
Eur. Trans. Telecommun., 2010

A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Comput. Aided Des., 2010

Why Requirements Engineering Fails: A Survey Report from China.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Improved DE-Based Reversible Watermarking Using Sorting and Histogram Shifting.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Understanding Hospital Information Systems Adoption in China.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

The Impact of Two-Factor Authentication Technology on the Adoption of Internet Banking.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

Understanding the Adoption of Electronic Banking in China.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Understanding Chinese Characteristics of Requirements Engineering.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009

Analyzing project risks within a cultural and organizational setting.
Proceedings of the 2009 ICSE Workshop on Leadership and Management in Software Architecture, 2009

A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation.
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009

Optimizing quantum teleportation circuit using genetic algorithm.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Multi-start JADE with knowledge transfer for numerical optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
MLSD Bounds and Receiver Designs for Clipped OFDM Channels.
IEEE Trans. Wirel. Commun., 2008

MEGORE: Multimedia Enhanced Goal-Oriented Requirement Elicitation Experience in China.
Proceedings of the 2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering, 2008

Exploring the National Context in Electronic Commerce Adoption in Developing Countries.
Proceedings of the Pacific Asia Conference on Information Systems, 2008

Semantic Feature Extraction for Brain CT Image Clustering Using Nonnegative Matrix Factorization.
Proceedings of the Medical Biometrics, First International Conference, 2008

A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Pre-Processing of CT Brain Images for Content-Based Image Retrieval.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Coded Non-Ideal OFDM Systems: Analysis and Receiver Designs.
PhD thesis, 2007

Enhancing Fairness and Throughput of TCP in Heterogeneous Wireless Access Networks.
Int. J. Wirel. Inf. Networks, 2007

Adaptive Modulation and Coding for IEEE 802.11n.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

On Residual Carrier Frequency Offset Mitigation for 802.11N.
Proceedings of the IEEE International Conference on Acoustics, 2007

MLSD Bounds for Clipped OFDM Systems Over Frequency-Selective Quasi-Static Fading Channels.
Proceedings of the Global Communications Conference, 2007

MLSD Bounds and Near-Optimum Receiver Designs for Clipped OFDM Channels.
Proceedings of the Global Communications Conference, 2007

2006
Simplified eIRA code design and performance analysis for correlated Rayleigh fading channels.
IEEE Trans. Wirel. Commun., 2006

Cross-layer enhancement of TCP split-connections over satellites links.
Int. J. Satell. Commun. Netw., 2006

Surrogate-channel design of universal LDPC codes.
IEEE Commun. Lett., 2006

Design of structured eIRA codes with applications to wireless channels.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Low-complexity soft demapper for OFDM fading channels with ICI.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Software Project Level Estimation Model Framework based on Bayesian Belief Networks.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

On the Capacity of Clipped OFDM Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Analysis of Burst Transmission in IEEE 802.11e Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2006

2005
A novel flow control scheme for improving TCP fairness and throughput over heterogeneous networks with wired and wireless links.
Proceedings of IEEE International Conference on Communications, 2005

New approaches to clipped OFDM channels: modeling and receiver design.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Dynamic congestion control for satellite networks employing TCP performance enhancement proxies.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Dynamic Congestion Control to Improve Performance of TCP Split-Connections over Satellite Links.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Design and analysis of eIRA codes on correlated fading channels.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Enhancing fairness and throughput of TCP in heterogeneous wireless networks.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

A novel fair bandwidth allocation algorithm for TCP window control.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

2002
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2000
Delay performance analysis of token-based fast TCP in window limit systems.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...