Feng Shen

According to our database1, Feng Shen authored at least 37 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A methodology to position nations' efforts in a technology domain with a patent network analysis: case of the electric vehicle domain.
Techn. Analysis & Strat. Manag., 2018

Improved Coarray Interpolation Algorithms with Additional Orthogonal Constraint for Cyclostationary Signals.
Sensors, 2018

An extended intuitionistic fuzzy TOPSIS method based on a new distance measure with an application to credit risk evaluation.
Inf. Sci., 2018

Robust Sparse Signal Recovery in Impulsive Noise Using Bayesian Methods.
IEICE Transactions, 2018

2017
Poster: Android Malware Detection using Multi-Flows and API Patterns.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Android Security via Static Program Analysis.
Proceedings of the 2017 Workshop on MobiSys 2017 Ph.D. Forum, 2017

Android Malware Detection Using Complex-Flows.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
An outranking sorting method for multi-criteria group decision making using intuitionistic fuzzy sets.
Inf. Sci., 2016

2015
Non-Coherent Unambiguous Tracking Method for Cosine-BOC Signals Based on an S-Curve Shaping Technique.
IEEE Signal Process. Lett., 2015

Online Estimation of Allan Variance Coefficients Based on a Neural-Extended Kalman Filter.
Sensors, 2015

Robust Adaptive Beamforming Based on Steering Vector Estimation and Covariance Matrix Reconstruction.
IEEE Communications Letters, 2015

An automatic ranking approach for multi-criteria group decision making under intuitionistic fuzzy environment.
FO & DM, 2015

A secure and scalable storage system for aggregate data in IoT.
Future Generation Comp. Syst., 2015

String Analysis of Android Applications (N).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Iris recognition based on human-interpretable features.
Proceedings of the IEEE International Conference on Identity, 2015

2014
A Robust Particle Filtering Algorithm With Non-Gaussian Measurement Noise Using Student-t Distribution.
IEEE Signal Process. Lett., 2014

A new outranking choice method for group decision making under Atanassov's interval-valued intuitionistic fuzzy environment.
Knowl.-Based Syst., 2014

Unambiguous Acquisition Technique for Cosine-Phased Binary Offset Carrier Signal.
IEEE Communications Letters, 2014

Iris crypts: Multi-scale detection and shape-based matching.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2014

Information flows as a permission mechanism.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

A consistent pixel-wise blur measure for partially blurred images.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

PigOut: Making multiple Hadoop clusters work together.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

2013
Ambiguity Mitigating Technique for Multiplexed Binary Carrier Signal Tracking.
IEEE Communications Letters, 2013

Robust Beamforming with Magnitude Response Constraints and Conjugate Symmetric Constraint.
IEEE Communications Letters, 2013

A secure play store for android.
Proceedings of the Conference on Systems, 2013

System Dynamics Modeling of Diffusion of Alternative Fuel Vehicles.
Proceedings of the Knowledge Science, Engineering and Management, 2013

Flow Permissions for Android.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Are iris crypts useful in identity recognition?
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Citizen Engineering: Methods for "Crowdsourcing" Highly Trustworthy Results.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Two-layer mesh network optimization based on inter-layer decomposition.
Photonic Network Communications, 2011

2010
SFS: A Secure File System with Scalability and Reliability Features on Distributed Storage Devices.
Proceedings of the Computer and Information Science 2010 [outstanding papers from the 9th ACIS/IEEE International Conference on Computer and Information Science, 2010

A Reliable File Management System based on a Scaled Secret Sharing Scheme.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Towards Secure and Reliable Data Storage with Multi-coefficient Secret Sharing.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

On Post-Generation Data Operations in Secure Distributed Storage Systems with Internal Padding.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Recovering high dynamic range by Multi-Exposure Retinex.
J. Visual Communication and Image Representation, 2009

2007
Model and Optimal Control for Urban Traffic Network under Incident Condition.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

2006
Feedback Control Strategy for Isolated Intersections.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006


  Loading...