Feng Xiao

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
NNC-GCN: Neighbours-to-Neighbours Contrastive Graph Convolutional Network for Semi-Supervised Classification.
ACM Trans. Knowl. Discov. Data, May, 2024

Design of Dual-Band Doherty Power Amplifier Using a New Phase Compensation Technique.
IEEE Trans. Circuits Syst. II Express Briefs, April, 2024

StyleDyRF: Zero-shot 4D Style Transfer for Dynamic Neural Radiance Fields.
CoRR, 2024

SeCG: Semantic-Enhanced 3D Visual Grounding via Cross-modal Graph Attention.
CoRR, 2024

2023
Deep learning-assisted identification and quantification of aneurysmal subarachnoid hemorrhage in non-contrast CT scans: Development and external validation of Hybrid 2D/3D UNet.
NeuroImage, October, 2023

Satisfied railway flow route problem integrated with ideal route and real trajectory information.
Enterp. Inf. Syst., August, 2023

A Novel Pole-Changing Permanent Magnet Vernier Motor.
IEEE Trans. Ind. Electron., June, 2023

Dynamic Auto-Structuring Graph Neural Network: A Joint Learning Framework for Origin-Destination Demand Prediction.
IEEE Trans. Knowl. Data Eng., April, 2023

Early-stage phishing detection on the Ethereum transaction network.
Soft Comput., April, 2023

Performance Comparison of Deterministic and Stochastic Modifications in Stokes's and Hotine's Formulas: The Case of Jilin Province, China.
Remote. Sens., January, 2023

A Mixed-Criticality Task Scheduling Method Based on Comprehensive Impact Factor.
Comput. Electr. Eng., January, 2023

Design and Optimization of a Pole Changing Flux Switching Permanent Magnet Motor.
IEEE Trans. Ind. Electron., 2023

Region-based demand forecasting in bike-sharing systems using a multiple spatiotemporal fusion neural network.
Soft Comput., 2023

Incorporating anticipation embedding into reinforcement learning framework for multi-hop knowledge graph question answering.
Inf. Sci., 2023

Restricted Generative Projection for One-Class Classification and Anomaly Detection.
CoRR, 2023

Does Conceptual Representation Require Embodiment? Insights From Large Language Models.
CoRR, 2023

Deep Neural Network with LinUCB: A Contextual Bandit Approach for Personalized Recommendation.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Dynamic Identification for a Manipulator Model based on Stribeck Friction using the Quasi-Newton Iterative Method.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023

A Network Function Virtualization Resource Allocation Model Based on Heterogeneous Computing.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Privacy Data Protection Scheme of Industrial Field Equipment Based on Fully Homomorphic Encryption.
Proceedings of the International Conference on Information Networking, 2023

An Edge Server Co-deployment Method via Joint Optimization of Communication Delay and Load Balancing in Edge Collaborative Environment.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A New Research-Based Case Teaching Method for an Occupational Quality Curriculum Based on Moodle.
Int. J. Emerg. Technol. Learn., May, 2022

Learning to Delay in Ride-Sourcing Systems: A Multi-Agent Deep Reinforcement Learning Framework.
IEEE Trans. Knowl. Data Eng., 2022

Low Harmonics Design for Modular Permanent Magnet Synchronous Machine Using Partitioned Winding.
IEEE Trans. Ind. Electron., 2022

Partitioned Stator Hybrid Excited Machine With DC-Biased Sinusoidal Current.
IEEE Trans. Ind. Electron., 2022

Arctic Sea Ice Freeboard Estimation and Variations From Operation IceBridge.
IEEE Trans. Geosci. Remote. Sens., 2022

Brillouin Frequency Shift Extraction Based on AdaBoost Algorithm.
Sensors, 2022

Comparison of Weighted Mean Temperature in Greenland Calculated by Four Reanalysis Data.
Remote. Sens., 2022

Improving the Split-Spectrum Method for Sentinel-1 Differential TOPSAR Interferometry.
IEEE Geosci. Remote. Sens. Lett., 2022

Meta-learning for few-shot time series forecasting.
J. Intell. Fuzzy Syst., 2022

A fifth-order low-dissipation discontinuity-resolving TENO scheme for compressible flow simulation.
J. Comput. Phys., 2022

An improved algorithm for extracting crossovers of satellite ground tracks.
Comput. Geosci., 2022

Research on the inheritance and protection of data mining technology in national sports.
Concurr. Comput. Pract. Exp., 2022

A new direct acyclic graph task scheduling method for heterogeneous Multi-Core processors.
Comput. Electr. Eng., 2022

Attention meta-transfer learning approach for few-shot iris recognition.
Comput. Electr. Eng., 2022

Using a machine learning-based risk prediction model to analyze the coronary artery calcification score and predict coronary heart disease and risk assessment.
Comput. Biol. Medicine, 2022

BAT-Net: An enhanced RNA Secondary Structure prediction via bidirectional GRU-based network with attention mechanism.
Comput. Biol. Chem., 2022

A novel integrated control framework of AFS, ASS, and DYC based on ideal roll angle to improve vehicle stability.
Adv. Eng. Informatics, 2022

Worst-Case Response Time Analysis of Multitype DAG Tasks Based on Reconstruction.
IEEE Access, 2022

Mitigating the Vulnerability of a High-Speed Railway-Air Network by Optimizing the Location of Integrated Transportation Hubs.
IEEE Access, 2022

A Web Service Classification Method Based on Graph Neural Network Knowledge Distillation.
Proceedings of the IEEE Smartworld, 2022

3Rs: Data Augmentation Techniques Using Document Contexts For Low-Resource Chinese Named Entity Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2022

CPC: Cable Parameters Calculation Based on 3D Point Cloud.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SLRFormer: Continuous Sign Language Recognition Based on Vision Transformer.
Proceedings of the 10th International Conference on Affective Computing and Intelligent Interaction, ACII 2022, 2022

2021
Partitioned Stator Hybrid Excitation Doubly Salient Machine With Slot Halbach PM Arrays.
IEEE Trans. Veh. Technol., 2021

Optimal Design for Demand Responsive Connector Service Considering Elastic Demand.
IEEE Trans. Intell. Transp. Syst., 2021

Noncontact Group-Delay-Based Sensor for Metal Deformation and Crack Detection.
IEEE Trans. Ind. Electron., 2021

ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System.
Secur. Commun. Networks, 2021

Arctic Sea Ice Freeboard Retrieval from Envisat Altimetry Data.
Remote. Sens., 2021

Imputation of GPS Coordinate Time Series Using missForest.
Remote. Sens., 2021

DEM Generation with ICESat-2 Altimetry Data for the Three Antarctic Ice Shelves: Ross, Filchner-Ronne and Amery.
Remote. Sens., 2021

Robust Object Tracking Algorithm for Autonomous Vehicles in Complex Scenes.
Remote. Sens., 2021

Joint Master-Slave Yaw Steering for Bistatic Spaceborne SAR With an Arbitrary Configuration.
IEEE Geosci. Remote. Sens. Lett., 2021

A class of bilinear matrix constraint optimization problem and its applications.
Knowl. Based Syst., 2021

Iris recognition based on few-shot learning.
Comput. Animat. Virtual Worlds, 2021

EDF-Adaptive: A New Semipartitioned Scheduling Algorithm for Multiprocessor Real-Time.
J. Sensors, 2021

Single-scale siamese network based RGB-D object tracking with adaptive bounding boxes.
Neurocomputing, 2021

The x-index: A new citation-distance-based index to measure academic influence.
CoRR, 2021

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token.
CoRR, 2021

Abusing Hidden Properties to Attack the Node.js Ecosystem.
Proceedings of the 30th USENIX Security Symposium, 2021

CRB-Net: A Sign Language Recognition Deep Learning Strategy Based on Multi-modal Fusion with Attention Mechanism.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir.
Proceedings of the Intelligent Computing Theories and Application, 2021

Transfer Learning and Attention Mechanism for Breast Cancer Classification.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

RCGA-Net: An Improved Multi-hybrid Attention Mechanism Network in Biomedical Image Segmentation.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
Persistence of the Steady Normal Shock Structure for the Unsteady Potential Flow.
SIAM J. Math. Anal., 2020

Estimating Arctic Sea Ice Thickness with CryoSat-2 Altimetry Data Using the Least Squares Adjustment Method.
Sensors, 2020

Unsupervised Monocular Depth Estimation Method Based on Uncertainty Analysis and Retinex Algorithm.
Sensors, 2020

Front Vehicle Detection Algorithm for Smart Car Based on Improved SSD Model.
Sensors, 2020

Pedestrian Detection Algorithm for Intelligent Vehicles in Complex Scenarios.
Sensors, 2020

Pedestrian object detection with fusion of visual attention mechanism and semantic computation.
Multim. Tools Appl., 2020

Channel Error Effect Analysis for Reconstruction Algorithm in Dual-Channel SAR Imaging.
IEEE Geosci. Remote. Sens. Lett., 2020

Effect of marketing messages and consumer engagement on economic performance: evidence from Weibo.
Internet Res., 2020

Visual saliency based global-local feature representation for skin cancer classification.
IET Image Process., 2020

Predicting Hourly Demand in Station-free Bike-sharing Systems with Video-level Data.
CoRR, 2020

Stability and Coexistence of a Diffusive Predator-Prey System with Nonmonotonic Functional Response and Fear Effect.
Complex., 2020

Data-driven optimal cooperative adaptive cruise control of heterogeneous vehicle platoons with unknown dynamics.
Sci. China Inf. Sci., 2020

Evaluation of feature selection methods for text classification with small datasets using multiple criteria decision-making methods.
Appl. Soft Comput., 2020

Trajectory Tracking Control Algorithm for Autonomous Vehicle Considering Cornering Characteristics.
IEEE Access, 2020

Condition Aware and Revise Transformer for Question Answering.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Framework and DataSet for Bugs in Ethereum Smart Contracts.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Soft-prototyping imaging systems for oral cancer screening.
Proceedings of the Imaging Sensors and Systems 2020, 2020

Source Code Obfuscation for Smart Contracts.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
Day-to-Day Flow Dynamics for Stochastic User Equilibrium and a General Lyapunov Function.
Transp. Sci., 2019

Principle and Analysis of Doubly Salient PM Motor With Π-Shaped Stator Iron Core Segments.
IEEE Trans. Ind. Electron., 2019

Lane Detection Algorithm for Intelligent Vehicles in Complex Road Conditions and Dynamic Environments.
Sensors, 2019

Improved Traffic Sign Detection and Recognition Algorithm for Intelligent Vehicles.
Sensors, 2019

Stability for a class of generalized reaction-diffusion uncertain stochastic neural networks with mixed delays.
Int. J. Mach. Learn. Cybern., 2019

Fixed-time outer synchronization of hybrid-coupled delayed complex networks via periodically semi-intermittent control.
J. Frankl. Inst., 2019

Object Recognition Using Non-Negative Matrix Factorization with Sparseness Constraint and Neural Network.
Inf., 2019

A Fast Recovery Method for Single Disk Failure Based on EVENODD.
Int. J. Netw. Secur., 2019

A New Erasure Code Decoding Algorithm.
Int. J. Netw. Secur., 2019

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System.
CoRR, 2019

SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions.
CoRR, 2019

Learning Spatiotemporal Features of Ride-sourcing Services with Fusion Convolutional Network.
CoRR, 2019

Optimizing Online Matching for Ride-Sourcing Services with Multi-Agent Deep Reinforcement Learning.
CoRR, 2019

An Optimal Torque Distribution Control Strategy for Four-Wheel Independent Drive Electric Vehicles Considering Energy Economy.
IEEE Access, 2019

Fixed-Time Cluster Synchronization of Discontinuous Directed Community Networks via Periodically or Aperiodically Switching Control.
IEEE Access, 2019

Digital Watermarking Hiding Technology for Copyright Information.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Digital Media Copyright Protection Technology in the Age of All Media.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

2018
A Modified Fixed-Point Chirp Scaling Algorithm Based on Updating Phase Factors Regionally for Spaceborne SAR Real-Time Imaging.
IEEE Trans. Geosci. Remote. Sens., 2018

Sliding Spotlight Mode Imaging with GF-3 Spaceborne SAR Sensor.
Sensors, 2018

Highly Sensitive p + n Metal Oxide Sensor Array for Low-Concentration Gas Detection.
Sensors, 2018

Accurate iris center localization method using facial landmark, snakuscule, circle fitting and binary connected component.
Multim. Tools Appl., 2018

A Model for Estimating the Correlation of Latent Variable in Social Network and Social Integration.
J. Inf. Hiding Multim. Signal Process., 2018

Network traffic classification based on transfer learning.
Comput. Electr. Eng., 2018

Research on Multitask Deep Learning Network for Semantic Segmentation and Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Modified Azimuth Weighting Method in a Two-Step Process Approach for Sliding Spotlight Data Processing.
Sensors, 2017

CHAOS: An SDN-Based Moving Target Defense System.
Secur. Commun. Networks, 2017

A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data.
CoRR, 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

Poster: Enabling Secure Location Authentication in Drone.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Security-Enhanced vTPM 2.0 for Cloud Computing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Elimination of power line interference from ECG signals using recurrent neural networks.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

SVM point-based real-time emotion detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Real-time SVM-based emotion recognition algorithm.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Power-line interference suppression in electrocardiogram using Recurrent Neural Networks.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System.
Computer, 2016

Geometry models of porous media based on Voronoi tessellations and their porosity-permeability relations.
Comput. Math. Appl., 2016

2015
Prediction Enhancement of Residue Real-Value Relative Accessible Surface Area in Transmembrane Helical Proteins by Solving the Output Preference Problem of Machine Learning-Based Predictors.
J. Chem. Inf. Model., 2015

IMSet-SHA3-Tree: The Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Observer-Based Robust Mixed H 2 /H ∞ Control for Autonomous Spacecraft Rendezvous.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Performance Profiling of VMs on NUMA Multicore Platform by Inspecting the Uncore Data Flow.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Porting and Optimizing SOAP2 on Loongson Architecture.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Pareto-Improving and Self-Sustainable Pricing for the Morning Commute with Nonidentical Commuters.
Transp. Sci., 2014

SEDE: state estimation-based dynamic encryption scheme for smart grid communication.
Proceedings of the Symposium on Applied Computing, 2014

Sequence-Based Prediction of Protein-Protein Binding Residues in Alpha-Helical Membrane Proteins.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

2013
Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
J. Comput., 2013

2012
Motifs and Motif Generalization in Chinese Word Networks.
Proceedings of the International Conference on Computational Science, 2012

Formation and Simulation on Chinese Lexical Networks.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation.
Frontiers Comput. Sci. China, 2011

Exploring peer heterogeneity: Towards understanding and application.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

2010
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.
IEEE/ACM Trans. Netw., 2010

AmazingStore: available, low-cost online storage service using cloudlets.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

ORSP: An Efficient Resource Acquisition Policy for Peer-to-Peer Mesh Streaming Systems.
Proceedings of the GCC 2010, 2010

2009
DSybil: Optimal Sybil-Resistance for Recommendation Systems.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Re-exploring the Potential of Using Tree Structure in P2P Live Streaming Networks.
Proceedings of the NPC 2009, 2009

A Research of Physical Activity's Influence on Heart Rate Using Feedforward Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Mobile Imaging: the big challenge of the small pixel.
Proceedings of the Digital Photography V, 2009

A multi-step heart rate prediction method based on physical activity using Adams-Bashforth technique.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2009

2007
Camera motion and mobile imaging.
Proceedings of the Digital Photography III, San Jose, CA, USA, January 29-30, 2007, 2007

2006
Resolution and light sensitivity tradeoff with pixel size.
Proceedings of the Digital Photography II, San Jose, CA, USA, January 15, 2006, 2006

2005
Color processing in camera phones: How good does it need to be?
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

Psychophysical thresholds and digital camera sensitivity: the thousand-photon limit.
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

2002
High Dynamic Range Imaging of Natural Scenes.
Proceedings of the Tenth Color Imaging Conference: Color Science and Engineering Systems, 2002

2001
Illuminating Illumination.
Proceedings of the 9th Color Imaging Conference: Color Science and Engineering: Systems, 2001

2000
Average probe complexity of non-dominated coteries (brief announcement).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

1994
Supporting Partial Data Accesses to Replicated Data.
Proceedings of the Tenth International Conference on Data Engineering, 1994


  Loading...