Feng Xiao

According to our database1, Feng Xiao authored at least 72 papers between 1994 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Pedestrian object detection with fusion of visual attention mechanism and semantic computation.
Multim. Tools Appl., 2020

Evaluation of feature selection methods for text classification with small datasets using multiple criteria decision-making methods.
Appl. Soft Comput., 2020

Trajectory Tracking Control Algorithm for Autonomous Vehicle Considering Cornering Characteristics.
IEEE Access, 2020

Condition Aware and Revise Transformer for Question Answering.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Day-to-Day Flow Dynamics for Stochastic User Equilibrium and a General Lyapunov Function.
Transportation Science, 2019

Principle and Analysis of Doubly Salient PM Motor With Π-Shaped Stator Iron Core Segments.
IEEE Trans. Ind. Electron., 2019

Lane Detection Algorithm for Intelligent Vehicles in Complex Road Conditions and Dynamic Environments.
Sensors, 2019

Improved Traffic Sign Detection and Recognition Algorithm for Intelligent Vehicles.
Sensors, 2019

An Integrated Delta Manipulator for Aerial Repair: A New Aerial Robotic System.
IEEE Robotics Autom. Mag., 2019

Stability for a class of generalized reaction-diffusion uncertain stochastic neural networks with mixed delays.
Int. J. Machine Learning & Cybernetics, 2019

Fixed-time outer synchronization of hybrid-coupled delayed complex networks via periodically semi-intermittent control.
J. Frankl. Inst., 2019

Object Recognition Using Non-Negative Matrix Factorization with Sparseness Constraint and Neural Network.
Information, 2019

A Fast Recovery Method for Single Disk Failure Based on EVENODD.
I. J. Network Security, 2019

A New Erasure Code Decoding Algorithm.
I. J. Network Security, 2019

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System.
CoRR, 2019

SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions.
CoRR, 2019

Learning Spatiotemporal Features of Ride-sourcing Services with Fusion Convolutional Network.
CoRR, 2019

Optimizing Online Matching for Ride-Sourcing Services with Multi-Agent Deep Reinforcement Learning.
CoRR, 2019

An Optimal Torque Distribution Control Strategy for Four-Wheel Independent Drive Electric Vehicles Considering Energy Economy.
IEEE Access, 2019

Fixed-Time Cluster Synchronization of Discontinuous Directed Community Networks via Periodically or Aperiodically Switching Control.
IEEE Access, 2019

Digital Watermarking Hiding Technology for Copyright Information.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Digital Media Copyright Protection Technology in the Age of All Media.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

A Modified Fixed-Point Chirp Scaling Algorithm Based on Updating Phase Factors Regionally for Spaceborne SAR Real-Time Imaging.
IEEE Trans. Geosci. Remote. Sens., 2018

Sliding Spotlight Mode Imaging with GF-3 Spaceborne SAR Sensor.
Sensors, 2018

Highly Sensitive p + n Metal Oxide Sensor Array for Low-Concentration Gas Detection.
Sensors, 2018

Accurate iris center localization method using facial landmark, snakuscule, circle fitting and binary connected component.
Multim. Tools Appl., 2018

Network traffic classification based on transfer learning.
Comput. Electr. Eng., 2018

Research on Multitask Deep Learning Network for Semantic Segmentation and Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Modified Azimuth Weighting Method in a Two-Step Process Approach for Sliding Spotlight Data Processing.
Sensors, 2017

CHAOS: An SDN-Based Moving Target Defense System.
Security and Communication Networks, 2017

A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data.
CoRR, 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

Poster: Enabling Secure Location Authentication in Drone.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Security-Enhanced vTPM 2.0 for Cloud Computing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Elimination of power line interference from ECG signals using recurrent neural networks.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

SVM point-based real-time emotion detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Real-time SVM-based emotion recognition algorithm.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Power-line interference suppression in electrocardiogram using Recurrent Neural Networks.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System.
IEEE Computer, 2016

Geometry models of porous media based on Voronoi tessellations and their porosity-permeability relations.
Comput. Math. Appl., 2016

Prediction Enhancement of Residue Real-Value Relative Accessible Surface Area in Transmembrane Helical Proteins by Solving the Output Preference Problem of Machine Learning-Based Predictors.
J. Chem. Inf. Model., 2015

IMSet-SHA3-Tree: The Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Observer-Based Robust Mixed H 2 /H ∞ Control for Autonomous Spacecraft Rendezvous.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Performance Profiling of VMs on NUMA Multicore Platform by Inspecting the Uncore Data Flow.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Porting and Optimizing SOAP2 on Loongson Architecture.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Pareto-Improving and Self-Sustainable Pricing for the Morning Commute with Nonidentical Commuters.
Transportation Science, 2014

SEDE: state estimation-based dynamic encryption scheme for smart grid communication.
Proceedings of the Symposium on Applied Computing, 2014

Sequence-Based Prediction of Protein-Protein Binding Residues in Alpha-Helical Membrane Proteins.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
JCP, 2013

Motifs and Motif Generalization in Chinese Word Networks.
Proceedings of the International Conference on Computational Science, 2012

Formation and Simulation on Chinese Lexical Networks.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation.
Frontiers Comput. Sci. China, 2011

Exploring peer heterogeneity: Towards understanding and application.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.
IEEE/ACM Trans. Netw., 2010

AmazingStore: available, low-cost online storage service using cloudlets.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

ORSP: An Efficient Resource Acquisition Policy for Peer-to-Peer Mesh Streaming Systems.
Proceedings of the GCC 2010, 2010

DSybil: Optimal Sybil-Resistance for Recommendation Systems.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Re-exploring the Potential of Using Tree Structure in P2P Live Streaming Networks.
Proceedings of the NPC 2009, 2009

A Research of Physical Activity's Influence on Heart Rate Using Feedforward Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Mobile Imaging: the big challenge of the small pixel.
Proceedings of the Digital Photography V, 2009

A multi-step heart rate prediction method based on physical activity using Adams-Bashforth technique.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2009

Camera motion and mobile imaging.
Proceedings of the Digital Photography III, San Jose, CA, USA, January 29-30, 2007, 2007

Resolution and light sensitivity tradeoff with pixel size.
Proceedings of the Digital Photography II, San Jose, CA, USA, January 15, 2006, 2006

Color processing in camera phones: How good does it need to be?
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

Psychophysical thresholds and digital camera sensitivity: the thousand-photon limit.
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

High Dynamic Range Imaging of Natural Scenes.
Proceedings of the Tenth Color Imaging Conference: Color Science and Engineering Systems, 2002

Illuminating Illumination.
Proceedings of the 9th Color Imaging Conference: Color Science and Engineering: Systems, 2001

Average probe complexity of non-dominated coteries (brief announcement).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

Supporting Partial Data Accesses to Replicated Data.
Proceedings of the Tenth International Conference on Data Engineering, 1994