Feng Xiao

According to our database1, Feng Xiao authored at least 60 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Principle and Analysis of Doubly Salient PM Motor With Π-Shaped Stator Iron Core Segments.
IEEE Trans. Industrial Electronics, 2019

An Integrated Delta Manipulator for Aerial Repair: A New Aerial Robotic System.
IEEE Robot. Automat. Mag., 2019

Object Recognition Using Non-Negative Matrix Factorization with Sparseness Constraint and Neural Network.
Information, 2019

A Fast Recovery Method for Single Disk Failure Based on EVENODD.
I. J. Network Security, 2019

A New Erasure Code Decoding Algorithm.
I. J. Network Security, 2019

Learning Spatiotemporal Features of Ride-sourcing Services with Fusion Convolutional Network.
CoRR, 2019

Optimizing Online Matching for Ride-Sourcing Services with Multi-Agent Deep Reinforcement Learning.
CoRR, 2019

2018
A Modified Fixed-Point Chirp Scaling Algorithm Based on Updating Phase Factors Regionally for Spaceborne SAR Real-Time Imaging.
IEEE Trans. Geoscience and Remote Sensing, 2018

Sliding Spotlight Mode Imaging with GF-3 Spaceborne SAR Sensor.
Sensors, 2018

Highly Sensitive p + n Metal Oxide Sensor Array for Low-Concentration Gas Detection.
Sensors, 2018

Accurate iris center localization method using facial landmark, snakuscule, circle fitting and binary connected component.
Multimedia Tools Appl., 2018

Coupled THINC and level set method: A conservative interface capturing scheme with high-order surface representations.
J. Comput. Physics, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
CoRR, 2018

Network traffic classification based on transfer learning.
Computers & Electrical Engineering, 2018

Research on Multitask Deep Learning Network for Semantic Segmentation and Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Modified Azimuth Weighting Method in a Two-Step Process Approach for Sliding Spotlight Data Processing.
Sensors, 2017

CHAOS: An SDN-Based Moving Target Defense System.
Security and Communication Networks, 2017

A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data.
CoRR, 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

Poster: Enabling Secure Location Authentication in Drone.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Security-Enhanced vTPM 2.0 for Cloud Computing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Elimination of power line interference from ECG signals using recurrent neural networks.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

SVM point-based real-time emotion detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Real-time SVM-based emotion recognition algorithm.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Power-line interference suppression in electrocardiogram using Recurrent Neural Networks.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System.
IEEE Computer, 2016

Geometry models of porous media based on Voronoi tessellations and their porosity-permeability relations.
Computers & Mathematics with Applications, 2016

2015
Prediction Enhancement of Residue Real-Value Relative Accessible Surface Area in Transmembrane Helical Proteins by Solving the Output Preference Problem of Machine Learning-Based Predictors.
Journal of Chemical Information and Modeling, 2015

IMSet-SHA3-Tree: The Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Observer-Based Robust Mixed H 2 /H ∞ Control for Autonomous Spacecraft Rendezvous.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Performance Profiling of VMs on NUMA Multicore Platform by Inspecting the Uncore Data Flow.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Porting and Optimizing SOAP2 on Loongson Architecture.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Pareto-Improving and Self-Sustainable Pricing for the Morning Commute with Nonidentical Commuters.
Transportation Science, 2014

SEDE: state estimation-based dynamic encryption scheme for smart grid communication.
Proceedings of the Symposium on Applied Computing, 2014

Sequence-Based Prediction of Protein-Protein Binding Residues in Alpha-Helical Membrane Proteins.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

2013
Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
JCP, 2013

2012
Motifs and Motif Generalization in Chinese Word Networks.
Proceedings of the International Conference on Computational Science, 2012

Formation and Simulation on Chinese Lexical Networks.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation.
Frontiers Comput. Sci. China, 2011

Exploring peer heterogeneity: Towards understanding and application.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

2010
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.
IEEE/ACM Trans. Netw., 2010

AmazingStore: available, low-cost online storage service using cloudlets.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

ORSP: An Efficient Resource Acquisition Policy for Peer-to-Peer Mesh Streaming Systems.
Proceedings of the GCC 2010, 2010

2009
DSybil: Optimal Sybil-Resistance for Recommendation Systems.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Re-exploring the Potential of Using Tree Structure in P2P Live Streaming Networks.
Proceedings of the NPC 2009, 2009

A Research of Physical Activity's Influence on Heart Rate Using Feedforward Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Mobile Imaging: the big challenge of the small pixel.
Proceedings of the Digital Photography V, 2009

A multi-step heart rate prediction method based on physical activity using Adams-Bashforth technique.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2009

2008
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

2007
Camera motion and mobile imaging.
Proceedings of the Digital Photography III, San Jose, CA, USA, January 29-30, 2007, 2007

2006
Resolution and light sensitivity tradeoff with pixel size.
Proceedings of the Digital Photography II, San Jose, CA, USA, January 15, 2006, 2006

2005
Color processing in camera phones: How good does it need to be?
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

Psychophysical thresholds and digital camera sensitivity: the thousand-photon limit.
Proceedings of the Digital Photography, San Jose, CA, USA, January 17, 2005, 2005

2002
High Dynamic Range Imaging of Natural Scenes.
Proceedings of the Tenth Color Imaging Conference: Color Science and Engineering Systems, 2002

2001
Illuminating Illumination.
Proceedings of the 9th Color Imaging Conference: Color Science and Engineering: Systems, 2001

2000
Average probe complexity of non-dominated coteries (brief announcement).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

1994
Supporting Partial Data Accesses to Replicated Data.
Proceedings of the Tenth International Conference on Data Engineering, 1994


  Loading...