Haifeng Xu

Orcid: 0000-0001-6950-4061

According to our database1, Haifeng Xu authored at least 180 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Semi-supervised multi-sensor information fusion tailored graph embedded low-rank tensor learning machine under extremely low labeled rate.
Inf. Fusion, May, 2024

Short-Term Intensity Prediction of Tropical Cyclones Based on Multi-Source Data Fusion with Adaptive Weight Learning.
Remote. Sens., March, 2024

A Semi-Supervised Matrixized Graph Embedding Machine for Roller Bearing Fault Diagnosis Under Few-Labeled Samples.
IEEE Trans. Ind. Informatics, January, 2024

A Displacement Inertial Measurement System Based on Multialgorithm Fusion for Landslide.
IEEE Trans. Instrum. Meas., 2024

Differentially Private Bayesian Persuasion.
CoRR, 2024

Human vs. Generative AI in Content Creation Competition: Symbiosis or Conflict?
CoRR, 2024

Multi-Sender Persuasion - A Computational Perspective.
CoRR, 2024

Incentivized Truthful Communication for Federated Bandits.
CoRR, 2024

Novel Fault Detection Method for Rolling Bearings Based on Improved Variational Modal Decomposition Method.
IEEE Access, 2024

Learning in Online Principal-Agent Interactions: The Power of Menus.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Enhancing model performance in detecting lodging areas in wheat fields using UAV RGB Imagery: Considering spatial and temporal variations.
Comput. Electron. Agric., November, 2023

Surprise-based JND estimation for perceptual quantization in H.265/HEVC codecs.
Signal Process. Image Commun., October, 2023

Learning-based JNCD prediction for quality-wise perceptual quantization in HEVC.
J. Vis. Commun. Image Represent., September, 2023

C-DTW for Human Action Recognition Based on Nanogenerator.
Sensors, August, 2023

Land-Use Mapping with Multi-Temporal Sentinel Images Based on Google Earth Engine in Southern Xinjiang Uygur Autonomous Region, China.
Remote. Sens., August, 2023

Non-parallel bounded support matrix machine and its application in roller bearing fault diagnosis.
Inf. Sci., May, 2023

Deep stacked pinball transfer matrix machine with its application in roller bearing fault diagnosis.
Eng. Appl. Artif. Intell., May, 2023

Information Design for Multiple Interdependent Defenders: Work Less, Pay Off More.
Games, February, 2023

PAC-learning for Strategic Classification.
J. Mach. Learn. Res., 2023

Bandits Meet Mechanism Design to Combat Clickbait in Online Recommendation.
CoRR, 2023

Algorithmic Cheap Talk.
CoRR, 2023

Sample Complexity of Opinion Formation on Networks.
CoRR, 2023

A Data-Centric Online Market for Machine Learning: From Discovery to Pricing.
CoRR, 2023

Mechanism Design for Large Language Models.
CoRR, 2023

Markov Persuasion Processes with Endogenous Agent Beliefs.
CoRR, 2023

An Isotonic Mechanism for Overlapping Ownership.
CoRR, 2023

Bayesian Calibrated Click-Through Auction.
CoRR, 2023

Competitive Information Design for Pandora's Box.
Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, 2023

Robust Stackelberg Equilibria.
Proceedings of the 24th ACM Conference on Economics and Computation, 2023

Enhanced Locomotion of Protein-Based Microrobots via Magnetic Assemblies<sup>*</sup>.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023

Incentivizing Exploration in Linear Contextual Bandits under Information Gap.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Rethinking Incentives in Recommender Systems: Are Monotone Rewards Always Beneficial?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Incentivized Communication for Federated Bandits.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Follow-ups Also Matter: Improving Contextual Bandits via Post-serving Contexts.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The Economics of Machine Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

How Bad is Top-K Recommendation under Competing Content Creators?
Proceedings of the International Conference on Machine Learning, 2023

2022
Multi-Feature Fusion Based Deepfake Face Forgery Video Detection.
Syst., 2022

Multi-View Structural Feature Extraction for Hyperspectral Image Classification.
Remote. Sens., 2022

Dynamic penalty adaptive matrix machine for the intelligent detection of unbalanced faults in roller bearing.
Knowl. Based Syst., 2022

Twin robust matrix machine for intelligent fault identification of outlier samples in roller bearing.
Knowl. Based Syst., 2022

How does the artificial intelligence-based image-assisted technique help physicians in diagnosis of pulmonary adenocarcinoma? A randomized controlled experiment of multicenter physicians in China.
J. Am. Medical Informatics Assoc., 2022

Why Are People Addicted to SNS? Understanding the Role of SNS Characteristics in the Formation of SNS Addiction.
J. Assoc. Inf. Syst., 2022

Efficient Algebraic Multigrid Methods for Multilevel Overlapping Coclustering of User-Item Relationships.
INFORMS J. Comput., 2022

Regret-minimizing Bayesian persuasion.
Games Econ. Behav., 2022

A novel symplectic relevance matrix machine method for intelligent fault diagnosis of roller bearing.
Expert Syst. Appl., 2022

Identification of soybean based on Sentinel-1/2 SAR and MSI imagery under a complex planting structure.
Ecol. Informatics, 2022

Multi-Player Bandits Robust to Adversarial Collisions.
CoRR, 2022

Learning Correlated Stackelberg Equilibrium in General-Sum Multi-Leader-Single-Follower Games.
CoRR, 2022

Information Design in the Principal-Agent Problem.
CoRR, 2022

Optimal Coordination in Generalized Principal-Agent Problems: A Revisit and Extensions.
CoRR, 2022

Pinball transfer support matrix machine for roller bearing fault diagnosis under limited annotation data.
Appl. Soft Comput., 2022

Multi-class fuzzy support matrix machine for classification in roller bearing fault diagnosis.
Adv. Eng. Informatics, 2022

Information design for multiple independent and self-interested defenders: Work less, pay off more.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Algorithmic Information Design in Multi-Player Games: Possibilities and Limits in Singleton Congestion.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Sequential Information Design: Markov Persuasion Process and Its Efficient Reinforcement Learning.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Online Bayesian Recommendation with No Regret.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Inverse Game Theory for Stackelberg Games: the Blessing of Bounded Rationality.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Incrementality Bidding via Reinforcement Learning under Mixed and Delayed Rewards.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

CS-Shapley: Class-wise Shapley Values for Data Valuation in Classification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Multi-Channel Bayesian Persuasion.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Learning from a Learning User for Optimal Recommendations.
Proceedings of the International Conference on Machine Learning, 2022

When Are Linear Stochastic Bandits Attackable?
Proceedings of the International Conference on Machine Learning, 2022

Selling Data To a Machine Learner: Pricing via Costly Signaling.
Proceedings of the International Conference on Machine Learning, 2022

Towards Exploring the Engineering Education Certification on Data Science and Big data Technology Specialty: A Case Study of Suzhou University in China.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms.
Proceedings of the Conference on Learning Theory, 2-5 July 2022, London, UK., 2022

A Method for Exchanging Data Between Master Station and Terminal Based on Key Agreement Mechanism.
Proceedings of CECNet 2022, 2022

Long-term recurrence prediction models for NICE based on machine learning and China national stroke screening data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Learning the Optimal Recommendation from Explorative Users.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

The Strange Role of Information Asymmetry in Auctions - Does More Accurate Value Estimation Benefit a Bidder?
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

When Can the Defender Effectively Deceive Attackers in Security Games?
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

First-Order Convex Fitting and Its Application to Economics and Optimization.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Predicting Recurrence for Patients With Ischemic Cerebrovascular Events Based on Process Discovery and Transfer Learning.
IEEE J. Biomed. Health Informatics, 2021

Algorithmic Bayesian Persuasion.
SIAM J. Comput., 2021

Process mining framework with time perspective for understanding acute care: a case study of AIS in hospitals.
BMC Medical Informatics Decis. Mak., 2021

Improving Chinese electronic medical record retrieval by field weight assignment, negation detection, and re-ranking.
J. Biomed. Informatics, 2021

WLAN interference signal recognition using an improved quadruple generative adversarial network.
Digit. Signal Process., 2021

Least Square Calibration for Peer Review.
CoRR, 2021

Algorithmic Information Design in Multi-Player Games: Possibility and Limits in Singleton Congestion.
CoRR, 2021

Auctioning with Strategically Reticent Bidders.
CoRR, 2021

Incentivizing Exploration in Linear Bandits under Information Gap.
CoRR, 2021

Secure-UCB: Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.
CoRR, 2021

A new semi-analytical method for solving a class of time fractional partial differential equations with variable coefficients.
Appl. Math. Lett., 2021

Learning to Persuade on the Fly: Robustness Against Ignorance.
Proceedings of the EC '21: The 22nd ACM Conference on Economics and Computation, 2021

Optimal Pricing of Information.
Proceedings of the EC '21: The 22nd ACM Conference on Economics and Computation, 2021

Least Square Calibration for Peer Reviews.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

(Almost) Free Incentivized Exploration from Decentralized Learning Agents.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

The Limits of Optimal Pricing in the Dark.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Bird Songs Recognition Based on Ensemble Extreme Learning Machine.
Proceedings of the ICMLC 2021: 13th International Conference on Machine Learning and Computing, 2021

Diffusion Source Identification on Networks with Statistical Confidence.
Proceedings of the 38th International Conference on Machine Learning, 2021

The Power of Signaling and Its Intrinsic Connection to the Price of Anarchy.
Proceedings of the Distributed Artificial Intelligence - Third International Conference, 2021

Research on Yunnan Folk Music Classification Based on the Features of HHT-MFCC.
Proceedings of the AIPR 2021: 4th International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, September 24, 2021

2020
Modeling clinical activities based on multi-perspective declarative process mining with openEHR's characteristic.
BMC Medical Informatics Decis. Mak., 2020

Using predictive process monitoring to assist thrombolytic therapy decision-making for ischemic stroke patients.
BMC Medical Informatics Decis. Mak., 2020

Collapsing Bandits and Their Application to Public Health Interventions.
CoRR, 2020

On the Tractability of Public Persuasion with No Externalities.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Selling Information Through Consulting.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Collapsing Bandits and Their Application to Public Health Intervention.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

The Intrinsic Robustness of Stochastic Bandits to Strategic Manipulation.
Proceedings of the 37th International Conference on Machine Learning, 2020

To Warn or Not to Warn: Online Signaling in Audit Games.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

A Case Study of Conformance Checking for Diagnosis and Treatment of Ischemic Stroke based on Clinical Guidelines.
Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020), 2020

Stroke screening data modeling based on openEHR and NINDS Stroke CDE.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Evaluating the relative value of care interventions based on clinical pathway variation detection and propensity score.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Applying clinical guidelines to conformance checking for diagnosis and treatment: a case study of ischemic stroke.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Information Shaping for Enhanced Goal Recognition of Partially-Informed Agents.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

To Signal or Not To Signal: Exploiting Uncertain Real-Time Information in Signaling Games for Security and Sustainability.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Computing Equilibria of Prediction Markets via Persuasion.
Proceedings of the Web and Internet Economics - 15th International Conference, 2019

Imitative Attacker Deception in Stackelberg Security Games.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Cyber Camouflage Games for Strategic Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Imitative Follower Deception in Stackelberg Games.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

A modeling approach based on multi-perspective declarative process mining for clinical activity.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

A Mobile Intelligent Checklist System for Stroke Emergency.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

General-Sum Cyber Deception Games under Partial Attacker Valuation Information.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Using Game Theory in Real Time in the Real World: A Conservation Case Study.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Broken Signals in Security Games: Coordinating Patrollers and Sensors in the Real World.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Racetrack Queues for Extremely Low-Energy FIFOs.
IEEE Trans. Very Large Scale Integr. Syst., 2018

Targeting and Signaling in Ad Auctions.
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 2018

Speeding optimization considering the fuel consumption in the mooring period.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Berth Allocation Considering Fuel Consumption and Turnover Rate in the Mooring Period.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Cooperative Optimization for Port and Shipping Line with Unpredictable Disturbance Consideration.
Proceedings of the 14th International Conference on Natural Computation, 2018

Mitigating the Curse of Correlation in Security Games by Entropy Maximization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Using social networks to raise HIV awareness among homeless youth.
IBM J. Res. Dev., 2017

The Curse of Correlation in Security Games and Principle of Max-Entropy.
CoRR, 2017

Algorithmic Persuasion with No Externalities.
Proceedings of the 2017 ACM Conference on Economics and Computation, 2017

Spermbots: Concept and Applications.
Proceedings of the Biomimetic and Biohybrid Systems - 6th International Conference, 2017

Maximizing Awareness about HIV in Social Networks of Homeless Youth with Limited Information.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
ContextPreRF: Enhancing the Performance and Energy of GPUs With Nonuniform Register Access.
IEEE Trans. Very Large Scale Integr. Syst., 2016

FusedCache: A Naturally Inclusive, Racetrack Memory, Dual-Level Private Cache.
IEEE Trans. Multi Scale Comput. Syst., 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty - An Extended Version.
CoRR, 2016

Private Bayesian Persuasion with Monotone Submodular Objectives.
CoRR, 2016

Towards a commodity solution for the internet of things.
Comput. Electr. Eng., 2016

The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

Predicting Product Return rate with "Tweets".
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Write Pulse Scaling for Energy Efficient STT-MRAM.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Online Prosocial Microlending Decision Making: A Natural Experiment of Ebola Outbreak.
Proceedings of the International Conference on Information Systems, 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Playing Repeated Security Games with No Prior Knowledge.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Signaling in Bayesian Stackelberg Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Lynx: a self-organizing wireless sensor network with commodity palmtop computers.
Proceedings of the 2015 ACM/IEEE International Workshop on System Level Interconnect Prediction, 2015

Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Security Games with Information Leakage: Modeling and Computation.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A Conflicting Relationship Between Online Product Page Viewing And Product Returns.
Proceedings of the International Conference on Information Systems, 2015

Improving efficiency of wireless sensor networks through lightweight in-memory compression.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

Space Oblivious Compression: Power Reduction for Non-Volatile Main Memories.
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, GLVLSI 2015, Pittsburgh, PA, USA, May 20, 2015

Domain-wall memory buffer for low-energy NoCs.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Information Disclosure as a Means to Security.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Multi-agent Team Formation for Design Problems.
Proceedings of the Coordination, Organizations, Institutions, and Normes in Agent Systems XI, 2015

Multilane Racetrack caches: Improving efficiency through compression and independent shifting.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

Exploring Information Asymmetry in Two-Stage Security Games.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Advertising in New Media: Exploring Adoption of Location-Based Mobile Application Advertising.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Does Movie soundtrack Matter? The Role of soundtrack in Predicting Movie Revenue.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Am I "Pushed" to Loaf at Work? A Study of Push Notification Triggered Mobile-loafing.
Proceedings of the International Conference on Information Systems, 2014

Improving the efficiency of crowdsourcing contests.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

The Power of Teams that Disagree: Team Formation in Large Action Spaces.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems X, 2014

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Give a Hard Problem to a Diverse Team: Exploring Large Action Spaces.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Predicting advertiser bidding behaviors in sponsored search by rationality modeling.
Proceedings of the 22nd International World Wide Web Conference, 2013

How Does Online Social Network Change My Mood? An Empirical Study of Depression Contagion On Social Network Sites Using Text-mining.
Proceedings of the International Conference on Information Systems, 2013

Somersault cloud: Toward a cloud-of-clouds service for personal backup.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Considering fabrication in sustainable computing.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013

Ocelot: A wireless sensor network and computing engine with commodity palmtop computers.
Proceedings of the International Green Computing Conference, 2013

Green computing: A life cycle perspective.
Proceedings of the International Green Computing Conference, 2013

2012
Caching Is Hard - Even in the Fault Model.
Algorithmica, 2012

Why Do I Keep Checking Facebook: Effects of Message Characteristics On the Formation of Social Network Services Addiction.
Proceedings of the International Conference on Information Systems, 2012

2011
Scheduling on two identical machines with a speed-up resource.
Inf. Process. Lett., 2011

Offline Scheduling of Multi-threaded Request Streams on a Caching Server.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Data mining technique of Acoustic Emission signals under supervised and unsupervised mode.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Validity identification and classification technique of tank acoustic emission testing signals based on clustering analysis.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2007
A 31.3-dBm Bulk CMOS T/R Switch Using Stacked Transistors With Sub-Design-Rule Channel Length in Floated p-Wells.
IEEE J. Solid State Circuits, 2007

2005
An 18-GHz, 10.9-dBm fully-integrated power amplifier with 23.5% PAE in 130-nm CMOS.
Proceedings of the 31st European Solid-State Circuits Conference, 2005

2004
Automatic moving object extraction for content-based applications.
IEEE Trans. Circuits Syst. Video Technol., 2004

Client Architecture for MPEG-4 Streaming.
IEEE Multim., 2004

2000
Content-based retrieval in picture archiving and communication systems.
J. Digit. Imaging, 2000


  Loading...