Hao Peng

According to our database1, Hao Peng
  • authored at least 68 papers between 2009 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Mining massive hierarchical data using a scalable probabilistic graphical model.
Inf. Sci., 2018

Eagle+: A fast incremental approach to automaton and table online updates for cloud services.
Future Generation Comp. Syst., 2018

2017
Flexible decision models for a two-dimensional warranty policy with periodic preventive maintenance.
Rel. Eng. & Sys. Safety, 2017

Maintenance optimization under non-constant probabilities of imperfect inspections.
Rel. Eng. & Sys. Safety, 2017

Deep Multitask Learning for Semantic Dependency Parsing.
CoRR, 2017

Approximate evaluation of average downtime under an integrated approach of opportunistic maintenance for multi-component systems.
Computers & Industrial Engineering, 2017

DEIsoM: a hierarchical Bayesian model for identifying differentially expressed isoforms using biological replicates.
Bioinformatics, 2017

Advanced tutorial on microscopic discrete-event traffic simulation.
Proceedings of the 2017 Winter Simulation Conference, 2017

Optimizing XCSR for Text Classification.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

Adding Support for Theory in Open Science Big Data.
Proceedings of the 2017 IEEE World Congress on Services, 2017

Recognizing Pathogenic Empathy in Social Media.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Asynchronous Distributed Variational Gaussian Process for Regression.
Proceedings of the 34th International Conference on Machine Learning, 2017

Performance Dynamics and Success in Online Games.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Semi-supervised Structured Prediction with Neural CRF Autoencoder.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Bayesian Networks with Structural Restrictions: Parallelization, Performance, and Efficient Cross-Validation.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Adding Support for Theory in Open Science Big Data.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Deep Multitask Learning for Semantic Dependency Parsing.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

Incrementally Learning the Hierarchical Softmax Function for Neural Language Models.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
A Low-Power Gateable Vernier Ring Oscillator Time-to-Digital Converter for Biomedical Imaging Applications.
IEEE Trans. Biomed. Circuits and Systems, 2016

Current-Mode nth-Order Filter Based on a Minimal Component.
Journal of Circuits, Systems, and Computers, 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
IJHPCN, 2016

A novel ultra-wideband bandpass filter using defected microstrip structures.
IEICE Electronic Express, 2016

Joint optimization of condition-based maintenance and production lot-sizing.
European Journal of Operational Research, 2016

An extension of the Motzkin-Straus theorem to non-uniform hypergraphs and its applications.
Discrete Applied Mathematics, 2016

A Gb/s Parallel Block-based Viterbi Decoder for Convolutional Codes on GPU.
CoRR, 2016

A Convolutional Attention Network for Extreme Summarization of Source Code.
CoRR, 2016

A Gb/s parallel block-based Viterbi decoder for convolutional codes on GPU.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Eagle: An Agile Approach to Automaton Updating in Cloud Security Services.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

A Convolutional Attention Network for Extreme Summarization of Source Code.
Proceedings of the 33nd International Conference on Machine Learning, 2016

News Citation Recommendation with Implicit and Explicit Semantics.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

2015
Coordinative Stochastic Resonance Filtering Based Inter-cell Interference Suppression in FrFT-OFDMA Cellular Systems.
Wireless Personal Communications, 2015

An Isolated High-Frequency DC-AC Converter Based on Differential Structure With Ultralow Distortion Output Voltage.
IEEE Trans. Industrial Electronics, 2015

Continuously tunable SIW phase shifter based on the buried varactors.
IEICE Electronic Express, 2015

High Throughput Pipeline Decoder for LDPC Convolutional Codes on GPU.
IEEE Communications Letters, 2015

Classifying Relations via Long Short Term Memory Networks along Shortest Dependency Path.
CoRR, 2015

A Comparative Study on Regularization Strategies for Embedding-based Neural Networks.
CoRR, 2015

Tree-based Convolution: A New Neural Architecture for Sentence Modeling.
CoRR, 2015

Brain morphometry on congenital hand deformities based on Teichmüller space theory.
Computer-Aided Design, 2015

(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Building Program Vector Representations for Deep Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2015

EigenGP: Gaussian Process Models with Adaptive Eigenfunctions.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Classifying Relations via Long Short Term Memory Networks along Shortest Dependency Paths.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

A Comparative Study on Regularization Strategies for Embedding-based Neural Networks.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

Discriminative Neural Sentence Modeling by Tree-Based Convolution.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

2014
Reliability Analysis for Multi-Component Systems Subject to Multiple Dependent Competing Failure Processes.
IEEE Trans. Reliability, 2014

Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Sec. Comput., 2014

On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

EigenGP: Gaussian process models with adaptive eigenfunctions.
CoRR, 2014

Building Program Vector Representations for Deep Learning.
CoRR, 2014

Low Loss Compact Meander Stripline Delay Lines Using LTCC.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Corrections to "Component Reliability Criticality or Importance Measures for Systems With Degrading Components".
IEEE Trans. Reliability, 2013

Reliability Modeling for Ultrathin Gate Oxides Subject to Logistic Degradation Processes with Random Onset Time.
Quality and Reliability Eng. Int., 2013

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
JSW, 2013

A Reliable Transport Protocol with Prediction Mechanism for Urgent Information in Wireless Sensor Networks.
IJDSN, 2013

A 2.5D Colon Wall Flattening Model for CT-Based Virtual Colonoscopy.
Proceedings of the Machine Learning in Medical Imaging - 4th International Workshop, 2013

A Novel Computer Aided Detection (CADe) Scheme for Colonic Polyps Based on the Structure Decomposition.
Proceedings of the Abdominal Imaging. Computation and Clinical Applications, 2013

Global Colon Geometric Structure Analysis Based on Geodesics and Conformal Flattening.
Proceedings of the Abdominal Imaging. Computation and Clinical Applications, 2013

2012
Component Reliability Criticality or Importance Measures for Systems With Degrading Components.
IEEE Trans. Reliability, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

2010
Histogram modification based robust image watermarking approach.
IJMIS, 2010

An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Simultaneous Quality and Reliability Optimization for Microengines Subject to Degradation.
IEEE Trans. Reliability, 2009

In silico Analysis of the Potential Infection Mechanisms of Magnaporthe grisea from Horizontal Gene Transfer Hypothesis.
Genomics, Proteomics & Bioinformatics, 2009

Design and Implement of File Linked Distributed File System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009


  Loading...