Hong Zhao

According to our database1, Hong Zhao authored at least 232 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Coverage Degree-Coverage Model in Wireless Visual Sensor Networks.
IEEE Wireless Commun. Letters, 2019

Top Downloads in IEEE Xplore [Reader's Choice].
IEEE Signal Process. Mag., 2019

A Sensitivity-enhanced Fiber Grating Current Sensor Based on Giant Magnetostrictive Material for Large-Current Measurement.
Sensors, 2019

Hierarchical feature selection with subtree based graph regularization.
Knowl.-Based Syst., 2019

Recognition of Transportation State by Smartphone Sensors Using Deep Bi-LSTM Neural Network.
Journal Comp. Netw. and Communic., 2019

Malicious Domain Names Detection Algorithm Based on N-Gram.
Journal Comp. Netw. and Communic., 2019

The pollutant concentration prediction model of NNP-BPNN based on the INI algorithm, AW method and neighbor-PCA.
J. Ambient Intelligence and Humanized Computing, 2019

Adaptive Energy Control Strategy for a Hybrid Energy Storage System in a DC Micro-Grid of an Unmanned Surface Vehicle.
JACIII, 2019

A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
TIIS, 2019

Cost-sensitive feature selection via the 2, 1-norm.
Int. J. Approx. Reasoning, 2019

Hierarchical feature extraction based on discriminant analysis.
Appl. Intell., 2019

An Improved Selection Operator for Multi-objective Optimization.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019

Hardware Assisted Chaos Based IoT Authentication.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

An Adaptive Secret Key Establishment Scheme in Smart Home Environments.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Estimation of Penetration Depth from Soil Effective Temperature in Microwave Radiometry.
Remote Sensing, 2018

Multi-label feature selection with missing labels.
Pattern Recognition, 2018

Recognition of motion state by smartphone sensors using Bi-LSTM neural network.
Journal of Intelligent and Fuzzy Systems, 2018

Finite-Time Sideslip Observer-Based Adaptive Fuzzy Path-Following Control of Underactuated Marine Vehicles with Time-Varying Large Sideslip.
Int. J. Fuzzy Syst., 2018

An automatic glucose monitoring signal denoising method with noise level estimation and responsive filter updating.
Biomed. Signal Proc. and Control, 2018

Pedestrian Dead-Reckoning Indoor Localization Based on OS-ELM.
IEEE Access, 2018

Research on the Method of Extracting Domain Knowledge From the Freebase RDF Dumps.
IEEE Access, 2018

Composite Trajectory Tracking Control of Unmanned Surface Vehicles with Disturbances and Uncertainties.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018

Judgement-based Joint SLM and PTS Algorithm for PAPR Suppression of Radar Communication Integrated System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Implementation of an integrated navigation, guidance and control system for an unmanned surface vehicle.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Hybrid feedforward-feedback robust adaptive extreme learning control for Euler-Lagrange systems.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient.
Proceedings of the Advances in Internet, 2018

2017
Social-Aware Video Recommendation for Online Social Groups.
IEEE Trans. Multimedia, 2017

Real-Time Traffic Light Recognition Based on Smartphone Platforms.
IEEE Trans. Circuits Syst. Video Techn., 2017

Image Fusion With Cosparse Analysis Operator.
IEEE Signal Process. Lett., 2017

An intelligent character recognition method to filter spam images on cloud.
Soft Comput., 2017

A deep convolutional neural network for classification of red blood cells in sickle cell anemia.
PLoS Computational Biology, 2017

Audio splicing detection and localization using environmental signature.
Multimedia Tools Appl., 2017

A cost sensitive decision tree algorithm based on weighted class distribution with batch deleting attribute mechanism.
Inf. Sci., 2017

Hierarchical prostate MRI segmentation via level set clustering with shape prior.
Neurocomputing, 2017

Supersaturation controlled morphology and aspect ratio changes of benzoic acid crystals.
Computers & Chemical Engineering, 2017

Hierarchical Feature Selection with Recursive Regularization.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Bayesian statistical models of sea surface salinity based on SMOS satellite data.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A new SMOS sea surface salinity retrieval method.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Local Bayes Risk Minimization Based Stopping Strategy for Hierarchical Classification.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Design of a 3D printed insole with embedded plantar pressure sensor arrays.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Probabilistic abnormal glycemic event alert for T1DM patients.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

3D visual correlation model for wireless visual sensor networks.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
A Game-Theoretic Approach for Testing for Hardware Trojans.
IEEE Trans. Multi-Scale Computing Systems, 2016

Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification.
IEEE Trans. Information Forensics and Security, 2016

Statistical Models of Sea Surface Salinity in the South China Sea Based on SMOS Satellite Data.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2016

Test-cost-sensitive attribute reduction on heterogeneous data for adaptive neighborhood model.
Soft Comput., 2016

A Local Field Correlated and Monte Carlo Based Shallow Neural Network Model for Nonlinear Time Series Prediction.
EAI Endorsed Trans. Scalable Information Systems, 2016

Energy Efficient Moving Target Tracking in Wireless Sensor Networks.
Sensors, 2016

An exponent weighted algorithm for minimal cost feature selection.
Int. J. Machine Learning & Cybernetics, 2016

Cost-sensitive feature selection based on adaptive neighborhood granularity with multi-level confidence.
Inf. Sci., 2016

An Evaluation of the Dynamics of Diluted Neural Network.
Int. J. Comput. Intell. Syst., 2016

Identification of Electronic Disguised Voices in the Noisy Environment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A vectorization method of building edge based on high resolution DSM data.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Multi-focus image fusion via coupled dictionary training.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Discriminative Low-Rank Linear Regression (DLLR) for Facial Expression Recognition.
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016

2015
An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography.
Wireless Personal Communications, 2015

A Pedestrian-Detection Method Based on Heterogeneous Features and Ensemble of Multi-View-Pose Parts.
IEEE Trans. Intelligent Transportation Systems, 2015

Through-Metal-Wall Power Delivery and Data Transmission for Enclosed Sensors: A Review.
Sensors, 2015

Social networks in marketing research 2001-2014: a co-word analysis.
Scientometrics, 2015

Multi-layer assignment steganography using graph-theoretic approach.
Multimedia Tools Appl., 2015

Fast randomized algorithm with restart strategy for minimal test cost feature selection.
Int. J. Machine Learning & Cybernetics, 2015

A cost sensitive decision tree algorithm with two adaptive mechanisms.
Knowl.-Based Syst., 2015

Secure Data Fusion in Wireless Multimedia Sensor Networks via Compressed Sensing.
J. Sensors, 2015

Optimization of air pollutant monitoring stations with constraints using genetic algorithm.
J. High Speed Networks, 2015

Texture Feature Analysis for Computer-Aided Diagnosis on Pulmonary Nodules.
J. Digital Imaging, 2015

Parametric Matroid of Rough Set.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2015

Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks.
IJDSN, 2015

Effective background modelling and subtraction approach for moving object detection.
IET Computer Vision, 2015

Guest Editorial.
CIT, 2015

WLAN covert timing channel detection.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

Real Time Drowsiness Detection Based on Lateral Distance Using Wavelet Transform and Neural Network.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Horizontal and vertical sea surface salinity variability in South China sea area.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Assessment of SMOS and Aquarius/SAC-D salinity data accuracy in the South China Sea: Three statistical methods.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Satellite derived sea surface salinity validation in South China Sea area.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Cost-sensitive decision tree with probabilistic pruning mechanism.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

Optimal feature subset with positive region constraints.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

Study on the Similarity Query Based on LCSS over Data Stream Window.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Applying chaos theory for runtime Hardware Trojan detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer Detection.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Feature Selection with Positive Region Constraint for Test-Cost-Sensitive Data.
Trans. Rough Sets, 2014

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value.
IEEE Trans. Information Forensics and Security, 2014

Optimal cost-sensitive granularization based on rough sets for variable costs.
Knowl.-Based Syst., 2014

Nullity-based matroid of rough sets and its application to attribute reduction.
Inf. Sci., 2014

Research on born-digital image text extraction based on conditional random field.
IJHPSA, 2014

Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching.
IJDSN, 2014

A systematic study of solvent effect on the crystal habit of dirithromycin solvates by computer simulation.
Computers & Chemical Engineering, 2014

Self-regulated learning ability of Chinese distance learners.
BJET, 2014

Covert channels in 802.11e wireless networks.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

A Logarithmic Weighted Algorithm for Minimal Test Cost Attribute Reduction.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Global Best Artificial Bee Colony for Minimal Test Cost Attribute Reduction.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Efficient 3D texture feature extraction from CT images for computer-aided diagnosis of pulmonary nodules.
Proceedings of the Medical Imaging 2014: Computer-Aided Diagnosis, 2014

Audio source authentication and splicing detection using acoustic environmental signature.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Frontiers in Internet Technologies, 2014

A robust pedestrian detector based on heterogeneous feature fusion.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

2013
Detecting Covert Channels in Computer Networks Based on Chaos Theory.
IEEE Trans. Information Forensics and Security, 2013

Audio Recording Location Identification Using Acoustic Environment Signature.
IEEE Trans. Information Forensics and Security, 2013

Chapter 17: Bioimage Informatics for Systems Pharmacology.
PLoS Computational Biology, 2013

Feed-back neural networks with discrete weights.
Neural Computing and Applications, 2013

Face hallucination using example-based regularization.
Int. J. Machine Learning & Cybernetics, 2013

Cost-Sensitive Feature Selection of Numeric Data with Measurement Errors.
J. Applied Mathematics, 2013

Indel and Carryforward Correction (ICC): a new analysis approach for processing 454 pyrosequencing data.
Bioinformatics, 2013

User Travelling Pattern Prediction via Indistinct Cellular Data Mining.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Determination Algorithm for Probability Density about Uncertain Data Streams Based on GMM.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A new 3D texture feature based computer-aided diagnosis approach to differentiate pulmonary nodules.
Proceedings of the Medical Imaging 2013: Computer-Aided Diagnosis, 2013

Obstacle detection based on multiple cues fusion from monocular camera.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet.
Proceedings of the Frontiers in Internet Technologies, 2013

Study of EMC Problems with Vehicles.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

A quantitative analysis of F-actin features and distribution in fluorescence microscopy images to distinguish cells with different modes of motility.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Research on the Text Detection and Extraction from Complex Images.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Comparative Study on CRFs for Fore- and Background Classification.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Optimization of Air Pollutant Monitoring Stations Based on Genetic Algorithm.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Influence of viscosity of carrier liquid on performance of electrorheological fluids.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

Research on Born-Digital Image Text Extraction Based on Conditional Random Field.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Steganography in Streaming Multimedia over Networks.
Trans. Data Hiding and Multimedia Security, 2012

Research and Application of Electromagnetic Compatibility Technology.
JCP, 2012

Wavelet Transform-based Network Traffic Prediction: A Fast On-line Approach.
CIT, 2012

New localized excitations and their interaction behaviors in (3+1)-dimensional system.
Applied Mathematics and Computation, 2012

Audio forensics using acoustic environment traces.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Detecting covert channels within VoIP.
Proceedings of the 2012 35th IEEE Sarnoff Symposium, Newark, NJ, USA, May 21-22, 2012, 2012

Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Research on Preprocessing Algorithm for PET-CT Image Registration.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

Recording environment identification using acoustic reverberation.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

U.S. speed limit sign detection and recognition from image sequences.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

The research of the reliability data transmission system optimization approach in complex condition.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Study on the modeling and analyzing of the role-based threats in the cyberspace.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The Model of Data Replica Adjust to the Need Based on HDFS Cluster.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

Rapid Image Segmentation Using Color, Texture and Syntactic Visual Features.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Markovian Rake Transform for Digital Image Tampering Detection.
Trans. Data Hiding and Multimedia Security, 2011

Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Processing, 2011

Statistical analysis of several reversible data hiding algorithms.
Multimedia Tools Appl., 2011

Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing.
JNW, 2011

Security Issues and Solutions in 3G Core Network.
JNW, 2011

An enhanced Petri-net model to predict synergistic effects of pairwise drug combinations from gene microarray data.
Bioinformatics [ISMB/ECCB], 2011

Cross layer design for multimedia streaming over wireless 802.11e networks.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Lane recognition based on location of raised pavement markers.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

An efficient real-time speed limit signs recognition based on rotation invariant feature.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

Minimum Spanning Tree Hierarchically Fusing Multi-feature Points and High-Dimensional Features for Medical Image Registration.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A Middleware Architecture for Sensor Networks Applied to Industry Solutions of Internet of Things.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Test-cost-sensitive attribute reduction based on neighborhood rough set.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Research on power quality monitoring system of oil field based on ARM.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Tool path planning in finish-milling process for integrally-shrouded impeller channels with rings.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Introducing ICT in a Traditional Higher Education Environment.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Colorimetric Assay for Determination of Lead (II) Based on Its Incorporation into Gold Nanoparticles during Their Synthesis.
Sensors, 2010

A spectral boundary integral method for flowing blood cells.
J. Comput. Physics, 2010

A new algebraic procedure to construct exact solutions of nonlinear differential-difference equations.
Applied Mathematics and Computation, 2010

Interactions of solitary waves under the conditions of the (3 + 1)-dimensional Kadomtsev-Petviashvilli equation.
Applied Mathematics and Computation, 2010

A new General Algebraic Method and its applications to the (2+1)-dimensional Broer-Kaup-Kupershmidt equations.
Applied Mathematics and Computation, 2010

Study of a Novel Algorithm for Incipient Fault Diagnosis and Its Application.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

A phase-space reconstruction approach to detect covert channels in TCP/IP protocols.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Minimum Spanning Tree Fusing Multi-salient Points Hierarchically for Multi-modality Image Registration.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

Automatic monitoring system concerning extra-high-rise building oscillating based on measurement robot.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

A New Application of MEG and DTI on Word Recognition.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Approaches to realize temperature compensation of pressure sensor based on genetic wavelet neural network.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Development and implement of WEBGIS based on Java.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Hiding Data in Multimedia Streaming over Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

A Sheme of Mobile Platform Based on Trusted Computing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Securing GPRS Tunnel Protocol in 3G Core Network.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Novel Motion Detection Approach for Large FOV Cameras.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

2009
Correlation Between Eigenvalue Spectra and Dynamics of Neural Networks.
Neural Computation, 2009

A Study of Brainwave Entrainment Based on EEG Brain Dynamics.
Computer and Information Science, 2009

An Analysis of Improving Memory Performance Based on EEG Alpha and Theta Oscillations.
Computer and Information Science, 2009

Some new fractals behaviors in (2 + 1)-dimensional integrable system.
Applied Mathematics and Computation, 2009

Cell Segmentation Using Front Vector Flow Guided Active Contours.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2009

Multiscale analysis and prediction of network traffic.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Engineering Signals' Blind Source Separation in Frequency Domain and Its Application.
Proceedings of the Fifth International Conference on Natural Computation, 2009

The Risk Neural Network Based Visibility Forecast.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Learning Based Combining Different Features for Medical Image Retrieval.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

KDSR: An Efficient DHT-Based Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Semi-automatic Solitary Pulmonary Nodule Volume Measurement Algorithm on Low-Dose CT Images.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

A New Lung Segmentation Algorithm for Pathological CT Images.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Design and Research of Video Grid of Scalable Multilevel Architecture.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

The Application of P2P in Video Grid.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Example-Based Facial Sketch Hallucination.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive Support-Weight.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Touching String Segmentation Using MRF.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Novel Hybrid Intelligent Model for Financial Time Series Forecasting and Its Application.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A fixed-mesh method for incompressible flow-structure systems with finite solid deformations.
J. Comput. Physics, 2008

Revelations of the New Developments of Brain Science on Early Education.
Computer and Information Science, 2008

Storing Limit Cycles Using Delayed Feedback Neural Networks.
Advances in Complex Systems, 2008

Enhancing Software Product Line Maintenance with Source Code Mining.
Proceedings of the Wireless Algorithms, 2008

Two-layer sliding mode control of pneumatic position synchro system with feedback linearization based on friction compensation.
Proceedings of the 2008 International Workshop on Robotic and Sensors Environments, 2008

Architecture and Realization of Simulator of Video Grid.
Proceedings of the PACIIA 2008, 2008

A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Vision-Based Real-Time Lane Marking Detection and Tracking.
Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems, 2008

An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Maintaining software product lines - an industrial practice.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Three-Dimensional Shape Measurement Using Maar Wavelet Transform.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Design of Multi-resolution 3D Measurement System Using Light Sectioning Method and Multi-sensor Data Fusion Techniques.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Development of a 3D High-Precise Positioning System Based on a Planar Target and Two CCD Cameras.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

A Practical Wavelet Domain LMK Algorithm for Predicting Multimedia Traffic.
Proceedings of IEEE International Conference on Communications, 2008

Visual Cryptographic Scheme with High Image Quality.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A LDCT Image Contrast Enhancement Algorithm Based on Single-Scale Retinex Theory.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

A LDCT Image Contrast Enhancement Algorithm Based on Single-scale Retinex Theory.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

SPIT Detection and Prevention Method in VoIP Environment.
Proceedings of the The Third International Conference on Availability, 2008

2007
Improved Wavelet Feature Extraction Methods Based on HSV Space for Vehicle Detection.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2007), 2007

Improved Haar Wavelet Feature Extraction Approaches for Vehicle Detection.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

Ensemble Dependent Matrix Methodology for Probabilistic-Based Fault-tolerant Nanoscale Circuit Design.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Detecting early worm propagation based on entropy.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

A Framework of Attacker Centric Cyber Attack Behavior Analysis.
Proceedings of IEEE International Conference on Communications, 2007

Formal Analysis of Secure Bootstrap in Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Distributed and Scalable Event Correlation Based on Causality Graph.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Network Traffic Prediction Using Least Mean Kurtosis.
IEICE Transactions, 2006

Enhancement Filter for Computer-Aided Detection of Pulmonary Nodules on Thoracic CT images.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

A Rear-Vehicle Detection System for Static Images Based on Monocular Vision.
Proceedings of the Ninth International Conference on Control, 2006

2005
Layered MPEG Video Transmission over IP DiffServ.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Medical image retrieval based on visual contents and text information.
Proceedings of the IEEE International Conference on Systems, 2004

Automatic analysis of brain pathology based on image content.
Proceedings of the IEEE International Conference on Systems, 2004

Bandwidth efficient fingerprint multicast for video streaming.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

A secure multicast scheme for anti-collusion fingerprinted video.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Distributed Plug-and-Play Network Management Model Based on Mobile Agents.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Self-Adapting Mobile Ipv6 Model Based on MAP.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
PGDB: a curated and integrated database of genes related to the prostate.
Nucleic Acids Research, 2003

Self-similar Traffic Prediction Using Least Mean Kurtosis.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Nonlinear collusion attacks on independent fingerprints for multimedia.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Resistance of orthogonal Gaussian fingerprints to collusion attacks.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Nonlinear collusion attacks on independent fingerprints for multimedia.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Resistance of orthogonal Gaussian fingerprints to collusion attacks.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
On modeling MPEG video traffics.
TBC, 2002

A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

2000
Global-local-global method for logical structure extraction of form document image.
J. Electronic Imaging, 2000

1999
Stress-Based and Path-Based Fault Injection.
IEEE Trans. Computers, 1999

High speed wireless data access based on combining EDGE with wideband OFDM.
IEEE Communications Magazine, 1999

Content-based Index and Retrieval Method of Chinese Document Images.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

New method for logical structure extraction of form document image.
Proceedings of the Document Recognition and Retrieval VI, 1999

1998
A new approach for intelligent object picking in line drawing images.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1993
GRPC: A Communication Cooperation Mechanism in Distributed Systems.
Operating Systems Review, 1993


  Loading...