Hong Zhao

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2021
Reinforcement Learning-Based Optimal Tracking Control of an Unknown Unmanned Surface Vehicle.
IEEE Trans. Neural Networks Learn. Syst., 2021

A Recursive Regularization Based Feature Selection Framework for Hierarchical Classification.
IEEE Trans. Knowl. Data Eng., 2021

Deep Learning Methods for Lung Cancer Segmentation in Whole-Slide Histopathology Images - The ACDC@LungHP Challenge 2019.
IEEE J. Biomed. Health Informatics, 2021

Linear Recursive Non-Local Edge-Aware Filter.
IEEE Trans. Circuits Syst. Video Technol., 2021

Monitoring Water and Energy Cycles at Climate Scale in the Third Pole Environment (CLIMATE-TPE).
Remote. Sens., 2021

An algorithm based on QSVD for the quaternion equality constrained least squares problem.
Numer. Algorithms, 2021

Research on End-to-end Voiceprint Recognition Model Based on Convolutional Neural Network.
J. Web Eng., 2021

Robust hierarchical feature selection driven by data and knowledge.
Inf. Sci., 2021

Hierarchical feature selection with multi-granularity clustering structure.
Inf. Sci., 2021

Multiple populations co-evolutionary particle swarm optimization for multi-objective cardinality constrained portfolio optimization problem.
Neurocomputing, 2021

Robust hierarchical feature selection with a capped ℓ2-norm.
Neurocomputing, 2021

Multi-Objective Optimization and Performance Assessments of an Integrated Energy System Based on Fuel, Wind and Solar Energies.
Entropy, 2021

Causality-based online streaming feature selection.
Concurr. Comput. Pract. Exp., 2021

Deep learning powers cancer diagnosis in digital pathology.
Comput. Medical Imaging Graph., 2021

Cost-sensitive hierarchical classification via multi-scale information entropy for data with an imbalanced distribution.
Appl. Intell., 2021

Hierarchical classification with multi-path selection based on granular computing.
Artif. Intell. Rev., 2021

Research on Human Behavior Recognition Based on Video Key Frame.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Local Binary Pattern-Based Adaptive Differential Evolution for Multimodal Optimization Problems.
IEEE Trans. Cybern., 2020

A framework for pulmonary fissure segmentation in 3D CT images using a directional derivative of plate filter.
Signal Process., 2020

Design of prototype system for multi-agent supply chain information sharing benefit distribution management.
Inf. Syst. E Bus. Manag., 2020

RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service.
Entropy, 2020

CBOL: Cross-Bank Over-Loan Prevention, Revisited.
Entropy, 2020

Comparative study of customer relationship management research from East Asia, North America and Europe: A bibliometric overview.
Electron. Mark., 2020

Inferring Global Dynamics Using a Learning Machine.
CoRR, 2020

Deep Learning System to Screen Coronavirus Disease 2019 Pneumonia.
CoRR, 2020

Cost-sensitive hierarchical classification for imbalance classes.
Appl. Intell., 2020

A Boundary Distance-Based Symbolic Aggregate Approximation Method for Time Series Data.
Algorithms, 2020

Lung Lobe Segmentation Based on Lung Fissure Surface Classification Using a Point Cloud Region Growing Approach.
Algorithms, 2020

MDC-Kace: A Model for Predicting Lysine Acetylation Sites Based on Modular Densely Connected Convolutional Networks.
IEEE Access, 2020

A Multi-Angle Hierarchical Differential Evolution Approach for Multimodal Optimization Problems.
IEEE Access, 2020

Visual Monitoring Algorithms for Real-time Change of Fitness Center Rate.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Optimal Path Planning for Robot Based on Ant Colony Algorithm.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Application of generalized predictive control in temperature control of continuous stirred tank reactor.
Proceedings of the ISBDAI 2020, 2020

Preference-aware Heterogeneous Graph Neural Networks for Recommendation.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Fixed-time Trajectory Tracking Control of an Unmanned Surface Vehicle.
Proceedings of the International Conference on System Science and Engineering, 2020

Research on The Relationship between Air Pollution and College Students' exam Scores.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Student Achievement Analysis and Prediction Based on the Whole Learning Process.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Analysis of College Students' psychological Anxiety and Its Causes under COVID-19.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

The Application of O-AMAS Effective Teaching Model and Flipped Classroom in Database Technology and Application Course.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

The Innovative Curriculum Construction of "Computer Fundamentals" Course Based on SPOC+MOOC in Higher Education.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Formative and Summative Assessment in University Programming Course: Mediation of Problem-Based Learning and Moderation of Peer Evaluation.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Simulation and Analysis of Rumor Propagation Model Based on Multi-Agent.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

Adaptive Guidance-based Differential Evolution with Iterative Feedback Archive Strategy for Multimodal optimization Problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

2019
Coverage Degree-Coverage Model in Wireless Visual Sensor Networks.
IEEE Wirel. Commun. Lett., 2019

A Machine Vision System for Stacked Substrates Counting With a Robust Stripe Detection Algorithm.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Fuzzy Rough Set Based Feature Selection for Large-Scale Hierarchical Classification.
IEEE Trans. Fuzzy Syst., 2019

A Sensitivity-enhanced Fiber Grating Current Sensor Based on Giant Magnetostrictive Material for Large-Current Measurement.
Sensors, 2019

Hierarchical feature selection with subtree based graph regularization.
Knowl. Based Syst., 2019

Response Bandwidth Design of Fabry-Perot Sensors for Partial Discharge Detection Based on Frequency Analysis.
J. Sensors, 2019

A Novel Automatic Coronary Artery Segmentation Method Based on Region Growing with Annular and Spherical Sector Partition.
J. Medical Imaging Health Informatics, 2019

Recognition of Transportation State by Smartphone Sensors Using Deep Bi-LSTM Neural Network.
J. Comput. Networks Commun., 2019

Malicious Domain Names Detection Algorithm Based on <i>N</i>-Gram.
J. Comput. Networks Commun., 2019

The pollutant concentration prediction model of NNP-BPNN based on the INI algorithm, AW method and neighbor-PCA.
J. Ambient Intell. Humaniz. Comput., 2019

Adaptive Energy Control Strategy for a Hybrid Energy Storage System in a DC Micro-Grid of an Unmanned Surface Vehicle.
J. Adv. Comput. Intell. Intell. Informatics, 2019

A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.
IEEE Internet Things J., 2019

Cost-sensitive feature selection via the <i>ℓ</i><sub>2, 1</sub>-norm.
Int. J. Approx. Reason., 2019

Building a Holistic Taxonomy Model for OGD-Related Risks: Based on a Lifecycle Analysis.
Data Intell., 2019

Prediction of System Evolution by Learning Machine.
CoRR, 2019

Hierarchical feature extraction based on discriminant analysis.
Appl. Intell., 2019

Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification.
IEEE Access, 2019

Judgment-based Cascaded SLM Algorithm for PAPR Suppression of Radar Communication Integrated System.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Adaptive Physical Layer Key Extraction Scheme for Smart Homes.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Improved Selection Operator for Multi-objective Optimization.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019

Hardware Assisted Chaos Based IoT Authentication.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

Design of Automatic Fast Food Vending Machine Based on SIMATIC LOGO!
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

The Effects of ICT Use on Chinese College Students' Study Behavior in B-learning Evaluating B-learning Effectiveness via Causal Model.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Integration of Flipped Classroom and Problem Based Learning Model and its Implementation in University Programming Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Evaluating the Performance of Teaching Assistants in Computer Science B-learning Classes.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

A New Teaching Pattern Based on PBL and Visual Programming in Computational Thinking Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

An Adaptive Secret Key Establishment Scheme in Smart Home Environments.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Adaptive Discrete-Time Sliding Mode Control of Brushless DC Motor Servo System for Unmanned Surface Vehicles.
Proceedings of the Cyber Security Intelligence and Analytics, 2019

Users' Comment Mining for App Software's Quality-in-Use.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

2018
Estimation of Penetration Depth from Soil Effective Temperature in Microwave Radiometry.
Remote. Sens., 2018

Multi-label feature selection with missing labels.
Pattern Recognit., 2018

Recognition of motion state by smartphone sensors using Bi-LSTM neural network.
J. Intell. Fuzzy Syst., 2018

Finite-Time Sideslip Observer-Based Adaptive Fuzzy Path-Following Control of Underactuated Marine Vehicles with Time-Varying Large Sideslip.
Int. J. Fuzzy Syst., 2018

An automatic glucose monitoring signal denoising method with noise level estimation and responsive filter updating.
Biomed. Signal Process. Control., 2018

Pedestrian Dead-Reckoning Indoor Localization Based on OS-ELM.
IEEE Access, 2018

Research on the Method of Extracting Domain Knowledge From the Freebase RDF Dumps.
IEEE Access, 2018

Composite Trajectory Tracking Control of Unmanned Surface Vehicles with Disturbances and Uncertainties.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018

Judgement-based Joint SLM and PTS Algorithm for PAPR Suppression of Radar Communication Integrated System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Implementation of an integrated navigation, guidance and control system for an unmanned surface vehicle.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Hybrid feedforward-feedback robust adaptive extreme learning control for Euler-Lagrange systems.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient.
Proceedings of the Advances in Internet, 2018

2017
Social-Aware Video Recommendation for Online Social Groups.
IEEE Trans. Multim., 2017

Real-Time Traffic Light Recognition Based on Smartphone Platforms.
IEEE Trans. Circuits Syst. Video Technol., 2017

Image Fusion With Cosparse Analysis Operator.
IEEE Signal Process. Lett., 2017

An intelligent character recognition method to filter spam images on cloud.
Soft Comput., 2017

A deep convolutional neural network for classification of red blood cells in sickle cell anemia.
PLoS Comput. Biol., 2017

Audio splicing detection and localization using environmental signature.
Multim. Tools Appl., 2017

A cost sensitive decision tree algorithm based on weighted class distribution with batch deleting attribute mechanism.
Inf. Sci., 2017

Hierarchical prostate MRI segmentation via level set clustering with shape prior.
Neurocomputing, 2017

A General Theory for Training Learning Machine.
CoRR, 2017

Supersaturation controlled morphology and aspect ratio changes of benzoic acid crystals.
Comput. Chem. Eng., 2017

Hierarchical Feature Selection with Recursive Regularization.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Bayesian statistical models of sea surface salinity based on SMOS satellite data.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A new SMOS sea surface salinity retrieval method.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Local Bayes Risk Minimization Based Stopping Strategy for Hierarchical Classification.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Design of a 3D printed insole with embedded plantar pressure sensor arrays.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Java Source Code Protection Based on JNI and AES Algorithm.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Probabilistic abnormal glycemic event alert for T1DM patients.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

3D visual correlation model for wireless visual sensor networks.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
A Game-Theoretic Approach for Testing for Hardware Trojans.
IEEE Trans. Multi Scale Comput. Syst., 2016

Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification.
IEEE Trans. Inf. Forensics Secur., 2016

Statistical Models of Sea Surface Salinity in the South China Sea Based on SMOS Satellite Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2016

Test-cost-sensitive attribute reduction on heterogeneous data for adaptive neighborhood model.
Soft Comput., 2016

A Local Field Correlated and Monte Carlo Based Shallow Neural Network Model for Nonlinear Time Series Prediction.
EAI Endorsed Trans. Scalable Inf. Syst., 2016

Energy Efficient Moving Target Tracking in Wireless Sensor Networks.
Sensors, 2016

An exponent weighted algorithm for minimal cost feature selection.
Int. J. Mach. Learn. Cybern., 2016

Cost-sensitive feature selection based on adaptive neighborhood granularity with multi-level confidence.
Inf. Sci., 2016

An Evaluation of the Dynamics of Diluted Neural Network.
Int. J. Comput. Intell. Syst., 2016

General Vector Machine.
CoRR, 2016

Identification of Electronic Disguised Voices in the Noisy Environment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A vectorization method of building edge based on high resolution DSM data.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Multi-focus image fusion via coupled dictionary training.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Discriminative Low-Rank Linear Regression (DLLR) for Facial Expression Recognition.
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016

2015
An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography.
Wirel. Pers. Commun., 2015

A Pedestrian-Detection Method Based on Heterogeneous Features and Ensemble of Multi-View-Pose Parts.
IEEE Trans. Intell. Transp. Syst., 2015

Through-Metal-Wall Power Delivery and Data Transmission for Enclosed Sensors: A Review.
Sensors, 2015

Social networks in marketing research 2001-2014: a co-word analysis.
Scientometrics, 2015

Multi-layer assignment steganography using graph-theoretic approach.
Multim. Tools Appl., 2015

Fast randomized algorithm with restart strategy for minimal test cost feature selection.
Int. J. Mach. Learn. Cybern., 2015

A cost sensitive decision tree algorithm with two adaptive mechanisms.
Knowl. Based Syst., 2015

Secure Data Fusion in Wireless Multimedia Sensor Networks via Compressed Sensing.
J. Sensors, 2015

Optimization of air pollutant monitoring stations with constraints using genetic algorithm.
J. High Speed Networks, 2015

Texture Feature Analysis for Computer-Aided Diagnosis on Pulmonary Nodules.
J. Digit. Imaging, 2015

Parametric Matroid of Rough Set.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2015

Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Effective background modelling and subtraction approach for moving object detection.
IET Comput. Vis., 2015

Guest Editorial.
J. Comput. Inf. Technol., 2015

WLAN covert timing channel detection.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

Real Time Drowsiness Detection Based on Lateral Distance Using Wavelet Transform and Neural Network.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Horizontal and vertical sea surface salinity variability in South China sea area.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Assessment of SMOS and Aquarius/SAC-D salinity data accuracy in the South China Sea: Three statistical methods.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Satellite derived sea surface salinity validation in South China Sea area.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Cost-sensitive decision tree with probabilistic pruning mechanism.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

Optimal feature subset with positive region constraints.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

Suppression of aerodynamic coupled parasitic loop.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Study on the Similarity Query Based on LCSS over Data Stream Window.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Applying chaos theory for runtime Hardware Trojan detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer Detection.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Feature Selection with Positive Region Constraint for Test-Cost-Sensitive Data.
Trans. Rough Sets, 2014

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value.
IEEE Trans. Inf. Forensics Secur., 2014

Optimal cost-sensitive granularization based on rough sets for variable costs.
Knowl. Based Syst., 2014

Nullity-based matroid of rough sets and its application to attribute reduction.
Inf. Sci., 2014

Research on born-digital image text extraction based on conditional random field.
Int. J. High Perform. Syst. Archit., 2014

Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching.
Int. J. Distributed Sens. Networks, 2014

A systematic study of solvent effect on the crystal habit of dirithromycin solvates by computer simulation.
Comput. Chem. Eng., 2014

Self-regulated learning ability of Chinese distance learners.
Br. J. Educ. Technol., 2014

Covert channels in 802.11e wireless networks.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

A Logarithmic Weighted Algorithm for Minimal Test Cost Attribute Reduction.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Global Best Artificial Bee Colony for Minimal Test Cost Attribute Reduction.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Efficient 3D texture feature extraction from CT images for computer-aided diagnosis of pulmonary nodules.
Proceedings of the Medical Imaging 2014: Computer-Aided Diagnosis, 2014

Audio source authentication and splicing detection using acoustic environmental signature.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Frontiers in Internet Technologies, 2014

A robust pedestrian detector based on heterogeneous feature fusion.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

2013
Detecting Covert Channels in Computer Networks Based on Chaos Theory.
IEEE Trans. Inf. Forensics Secur., 2013

Audio Recording Location Identification Using Acoustic Environment Signature.
IEEE Trans. Inf. Forensics Secur., 2013

Chapter 17: Bioimage Informatics for Systems Pharmacology.
PLoS Comput. Biol., 2013

Feed-back neural networks with discrete weights.
Neural Comput. Appl., 2013

Face hallucination using example-based regularization.
Int. J. Mach. Learn. Cybern., 2013

Cost-Sensitive Feature Selection of Numeric Data with Measurement Errors.
J. Appl. Math., 2013

Rough matroids based on coverings.
CoRR, 2013

Indel and Carryforward Correction (ICC): a new analysis approach for processing 454 pyrosequencing data.
Bioinform., 2013

User Travelling Pattern Prediction via Indistinct Cellular Data Mining.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Determination Algorithm for Probability Density about Uncertain Data Streams Based on GMM.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A new 3D texture feature based computer-aided diagnosis approach to differentiate pulmonary nodules.
Proceedings of the Medical Imaging 2013: Computer-Aided Diagnosis, 2013

Obstacle detection based on multiple cues fusion from monocular camera.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet.
Proceedings of the Frontiers in Internet Technologies, 2013

Study of EMC Problems with Vehicles.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

A quantitative analysis of F-actin features and distribution in fluorescence microscopy images to distinguish cells with different modes of motility.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Research on the Text Detection and Extraction from Complex Images.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Comparative Study on CRFs for Fore- and Background Classification.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Optimization of Air Pollutant Monitoring Stations Based on Genetic Algorithm.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Influence of viscosity of carrier liquid on performance of electrorheological fluids.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

Research on Born-Digital Image Text Extraction Based on Conditional Random Field.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Steganography in Streaming Multimedia over Networks.
Trans. Data Hiding Multim. Secur., 2012

Research and Application of Electromagnetic Compatibility Technology.
J. Comput., 2012

Wavelet Transform-based Network Traffic Prediction: A Fast On-line Approach.
J. Comput. Inf. Technol., 2012

New localized excitations and their interaction behaviors in (3+1)-dimensional system.
Appl. Math. Comput., 2012

Audio forensics using acoustic environment traces.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Detecting covert channels within VoIP.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Research on Preprocessing Algorithm for PET-CT Image Registration.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

Recording environment identification using acoustic reverberation.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

U.S. speed limit sign detection and recognition from image sequences.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

The research of the reliability data transmission system optimization approach in complex condition.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Study on the modeling and analyzing of the role-based threats in the cyberspace.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The Model of Data Replica Adjust to the Need Based on HDFS Cluster.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

Rapid Image Segmentation Using Color, Texture and Syntactic Visual Features.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Markovian Rake Transform for Digital Image Tampering Detection.
Trans. Data Hiding Multim. Secur., 2011

Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Process., 2011

Statistical analysis of several reversible data hiding algorithms.
Multim. Tools Appl., 2011

Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing.
J. Networks, 2011

Security Issues and Solutions in 3G Core Network.
J. Networks, 2011

Safety analysis of independent columns mounted on isolated bearing system.
Int. J. Comput. Intell. Syst., 2011

An enhanced Petri-net model to predict synergistic effects of pairwise drug combinations from gene microarray data.
Bioinform., 2011

Cross layer design for multimedia streaming over wireless 802.11e networks.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Lane recognition based on location of raised pavement markers.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

An efficient real-time speed limit signs recognition based on rotation invariant feature.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

Minimum Spanning Tree Hierarchically Fusing Multi-feature Points and High-Dimensional Features for Medical Image Registration.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A Middleware Architecture for Sensor Networks Applied to Industry Solutions of Internet of Things.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Test-cost-sensitive attribute reduction based on neighborhood rough set.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Research on power quality monitoring system of oil field based on ARM.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Tool path planning in finish-milling process for integrally-shrouded impeller channels with rings.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Introducing ICT in a Traditional Higher Education Environment.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Colorimetric Assay for Determination of Lead (II) Based on Its Incorporation into Gold Nanoparticles during Their Synthesis.
Sensors, 2010

A spectral boundary integral method for flowing blood cells.
J. Comput. Phys., 2010

A new algebraic procedure to construct exact solutions of nonlinear differential-difference equations.
Appl. Math. Comput., 2010

Interactions of solitary waves under the conditions of the (3 + 1)-dimensional Kadomtsev-Petviashvilli equation.
Appl. Math. Comput., 2010

A new General Algebraic Method and its applications to the (2+1)-dimensional Broer-Kaup-Kupershmidt equations.
Appl. Math. Comput., 2010

Study of a Novel Algorithm for Incipient Fault Diagnosis and Its Application.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

A phase-space reconstruction approach to detect covert channels in TCP/IP protocols.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Minimum Spanning Tree Fusing Multi-salient Points Hierarchically for Multi-modality Image Registration.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

Automatic monitoring system concerning extra-high-rise building oscillating based on measurement robot.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

A New Application of MEG and DTI on Word Recognition.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Approaches to realize temperature compensation of pressure sensor based on genetic wavelet neural network.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Development and implement of WEBGIS based on Java.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Hiding Data in Multimedia Streaming over Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

A Sheme of Mobile Platform Based on Trusted Computing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Securing GPRS Tunnel Protocol in 3G Core Network.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Novel Motion Detection Approach for Large FOV Cameras.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

2009
Correlation Between Eigenvalue Spectra and Dynamics of Neural Networks.
Neural Comput., 2009

A Study of Brainwave Entrainment Based on EEG Brain Dynamics.
Comput. Inf. Sci., 2009

An Analysis of Improving Memory Performance Based on EEG Alpha and Theta Oscillations.
Comput. Inf. Sci., 2009

Some new fractals behaviors in (2 + 1)-dimensional integrable system.
Appl. Math. Comput., 2009

Cell Segmentation Using Front Vector Flow Guided Active Contours.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2009

Multiscale analysis and prediction of network traffic.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Engineering Signals' Blind Source Separation in Frequency Domain and Its Application.
Proceedings of the Fifth International Conference on Natural Computation, 2009

The Risk Neural Network Based Visibility Forecast.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Learning Based Combining Different Features for Medical Image Retrieval.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

KDSR: An Efficient DHT-Based Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Semi-automatic Solitary Pulmonary Nodule Volume Measurement Algorithm on Low-Dose CT Images.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

A New Lung Segmentation Algorithm for Pathological CT Images.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Design and Research of Video Grid of Scalable Multilevel Architecture.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

The Application of P2P in Video Grid.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Example-Based Facial Sketch Hallucination.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive Support-Weight.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Touching String Segmentation Using MRF.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Novel Hybrid Intelligent Model for Financial Time Series Forecasting and Its Application.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A fixed-mesh method for incompressible flow-structure systems with finite solid deformations.
J. Comput. Phys., 2008

Revelations of the New Developments of Brain Science on Early Education.
Comput. Inf. Sci., 2008

Storing Limit Cycles Using Delayed Feedback Neural Networks.
Adv. Complex Syst., 2008

Network Security Situation Assessment Based on Data Fusion.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Enhancing Software Product Line Maintenance with Source Code Mining.
Proceedings of the Wireless Algorithms, 2008

Two-layer sliding mode control of pneumatic position synchro system with feedback linearization based on friction compensation.
Proceedings of the 2008 International Workshop on Robotic and Sensors Environments, 2008

Architecture and Realization of Simulator of Video Grid.
Proceedings of the PACIIA 2008, 2008

A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Vision-Based Real-Time Lane Marking Detection and Tracking.
Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems, 2008

An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Maintaining software product lines - an industrial practice.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Three-Dimensional Shape Measurement Using Maar Wavelet Transform.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Design of Multi-resolution 3D Measurement System Using Light Sectioning Method and Multi-sensor Data Fusion Techniques.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Development of a 3D High-Precise Positioning System Based on a Planar Target and Two CCD Cameras.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

A Practical Wavelet Domain LMK Algorithm for Predicting Multimedia Traffic.
Proceedings of IEEE International Conference on Communications, 2008

Visual Cryptographic Scheme with High Image Quality.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A LDCT Image Contrast Enhancement Algorithm Based on Single-Scale Retinex Theory.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

SPIT Detection and Prevention Method in VoIP Environment.
Proceedings of the The Third International Conference on Availability, 2008

2007
Improved Wavelet Feature Extraction Methods Based on HSV Space for Vehicle Detection.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2007), 2007

Improved Haar Wavelet Feature Extraction Approaches for Vehicle Detection.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

Ensemble Dependent Matrix Methodology for Probabilistic-Based Fault-tolerant Nanoscale Circuit Design.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Detecting early worm propagation based on entropy.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

A Framework of Attacker Centric Cyber Attack Behavior Analysis.
Proceedings of IEEE International Conference on Communications, 2007

Formal Analysis of Secure Bootstrap in Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Distributed and Scalable Event Correlation Based on Causality Graph.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT.
IEEE Trans. Signal Process., 2006

Network Traffic Prediction Using Least Mean Kurtosis.
IEICE Trans. Commun., 2006

Enhancement Filter for Computer-Aided Detection of Pulmonary Nodules on Thoracic CT images.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

A Rear-Vehicle Detection System for Static Images Based on Monocular Vision.
Proceedings of the Ninth International Conference on Control, 2006

2005
Layered MPEG Video Transmission over IP DiffServ.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Formal security model research based on Petri-net.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Medical image retrieval based on visual contents and text information.
Proceedings of the IEEE International Conference on Systems, 2004

Automatic analysis of brain pathology based on image content.
Proceedings of the IEEE International Conference on Systems, 2004

Bandwidth efficient fingerprint multicast for video streaming.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

A secure multicast scheme for anti-collusion fingerprinted video.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Distributed Plug-and-Play Network Management Model Based on Mobile Agents.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Self-Adapting Mobile Ipv6 Model Based on MAP.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

The Consistency between the Attribute Relationships and Time-Serial Count Operators.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004

2003
PGDB: a curated and integrated database of genes related to the prostate.
Nucleic Acids Res., 2003

Self-similar Traffic Prediction Using Least Mean Kurtosis.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Nonlinear collusion attacks on independent fingerprints for multimedia.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Resistance of orthogonal Gaussian fingerprints to collusion attacks.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
On modeling MPEG video traffics.
IEEE Trans. Broadcast., 2002

A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

2001
An autonomous system-based distribution system for web search.
Proceedings of the IEEE International Conference on Systems, 2001

2000
Global-local-global method for logical structure extraction of form document image.
J. Electronic Imaging, 2000

1999
Stress-Based and Path-Based Fault Injection.
IEEE Trans. Computers, 1999

High speed wireless data access based on combining EDGE with wideband OFDM.
IEEE Commun. Mag., 1999

Content-based Index and Retrieval Method of Chinese Document Images.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

New method for logical structure extraction of form document image.
Proceedings of the Document Recognition and Retrieval VI, 1999

1998
A new approach for intelligent object picking in line drawing images.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1993
GRPC: A Communication Cooperation Mechanism in Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1993

1992
A Mechanism of Process Group for Application Reliability in Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1992

1990
An Associated Object Model for Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1990


  Loading...