Hongbin Xu

According to our database1, Hongbin Xu authored at least 25 papers between 2006 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results.
IEEE Wirel. Commun. Lett., 2021

Self-supervised Multi-view Stereo via Effective Co-Segmentation and Data-Augmentation.
CoRR, 2021

Pareto-Based Bi-indicator Infill Sampling Criterion for Expensive Multiobjective Optimization.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2021

Research on Automatic Target Detection and Recognition System Based on Deep Learning Algorithm.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming.
IEEE Trans. Veh. Technol., 2019

Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback.
IEEE Trans. Veh. Technol., 2019

High Precision, Small Size and Flexible FBG Strain Sensor for Slope Model Monitoring.
Sensors, 2019

A Highly Integrated BOTDA/XFG Sensor on a Single Fiber for Simultaneous Multi-Parameter Monitoring of Slopes.
Sensors, 2019

A High Precision Fiber Bragg Grating Inclination Sensor for Slope Monitoring.
J. Sensors, 2019

End-effector with a bite mode for harvesting citrus fruit in random stalk orientation environment.
Comput. Electron. Agric., 2019

Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping.
IEEE Trans. Wirel. Commun., 2018

Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation.
IEEE Trans. Veh. Technol., 2018

Towards Enhanced Security for Two-Way Untrusted Relaying Systems: A Constellation Overlapping Scheme.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.
IEEE Trans. Inf. Forensics Secur., 2017

Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Two-level interactive identification and derivation of topic clusters in complex networks.
World Wide Web, 2015

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach.
IEEE Commun. Lett., 2015

Mapping regional changes in the glycerophosphocholine second messenger lipidome following brain injury using CIRCOS.
Proceedings of the International Work-Conference on Bioinformatics and Biomedical Engineering, 2014

Control strategies for four in-wheel driven electric vehicles when motor drive systems fail.
Proceedings of the American Control Conference, 2014

Visualization and Phospholipid Identification (VaLID): online integrated search engine capable of identifying and visualizing glycerophospholipids with given mass.
Bioinform., 2013

A Nonlinear Adaptive Beamforming Algorithm Based on Least Squares Support Vector Regression.
Sensors, 2012

Spatial and Temporal Correlations-Based Routing Algorithm in Intermittent Connectivity Human Social Network.
Int. J. Distributed Sens. Networks, 2012

Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006