Hongbin Xu

According to our database1, Hongbin Xu authored at least 25 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Constellation-Overlapping-Based Secure Transmission for Two-Way Untrusted Relaying: Method, Implementation, and Experimental Results.
IEEE Wirel. Commun. Lett., 2021

Self-supervised Multi-view Stereo via Effective Co-Segmentation and Data-Augmentation.
CoRR, 2021

Pareto-Based Bi-indicator Infill Sampling Criterion for Expensive Multiobjective Optimization.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2021

2020
Research on Automatic Target Detection and Recognition System Based on Deep Learning Algorithm.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming.
IEEE Trans. Veh. Technol., 2019

Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback.
IEEE Trans. Veh. Technol., 2019

High Precision, Small Size and Flexible FBG Strain Sensor for Slope Model Monitoring.
Sensors, 2019

A Highly Integrated BOTDA/XFG Sensor on a Single Fiber for Simultaneous Multi-Parameter Monitoring of Slopes.
Sensors, 2019

A High Precision Fiber Bragg Grating Inclination Sensor for Slope Monitoring.
J. Sensors, 2019

End-effector with a bite mode for harvesting citrus fruit in random stalk orientation environment.
Comput. Electron. Agric., 2019

Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping.
IEEE Trans. Wirel. Commun., 2018

Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation.
IEEE Trans. Veh. Technol., 2018

Towards Enhanced Security for Two-Way Untrusted Relaying Systems: A Constellation Overlapping Scheme.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Two-level interactive identification and derivation of topic clusters in complex networks.
World Wide Web, 2015

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach.
IEEE Commun. Lett., 2015

2014
Mapping regional changes in the glycerophosphocholine second messenger lipidome following brain injury using CIRCOS.
Proceedings of the International Work-Conference on Bioinformatics and Biomedical Engineering, 2014

Control strategies for four in-wheel driven electric vehicles when motor drive systems fail.
Proceedings of the American Control Conference, 2014

2013
Visualization and Phospholipid Identification (VaLID): online integrated search engine capable of identifying and visualizing glycerophospholipids with given mass.
Bioinform., 2013

2012
A Nonlinear Adaptive Beamforming Algorithm Based on Least Squares Support Vector Regression.
Sensors, 2012

Spatial and Temporal Correlations-Based Routing Algorithm in Intermittent Connectivity Human Social Network.
Int. J. Distributed Sens. Networks, 2012

2006
Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006


  Loading...