Kai Chen

According to our database1, Kai Chen authored at least 108 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


DECODE: Deep Confidence Network for Robust Image Classification.
IEEE Trans. Image Processing, 2019

Effective Improvement of Under-Modeling Frequency-Domain Kalman Filter.
IEEE Signal Process. Lett., 2019

Multi-scale aggregation network for temporal action proposals.
Pattern Recognition Letters, 2019

Optimized projection for hashing.
Pattern Recognition Letters, 2019

Multi-owner Secure Encrypted Search Using Searching Adversarial Networks.
IACR Cryptology ePrint Archive, 2019

Multi-client Secure Encrypted Search Using Searching Adversarial Networks.
IACR Cryptology ePrint Archive, 2019

The Einstein-Podolsky-Rosen Steering and Its Certification.
Entropy, 2019

An Effective ABC-SVM Approach for Surface Roughness Prediction in Manufacturing Processes.
Complexity, 2019

Tetrahymena Comparative Genomics Database (TCGD): a community resource for Tetrahymena.
Database, 2019

An Integrated Deep Learning Framework for Occluded Pedestrian Tracking.
IEEE Access, 2019

Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network.
IEEE Access, 2019

Resilient Disaggregated Network Flow Monitoring.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Congestion-Aware Dynamic Elevator Assignment for Partially Connected 3D-NoCs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

URSA: Hybrid Block Storage for Cloud-Scale Virtual Disks.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Information Forensics and Security, 2018

Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification.
Security and Communication Networks, 2018

Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning.
POMACS, 2018

Dynamic vacuum pressure tracking control with high-speed on-off valves.
J. Systems & Control Engineering, 2018

A hybrid approach combining an extended BBO algorithm with an intuitionistic fuzzy entropy weight method for QoS-aware manufacturing service supply chain optimization.
Neurocomputing, 2018

An Efficient Reversible Data Hiding Scheme for Encrypted Images.
IJDCF, 2018

DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecurity, 2018

Standards News.
IEEE Communications Standards Magazine, 2018

A New Shape Matching-Based Verification Approach for QPFs.
IEEE Access, 2018

Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning.
Proceedings of the Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems, 2018

FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2018

Self-Localization of Parking Robots Using Square-Like Landmarks.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Exploration of a Multi-Device Smart Calendar Platform for Smart Homes.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Flexible ranking extreme learning machine based on matrix-centering transformation.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

RLS-Based Adaptive Dereverberation Tracing Abrupt Position Change of Target Speaker.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Frequency Domain Trinicon-Based Blind Source Separation Method with Multi-Source Activity Detection for Sparsely Mixed Signals.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Heterogeneous subgraph features for information networks.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA), 2018

A System Design for Virtual Reality Visualization of Medical Image.
Proceedings of the 26th International Conference on Geoinformatics, 2018

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Optimizing Video Object Detection via a Scale-Time Lattice.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

A Large Scale Analysis of DNS Water Torture Attack.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

A Novel Feature Selection-Based Sequential Ensemble Learning Method for Class Noise Detection in High-Dimensional Data.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Energy-Efficient Web Server Load Balancing.
IEEE Systems Journal, 2017

Convergence analysis of the modified frequency-domain block LMS algorithm with guaranteed optimal steady state performance.
Signal Processing, 2017

Characterizing the Growth Patterns of 45 Major Metropolitans in Mainland China Using DMSP/OLS Data.
Remote Sensing, 2017

Geospatial characteristics of measles transmission in China during 2005-2014.
PLoS Computational Biology, 2017

Attribute-based supervised deep learning model for action recognition.
Frontiers Comput. Sci., 2017

Scheduling optimization of yard cranes with minimal energy consumption at container terminals.
Computers & Industrial Engineering, 2017

Power Modelling for Heterogeneous Cloud-Edge Data Centers.
Proceedings of the Parallel Computing is Everywhere, 2017

Discover and Learn New Objects from Documentaries.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

Trust-Aware and Location-Based Collaborative Filtering for Web Service QoS Prediction.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

What should we do? A structured review of SCADA system cyber security standards.
Proceedings of the 4th International Conference on Control, 2017

Modeling of electromagnetic torque considering saturation and magnetic field harmonics in permanent magnet synchronous motor for HEV.
Simulation Modelling Practice and Theory, 2016

A fuzzy TOPSIS for assessing higher vocational education development levels in uncertainty environments.
Journal of Intelligent and Fuzzy Systems, 2016

HITSZ_CDR: an end-to-end chemical and disease relation extraction system for BioCreative V.
Database, 2016

Moving Object Counting Using a Tripwire in H.265/HEVC Bitstreams for Video Surveillance.
IEEE Access, 2016

Learning to Discover Subsumptions between Software Engineering Concepts in Wikipedia.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Building a Domain Knowledge Base from Wikipedia: a Semi-supervised Approach.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Frequent Subgraph Based Familial Classification of Android Malware.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Planning with Task-Oriented Knowledge Acquisition for a Service Robot.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Automatic invalid Landsat image pixel screening on the Google Earth engine platform.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Computational representation and annotation system for Cognitive Construction Grammar.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2016

Fuzzy entropy based multilevel image thresholding using modified gravitational search algorithm.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Effective Candidate Component Extraction for Text Localization in Born-Digital Images by Combining Text Contours and Stroke Interior Regions.
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016

Dependency-based convolutional neural network for drug-drug interaction extraction.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Preface to special issue on miscellaneous emerging security problems.
ICST Trans. Security Safety, 2015

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network.
J. Sensors, 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
JCM, 2015

2D facial landmark model design by combining key points and inserted points.
Expert Syst. Appl., 2015

Current source model of combinational logic gates for accurate gate-level circuit analysis and timing analysis.
Proceedings of the VLSI Design, Automation and Test, 2015

Research on the High Penetration Alerting of GMR.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Simulation method for multi-machine and multi-task production scheduling in steelmaking-continuous casting process.
Proceedings of the 10th System of Systems Engineering Conference, SoSE 2015, 2015

A Pt/Au hybrid self-actuating nanorobot towards to durg delivery system.
Proceedings of the 10th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2015

Completely Separable Reversible Data Hiding in Encrypted Images.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Efficient text localization in born-digital images by local contrast-based segmentation.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015

Improving Energy Efficiency of Web Servers by Using a Load Distribution Algorithm and Shutting Down Idle Nodes.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Neural network based over-segmentation for scene text recognition.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

Evidence-based SVM fusion for 3D model retrieval.
Multimedia Tools Appl., 2014

Efficient Mean-Shift Tracking Using an Improved Weighted Histogram Scheme.
TIIS, 2014

The Intelligent Techniques in Robot KeJia - The Champion of RoboCup@Home 2014.
Proceedings of the RoboCup 2014: Robot World Cup XVIII [papers from the 18th Annual RoboCup International Symposium, 2014

A HIL Simulation Platform for Locomotive Adhesion Control.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

A communication protocol of man overboard system based on BeiDou.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Home-based tele-assisted robotic rehabilitation of joint impairments in children with cerebral palsy.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters.
JSW, 2013

Mining succinct and high-coverage API usage patterns from source code.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

A 3.4mW photovoltaic energy-harvesting charger with integrated maximum power point tracking and battery management.
Proceedings of the 2013 IEEE International Solid-State Circuits Conference, 2013

Hybrid Page Segmentation with Efficient Whitespace Rectangles Extraction and Grouping.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Existence of Periodic Solutions for a Class of Asymptotically p-Linear Discrete Systems Involving p-Laplacian.
J. Applied Mathematics, 2012

Leveraging Exemplar and Saliency Model for Image Search Reranking.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Square-root adaptive cubature Kalman filter with application to spacecraft attitude estimation.
Proceedings of the 15th International Conference on Information Fusion, 2012

Improved Solution to TCP Incast Problem in Data Center Networks.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Fatigue life analysis for butterfly-shaped cervical spine plates.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Machine Learning on Congestion Analysis Based Real-Time Navigation System.
International Journal on Artificial Intelligence Tools, 2011

Fast Normalized Cross-Correlation enhanced floating car data estimation.
Proceedings of the 20th Annual Wireless and Optical Communications Conference, 2011

Visual Recognition Using Density Adaptive Clustering.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Cellular network location estimation via RSS-based data clean enhanced scheme.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Analytical model of initial fluid infusion by a microneedle drug delivery system.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

Study on the Software Collaboration Framework Based on Internetware.
Computer and Information Science, 2010

Ovarian cancer classification based on dimensionality reduction for SELDI-TOF data.
BMC Bioinformatics, 2010

Energy-Efficient Clustering Rumor Routing Protocol for Wireless Sensor Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Material level detection and optimum control of BBD coal mill.
Proceedings of the Sixth International Conference on Natural Computation, 2010

A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Course Optimization Based on Improved Immune Genetic Algorithm.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Research on Web2.0 System Design Based on CAS Theory.
Proceedings of the Complex Sciences, 2009

A Data Classifier Based on TOPSIS Method.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Optimal Path Planning for Minimizing Disturbance of Space Robot.
Proceedings of the Ninth International Conference on Control, 2006

Stage based parallel programming model for high concurrency, stateful network services: internals and design principles.
IJHPCN, 2005

Mining Frequent Closed Itemsets Without Candidate Generation.
Proceedings of the Parallel and Distributed Processing and Applications, 2005