Kun Bai

Orcid: 0000-0003-4716-3774

According to our database1, Kun Bai authored at least 95 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Variable Stiffness Spherical Joint Motor by Magnetic Energy Shaping.
IEEE Trans. Robotics, 2024

A Trap Characterization System for GaN HEMTs Based on Transient Drain Voltage.
IEEE Trans. Instrum. Meas., 2024

2023
Tactile Sensing for Soft Robotic Manipulators in 50 MPa Hydrostatic Pressure Environments.
Adv. Intell. Syst., December, 2023

Regulation and Tracking Control of Omnidirectional Rotation for Spherical Motors.
IEEE Trans. Ind. Electron., 2023

A numerical calibration of structure-function transient thermal measurement based on Cauer RC network.
Microelectron. J., 2023

2022
An Enhanced Image Patch Tensor Decompostion for Infrared Small Target Detection.
Remote. Sens., December, 2022

Spherical Wrist With Hybrid Motion-Impedance Control for Enhanced Robotic Manipulations.
IEEE Trans. Robotics, 2022

Remote sensing images destriping with an enhanced low-rank prior and total variation regulation.
Signal Image Video Process., 2022

AFINet: Attentive Feature Integration Networks for image classification.
Neural Networks, 2022

GSL4Rec: Session-based Recommendations with Collective Graph Structure Learning and Next Interaction Prediction.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

ACE: A Coarse-to-Fine Learning Framework for Reliable Representation Learning Against Label Noise.
Proceedings of the International Joint Conference on Neural Networks, 2022

Contrastive Multi-view Hyperbolic Hierarchical Clustering.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Energy Gradient Descent Method for Actuation of a Direct-Drive Spherical Robotic Wrist.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Uncertainty-Aware Learning against Label Noise on Imbalanced Datasets.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Domain adaptation with feature and label adversarial networks.
Neurocomputing, 2021

MultiFace: A generic training mechanism for boosting face recognition performance.
Neurocomputing, 2021

Introduction to the focused section on new trends in modelling and simulation for intelligent robotics.
Int. J. Intell. Robotics Appl., 2021

AFINet: Attentive Feature Integration Networks for Image Classification.
CoRR, 2021

MultiFace: A Generic Training Mechanism for Boosting Face Recognition Performance.
CoRR, 2021

Why Attentions May Not Be Interpretable?
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

2020
Relation-Guided Representation Learning.
Neural Networks, 2020

Distributed current source modeling method for 3D eddy current problem in magnetic conductor with discrete state-space J-<i>φ</i> formulation.
J. Comput. Phys., 2020

Reliable Evaluations for Natural Language Inference based on a Unified Cross-dataset Benchmark.
CoRR, 2020

Domain Agnostic Learning for Unbiased Authentication.
CoRR, 2020

Hybrid Differentially Private Federated Learning on Vertically Partitioned Data.
CoRR, 2020

A Federated Multi-View Deep Learning Framework for Privacy-Preserving Recommendations.
CoRR, 2020

Why is Attention Not So Attentive?
CoRR, 2020

CSRN: Collaborative Sequential Recommendation Networks for News Retrieval.
CoRR, 2020

Read, Attend, and Exclude: Multi-Choice Reading Comprehension by Mimicking Human Reasoning Process.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Multi-Level Multimodal Transformer Network for Multimodal Recipe Comprehension.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Fisher Deep Domain Adaptation.
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

General-Purpose User Embeddings based on Mobile App Usage.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Adversarial Infidelity Learning for Model Interpretation.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Demographics Should Not Be the Reason of Toxicity: Mitigating Discrimination in Text Classifications with Instance Weighting.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Multiparameter Eddy-Current Sensor Design for Conductivity Estimation and Simultaneous Distance and Thickness Measurements.
IEEE Trans. Ind. Informatics, 2019

Mitigating Annotation Artifacts in Natural Language Inference Datasets to Improve Cross-dataset Generalization Ability.
CoRR, 2019

Scale Matters: Temporal Scale Aggregation Network for Precise Action Localization in Untrimmed Videos.
CoRR, 2019

A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve.
IEEE Access, 2019

Improving Open-Domain Dialogue Systems via Multi-Turn Incomplete Utterance Restoration.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Additive Adversarial Learning for Unbiased Authentication.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

State-space Model and Analysis of Motion-induced Eddy-current based on Distributed Current Source Method.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2019

Selection Bias Explorations and Debias Methods for Natural Language Sentence Matching Datasets.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

Compressing Recurrent Neural Networks with Tensor Ring for Action Recognition.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Crowdsourcing for Mobile Networks and IoT.
Wirel. Commun. Mob. Comput., 2018

Design and Development of a Spherical Motor for Conformal Printing of Curved Electronics.
IEEE Trans. Ind. Electron., 2018

Inverse Models and Harmonics Compensation for Suppressing Torque Ripples of Multiphase Permanent Magnet Motor.
IEEE Trans. Ind. Electron., 2018

Soft human-machine interfaces: design, sensing and stimulation.
Int. J. Intell. Robotics Appl., 2018

Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks.
IEEE Commun. Mag., 2018

Structured Inference for Recurrent Hidden Semi-markov Model.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Improving Reinforcement Learning Based Image Captioning with Natural Language Prior.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Distributed Parameter Element Method for Design Analysis of Electrical Muscle Stimulation.
Proceedings of the 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2018

2017
MeDJ: Multidimensional Emotion-aware Music Delivery for Adolescent.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

2016
Automation and orchestration framework for large-scale enterprise cloud migration.
IBM J. Res. Dev., 2016

Patch similarity based edge-preserving background estimation for single frame infrared small target detection.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Identifying resources for cloud garbage collection.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Design of a compliant knee-motion actuator for lower extremity exoskeletons.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2016

2015
Automated business application discovery.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Analytical development of a minimum bearing reaction twin-motor for duplex machining.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
Improving readiness for enterprise migration to the cloud.
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

Thermal field modeling algorithm based on flexible space division for high-power, high-precision mechatronic systems.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014

2013
What to discover before migrating to the cloud.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Magnetic field model for direct field-feedback control of a permanent magnet spherical motor.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A Novel Method for Modeling RFID Data.
J. Softw., 2012

A two-mode six-DOF motion system based on a ball-joint-like spherical motor for haptic applications.
Comput. Math. Appl., 2012

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
Proceedings of the Information Security and Privacy Research, 2012

2011
Context-Related Access Control for Mobile Caching.
Proceedings of the Security and Privacy in Communication Networks, 2011

An Efficient Pre-processing Method to Identify Logical Components from PDF Documents.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Direct field-feedback control for multi-DOF spherical actuators.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Magnetic field-based sensing method for spherical joint.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010

Slosh suppression by robust input shaping.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
Magnetic dipoles for electromagnetic multi-DOF actuator design.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009

2008
Research on T-bridge Algorithm of Web Session Fuzzy Clustering.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

Real-time data pre-processing technique for efficient feature extraction in large scale datasets.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Automatic Extraction of Table Metadata from Digital Documents.
Bull. IEEE Tech. Comm. Digit. Libr., 2007

Automatic searching of tables in digital libraries.
Proceedings of the 16th International Conference on World Wide Web, 2007

TableSeer: automatic table metadata extraction and searching in digital libraries.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

Searching for Tables in Digital Documents.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

TableRank: A Ranking Algorithm for Table Search and Retrieval.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Modeling of pollution in p2p file sharing systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Towards Database Firewall: Mining the Damage Spreading Patterns.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005


  Loading...