Kun Bai

According to our database1, Kun Bai authored at least 51 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Multiparameter Eddy-Current Sensor Design for Conductivity Estimation and Simultaneous Distance and Thickness Measurements.
IEEE Trans. Industrial Informatics, 2019

A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve.
IEEE Access, 2019

2018
Crowdsourcing for Mobile Networks and IoT.
Wireless Communications and Mobile Computing, 2018

Design and Development of a Spherical Motor for Conformal Printing of Curved Electronics.
IEEE Trans. Industrial Electronics, 2018

Inverse Models and Harmonics Compensation for Suppressing Torque Ripples of Multiphase Permanent Magnet Motor.
IEEE Trans. Industrial Electronics, 2018

Soft human-machine interfaces: design, sensing and stimulation.
IJIRA, 2018

Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks.
IEEE Communications Magazine, 2018

Structured Inference for Recurrent Hidden Semi-markov Model.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Improving Reinforcement Learning Based Image Captioning with Natural Language Prior.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Distributed Parameter Element Method for Design Analysis of Electrical Muscle Stimulation.
Proceedings of the 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2018

2017
MeDJ: Multidimensional Emotion-aware Music Delivery for Adolescent.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

2016
Automation and orchestration framework for large-scale enterprise cloud migration.
IBM Journal of Research and Development, 2016

Patch similarity based edge-preserving background estimation for single frame infrared small target detection.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Identifying resources for cloud garbage collection.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Design of a compliant knee-motion actuator for lower extremity exoskeletons.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2016

2015
Automated business application discovery.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Analytical development of a minimum bearing reaction twin-motor for duplex machining.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
Improving readiness for enterprise migration to the cloud.
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

Thermal field modeling algorithm based on flexible space division for high-power, high-precision mechatronic systems.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2014

2013
What to discover before migrating to the cloud.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Magnetic field model for direct field-feedback control of a permanent magnet spherical motor.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A Novel Method for Modeling RFID Data.
JSW, 2012

A two-mode six-DOF motion system based on a ball-joint-like spherical motor for haptic applications.
Computers & Mathematics with Applications, 2012

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
Proceedings of the Information Security and Privacy Research, 2012

2011
Context-Related Access Control for Mobile Caching.
Proceedings of the Security and Privacy in Communication Networks, 2011

An Efficient Pre-processing Method to Identify Logical Components from PDF Documents.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Direct field-feedback control for multi-DOF spherical actuators.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Magnetic field-based sensing method for spherical joint.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010

Slosh suppression by robust input shaping.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
Magnetic dipoles for electromagnetic multi-DOF actuator design.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009

2008
Research on T-bridge Algorithm of Web Session Fuzzy Clustering.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

Real-time data pre-processing technique for efficient feature extraction in large scale datasets.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Automatic searching of tables in digital libraries.
Proceedings of the 16th International Conference on World Wide Web, 2007

TableSeer: automatic table metadata extraction and searching in digital libraries.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

Searching for Tables in Digital Documents.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

TableRank: A Ranking Algorithm for Table Search and Retrieval.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Automatic extraction of table metadata from digital documents.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2006

Towards Database Firewall: Mining the Damage Spreading Patterns.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005


  Loading...