Lei Tang

According to our database1, Lei Tang
  • authored at least 107 papers between 1995 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
An Improved RANSAC for 3D Point Cloud Plane Segmentation Based on Normal Distribution Transformation Cells.
Remote Sensing, 2017

Semantic 3D Modeling Based on CityGML for Ancient Chinese-Style Architectural Roofs of Digital Heritage.
ISPRS Int. J. Geo-Information, 2017

A novel video-based system for in-air signature verification.
Computers & Electrical Engineering, 2017

2016
Online Finger-Writing Signature Verification on Mobile Device for Local Authentication.
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016

2015
User Identification Across Social Media.
TKDD, 2015

Guest Editorial Special Section on Energy Efficient Technology in Sensor Networks.
IEEE Trans. Industrial Informatics, 2015

Embracing Information Explosion without Choking: Clustering and Labeling in Microblogging.
IEEE Trans. Big Data, 2015

The performance of uplink LDPC-coded multirelay cooperation based on virtual V-BLAST processing.
Int. J. Communication Systems, 2015

Network-coding-based multisource multirelay LDPC-coded cooperative MIMO.
Trans. Emerging Telecommunications Technologies, 2015

Top-k Recommendation with Temporal Dynamics.
CoRR, 2015

A Tutorial Survey on Delivery of Service Data in Vehicular Ad-Hoc Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
What is Tumblr: a statistical overview and comparison.
SIGKDD Explorations, 2014

Enhancing Least-Squares Finite Element Methods Through a Quantity-of-Interest.
SIAM J. Numerical Analysis, 2014

Methodology and Tools for Pervasive Application Development.
IJDSN, 2014

A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services.
IEICE Transactions, 2014

What is Tumblr: A Statistical Overview and Comparison.
CoRR, 2014

Bundle recommendation in ecommerce.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

2013
LDPC-Coded Cooperation with Receive Multi-Antenna and Unknown CSI in the Destination.
Wireless Personal Communications, 2013

Study of Speed-Dependent Packet Error Rate for Wireless Sensor on Rotating Mechanical Structures.
IEEE Trans. Industrial Informatics, 2013

Island Coalescence Using Parallel First-Order System Least Squares on Incompressible Resistive Magnetohydrodynamics.
SIAM J. Scientific Computing, 2013

Hybrid First-Order System Least Squares Finite Element Methods with Application to Stokes Equations.
SIAM J. Numerical Analysis, 2013

A novel self-surviving architecture for next-generation OFDM passive optical network supporting colorless ONUs.
Photonic Network Communications, 2013

A Convex Formulation for Learning a Shared Predictive Structure from Multiple Tasks.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Learning with multi-resolution overlapping communities.
Knowl. Inf. Syst., 2013

An LDPC coded cooperative MIMO scheme over Rayleigh fading channels with unknown channel state information.
Journal of Zhejiang University - Science C, 2013

Joint iterative decoding for LDPC-coded multi-relay cooperation with receive multi-antenna in the destination.
IET Communications, 2013

Scaling matrix factorization for recommendation with randomness.
Proceedings of the 22nd International World Wide Web Conference, 2013

Exploiting social relations for sentiment analysis in microblogging.
Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 2013

2012
Scalable Learning of Collective Behavior.
IEEE Trans. Knowl. Data Eng., 2012

Identifying Evolving Groups in Dynamic Multimode Networks.
IEEE Trans. Knowl. Data Eng., 2012

Modeling blogger influence in a community.
Social Netw. Analys. Mining, 2012

Parallel adaptive mesh refinement for first-order system least squares.
Numerical Lin. Alg. with Applic., 2012

Community detection via heterogeneous interaction analysis.
Data Min. Knowl. Discov., 2012

Situation-Based Design: A Rapid Approach for Pervasive Application Development.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Optimizations for route discovery in asynchronous duty-cycling wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A Rotation Resistant Image Watermarking Algorithm via Circle.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Understanding online groups through social media.
Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery, 2011

Group Profiling for Understanding Social Structures.
ACM TIST, 2011

MHS: A Multimedia System for Improving Medication Adherence in Elderly Care.
IEEE Systems Journal, 2011

Efficiency Based Adaptive Local Refinement for First-Order System Least-Squares Formulations.
SIAM J. Scientific Computing, 2011

Supporting rapid design and evaluation of pervasive applications: challenges and solutions.
Personal and Ubiquitous Computing, 2011

Study on Low-Carbon Economy Model and Method of Chinese Tourism Industry.
IJAL, 2011

Leveraging social media networks for classification.
Data Min. Knowl. Discov., 2011

EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Spatio-temporal effects of bus arrival time information.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science 2011, 2011

Large-scale behavioral targeting with a social twist.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Enhancing accessibility of microblogging messages using semantic knowledge.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Community Detection and Mining in Social Media
Synthesis Lectures on Data Mining and Knowledge Discovery, Morgan & Claypool Publishers, 2010

Graph Mining Applications to Social Network Analysis.
Proceedings of the Managing and Mining Graph Data, 2010

A shared-subspace learning framework for multi-label classification.
TKDD, 2010

Toward Predicting Collective Behavior via Social Dimension Extraction.
IEEE Intelligent Systems, 2010

Study on bandwidth of Optical filter in beacon sub-system of Satellite Optical Communications.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

Column-based cluster and bar axis density in parallel coordinates.
Proceedings of the 2010 International Symposium on Visual Information Communication, 2010

A Social Network Analysis Approach to Detecting Suspicious Online Financial Activities.
Proceedings of the Advances in Social Computing, 2010

Adaptive prompting based on Petri Net in a Smart medication system.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Network quantification despite biased labels.
Proceedings of the Eighth Workshop on Mining and Learning with Graphs, 2010

A multi-resolution approach to learning with overlapping communities.
Proceedings of the 3rd Workshop on Social Network Mining and Analysis, 2010

Dimensionality reduction based on minimax risk criterion for face recognition.
Proceedings of the International Joint Conference on Neural Networks, 2010

Orthogonal linear local spline discriminant embedding for face recognition.
Proceedings of the International Joint Conference on Neural Networks, 2010

Dual Unsupervised Discriminant Projection for Face Recognition.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

Discovering Overlapping Groups in Social Media.
Proceedings of the ICDM 2010, 2010

2009
Cross-Validation.
Proceedings of the Encyclopedia of Database Systems, 2009

Bridging Taxonomic Semantics to Accurate Hierarchical Classification.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Using camouflaging mobility to protect privacy in mobile ad hoc networks.
Security and Communication Networks, 2009

Selective Message Forwarding in Delay Tolerant Networks.
MONET, 2009

Transmission error analysis and avoidance for IEEE 802.15.4 wireless sensors on rotating structures.
IJSNet, 2009

Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks.
IJITN, 2009

Large scale multi-label classification via metalabeler.
Proceedings of the 18th International Conference on World Wide Web, 2009

ADB: an efficient multihop broadcast protocol based on asynchronous duty-cycling in wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

An Efficiency-Based Adaptive Refinement Scheme Applied to Incompressible, Resistive Magnetohydrodynamics.
Proceedings of the Large-Scale Scientific Computing, 7th International Conference, 2009

Relational learning via latent social dimensions.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

On Multiple Kernel Learning with Multiple Labels.
Proceedings of the IJCAI 2009, 2009

A convex formulation for learning shared structures from multiple tasks.
Proceedings of the 26th Annual International Conference on Machine Learning, 2009

Uncoverning Groups via Heterogeneous Interaction Analysis.
Proceedings of the ICDM 2009, 2009

Scalable learning of collective behavior based on sparse social dimensions.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Topic taxonomy adaptation for group profiling.
TKDD, 2008

Privacy-preserving secure relative localization in vehicular networks.
Security and Communication Networks, 2008

Efficiency-based h- and hp-refinement strategies for finite element methods.
Numerical Lin. Alg. with Applic., 2008

Delay management in delay-tolerant networks.
Int. Journal of Network Management, 2008

Identifying the influential bloggers in a community.
Proceedings of the International Conference on Web Search and Web Data Mining, 2008

Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Community evolution in dynamic multi-mode networks.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Extracting shared subspace for multi-label classification.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

A locally-optimizing approach for multichannel assignment and routing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Transmission Error Avoidance for IEEE 802.15.4 Wireless Sensors on Rotating Structures.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Collaborated Camouflaging Mobility for Mobile Privacy.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Channel Characterization and Link Quality Assessment of IEEE 802.15.4-Compliant Radio for Factory Environments.
IEEE Trans. Industrial Informatics, 2007

A New Method for Infrared Weak Small Target Enhancement Based on Image Fusion.
Proceedings of the Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007

The Wavelet-based Contourlet Transform for Image Fusion.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wireless sensors on rotating structures: performance evaluation and radio link characterization.
Proceedings of the Second ACM Workshop on Wireless Network Testbeds, 2007

A Quality-Driven Algorithm for Resource Scheduling Based on Market Model on Grid.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

A Secure Data Transmission Scheme for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

Multiresolution image fusion based on the wavelet-based contourlet transform.
Proceedings of the 10th International Conference on Information Fusion, 2007

SMART: A selective controlled-flooding routing for delay tolerant networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

Integrity and its applications.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Improving Godunov-type reconstructions for simulation of vortex-dominated flows.
J. Comput. Physics, 2006

Secure Relative Location Determination in Vehicular Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Privacy-Preserving Quick Authentication in Fast Roaming Networks.
Proceedings of the LCN 2006, 2006

Acclimatizing taxonomic semantics for hierarchical content classification from semantics to data-driven taxonomy.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

2005
Upwind and central WENO schemes.
Applied Mathematics and Computation, 2005

Bias Analysis in Text Classification for Highly Skewed Data.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

2004
Using Maximum Entropy Model for Chinese Text Categorization.
Proceedings of the Advanced Web Technologies and Applications, 2004

1998
Uniformly Accurate Finite Difference Schemes for p-Refinement.
SIAM J. Scientific Computing, 1998

1996
A Framework for Building an Electronic Currency System.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

Methods for Encrypting and Decrypting MPEG Video Data Efficiently.
Proceedings of the Forth ACM International Conference on Multimedia '96, 1996

1995
A Set of Protocols for Micropayments in Distributed Systems.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995


  Loading...