According to our database1, Lei Tang
Legend:Book In proceedings Article PhD thesis Other
Information Divergence-Based Matching Strategy for Online Signature Verification.
IEEE Trans. Information Forensics and Security, 2018
A novel video-based system for in-air signature verification.
Computers & Electrical Engineering, 2017
Online Finger-Writing Signature Verification on Mobile Device for Local Authentication.
Proceedings of the Biometric Recognition - 11th Chinese Conference, 2016
Guest Editorial Special Section on Energy Efficient Technology in Sensor Networks.
IEEE Trans. Industrial Informatics, 2015
The performance of uplink LDPC-coded multirelay cooperation based on virtual V-BLAST processing.
Int. J. Communication Systems, 2015
Network-coding-based multisource multirelay LDPC-coded cooperative MIMO.
Trans. Emerging Telecommunications Technologies, 2015
Top-k Recommendation with Temporal Dynamics.
What is Tumblr: a statistical overview and comparison.
SIGKDD Explorations, 2014
Enhancing Least-Squares Finite Element Methods Through a Quantity-of-Interest.
SIAM J. Numerical Analysis, 2014
A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services.
IEICE Transactions, 2014
What is Tumblr: A Statistical Overview and Comparison.
Bundle recommendation in ecommerce.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
LDPC-Coded Cooperation with Receive Multi-Antenna and Unknown CSI in the Destination.
Wireless Personal Communications, 2013
Study of Speed-Dependent Packet Error Rate for Wireless Sensor on Rotating Mechanical Structures.
IEEE Trans. Industrial Informatics, 2013
Island Coalescence Using Parallel First-Order System Least Squares on Incompressible Resistive Magnetohydrodynamics.
SIAM J. Scientific Computing, 2013
Hybrid First-Order System Least Squares Finite Element Methods with Application to Stokes Equations.
SIAM J. Numerical Analysis, 2013
A novel self-surviving architecture for next-generation OFDM passive optical network supporting colorless ONUs.
Photonic Network Communications, 2013
A Convex Formulation for Learning a Shared Predictive Structure from Multiple Tasks.
IEEE Trans. Pattern Anal. Mach. Intell., 2013
An LDPC coded cooperative MIMO scheme over Rayleigh fading channels with unknown channel state information.
Journal of Zhejiang University - Science C, 2013
Joint iterative decoding for LDPC-coded multi-relay cooperation with receive multi-antenna in the destination.
IET Communications, 2013
Scaling matrix factorization for recommendation with randomness.
Proceedings of the 22nd International World Wide Web Conference, 2013
Parallel adaptive mesh refinement for first-order system least squares.
Numerical Lin. Alg. with Applic., 2012
Optimizations for route discovery in asynchronous duty-cycling wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
A Rotation Resistant Image Watermarking Algorithm via Circle.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Efficiency Based Adaptive Local Refinement for First-Order System Least-Squares Formulations.
SIAM J. Scientific Computing, 2011
Study on Low-Carbon Economy Model and Method of Chinese Tourism Industry.
EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011
PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Spatio-temporal effects of bus arrival time information.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science 2011, 2011
Large-scale behavioral targeting with a social twist.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
A shared-subspace learning framework for multi-label classification.
Study on bandwidth of Optical filter in beacon sub-system of Satellite Optical Communications.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010
Column-based cluster and bar axis density in parallel coordinates.
Proceedings of the 2010 International Symposium on Visual Information Communication, 2010
Dimensionality reduction based on minimax risk criterion for face recognition.
Proceedings of the International Joint Conference on Neural Networks, 2010
Orthogonal linear local spline discriminant embedding for face recognition.
Proceedings of the International Joint Conference on Neural Networks, 2010
Dual Unsupervised Discriminant Projection for Face Recognition.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
Using camouflaging mobility to protect privacy in mobile ad hoc networks.
Security and Communication Networks, 2009
Selective Message Forwarding in Delay Tolerant Networks.
Transmission error analysis and avoidance for IEEE 802.15.4 wireless sensors on rotating structures.
Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks.
Large scale multi-label classification via metalabeler.
Proceedings of the 18th International Conference on World Wide Web, 2009
ADB: an efficient multihop broadcast protocol based on asynchronous duty-cycling in wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
An Efficiency-Based Adaptive Refinement Scheme Applied to Incompressible, Resistive Magnetohydrodynamics.
Proceedings of the Large-Scale Scientific Computing, 7th International Conference, 2009
On Multiple Kernel Learning with Multiple Labels.
Proceedings of the IJCAI 2009, 2009
A convex formulation for learning shared structures from multiple tasks.
Proceedings of the 26th Annual International Conference on Machine Learning, 2009
Privacy-preserving secure relative localization in vehicular networks.
Security and Communication Networks, 2008
Efficiency-based h- and hp-refinement strategies for finite element methods.
Numerical Lin. Alg. with Applic., 2008
Delay management in delay-tolerant networks.
Int. Journal of Network Management, 2008
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Extracting shared subspace for multi-label classification.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008
A locally-optimizing approach for multichannel assignment and routing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Transmission Error Avoidance for IEEE 802.15.4 Wireless Sensors on Rotating Structures.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
Collaborated Camouflaging Mobility for Mobile Privacy.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Channel Characterization and Link Quality Assessment of IEEE 802.15.4-Compliant Radio for Factory Environments.
IEEE Trans. Industrial Informatics, 2007
A New Method for Infrared Weak Small Target Enhancement Based on Image Fusion.
Proceedings of the Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007
The Wavelet-based Contourlet Transform for Image Fusion.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Wireless sensors on rotating structures: performance evaluation and radio link characterization.
Proceedings of the Second ACM Workshop on Wireless Network Testbeds, 2007
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007
Multiresolution image fusion based on the wavelet-based contourlet transform.
Proceedings of the 10th International Conference on Information Fusion, 2007
SMART: A selective controlled-flooding routing for delay tolerant networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007
Integrity and its applications.
Proceedings of the 45th Annual Southeast Regional Conference, 2007
Improving Godunov-type reconstructions for simulation of vortex-dominated flows.
J. Comput. Physics, 2006
Secure Relative Location Determination in Vehicular Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Privacy-Preserving Quick Authentication in Fast Roaming Networks.
Proceedings of the LCN 2006, 2006
Upwind and central WENO schemes.
Applied Mathematics and Computation, 2005
Using Maximum Entropy Model for Chinese Text Categorization.
Proceedings of the Advanced Web Technologies and Applications, 2004
Uniformly Accurate Finite Difference Schemes for p-Refinement.
SIAM J. Scientific Computing, 1998
A Framework for Building an Electronic Currency System.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Methods for Encrypting and Decrypting MPEG Video Data Efficiently.
Proceedings of the Forth ACM International Conference on Multimedia '96, 1996
A Set of Protocols for Micropayments in Distributed Systems.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995