Meng Han

According to our database1, Meng Han authored at least 203 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Minimizing the cost of periodically replicated systems via model and quantitative analysis.
Frontiers Comput. Sci., October, 2024

Adaptive Quality Control With Uncertainty for a Pharmaceutical Cyber-Physical System Based on Data and Knowledge Integration.
IEEE Trans. Ind. Informatics, March, 2024

Disperse Asymmetric Subspace Relation Hashing for Cross-Modal Retrieval.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Dual-View Curricular Optimal Transport for Cross-Lingual Cross-Modal Retrieval.
IEEE Trans. Image Process., 2024

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective.
CoRR, 2024

2023
Efficient Sparse Bayesian Channel Estimation for Near-Field Ultra-Scale Massive MIMO Systems.
IEEE Wirel. Commun. Lett., December, 2023

Event-Triggered Positive Filter Design for Positive Polynomial Fuzzy Systems via Premise Integration and Membership-Function-Dependent Methods.
IEEE Trans. Fuzzy Syst., November, 2023

QuickFPS: Architecture and Algorithm Co-Design for Farthest Point Sampling in Large-Scale Point Clouds.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023

A novel Jinnan individual cattle recognition approach based on mutual attention learning scheme.
Expert Syst. Appl., November, 2023

Lightweight zero-knowledge authentication scheme for IoT embedded devices.
Comput. Networks, November, 2023

High utility pattern mining algorithm over data streams using ext-list.
Appl. Intell., November, 2023

A Weighted Ensemble Classification Algorithm Based on Nearest Neighbors for Multi-Label Data Stream.
ACM Trans. Knowl. Discov. Data, June, 2023

Hybrid Beamforming With Sub-Connected Structure for MmWave Massive Multi-User MIMO Relay Systems.
IEEE Trans. Green Commun. Netw., June, 2023

FCHM-stream: fast closed high utility itemsets mining over data streams.
Knowl. Inf. Syst., June, 2023

Mining closed high utility patterns with negative utility in dynamic databases.
Appl. Intell., May, 2023

Prevention method of block withholding attack based on miners' mining behavior in blockchain.
Appl. Intell., May, 2023

A multi-level weighted concept drift detection method.
J. Supercomput., March, 2023

A survey of multi-label classification based on supervised and semi-supervised learning.
Int. J. Mach. Learn. Cybern., March, 2023

Dynamic ensemble selection classification algorithm based on window over imbalanced drift data stream.
Knowl. Inf. Syst., March, 2023

An efficient algorithm for mining closed high utility itemsets over data streams with one dataset scan.
Knowl. Inf. Syst., January, 2023

TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network.
Sensors, 2023

A survey of multi-class imbalanced data classification methods.
J. Intell. Fuzzy Syst., 2023

Label embedding asymmetric discrete hashing for efficient cross-modal retrieval.
Eng. Appl. Artif. Intell., 2023

Dual-view Curricular Optimal Transport for Cross-lingual Cross-modal Retrieval.
CoRR, 2023

FuseFPS: Accelerating Farthest Point Sampling with Fusing KD-tree Construction for Point Clouds.
CoRR, 2023

Uncovering Promises and Challenges of Federated Learning to Detect Cardiovascular Diseases: A Scoping Literature Review.
CoRR, 2023

Deep Reinforcement Learning-driven Cross-Community Energy Interaction Optimal Scheduling.
CoRR, 2023

Privacy-Enhancing Technologies in Federated Learning for the Internet of Healthcare Things: A Survey.
CoRR, 2023

ATA-Cache: Contention Mitigation for GPU Shared L1 Cache with Aggregated Tag Array.
CoRR, 2023

ReDas: Supporting Fine-Grained Reshaping and Multiple Dataflows on Systolic Array.
CoRR, 2023

Data-Driven Distributionally Robust Scheduling of Community Integrated Energy Systems with Uncertain Renewable Generations Considering Integrated Demand Response.
CoRR, 2023

Scribble-Based 3D Multiple Abdominal Organ Segmentation via Triple-Branch Multi-Dilated Network with Pixel- and Class-Wise Consistency.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Intrusion Detection System for IoHT Devices using Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Design of Underwater Vehicle for Ship Draft Observation.
Proceedings of the 9th International Conference on Mechatronics and Robotics Engineering, 2023

FairShare: An Incentive-Based Fairness-Aware Data Sharing Framework for Federated Learning.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

Adversarial Attacks on Skeleton-Based Sign Language Recognition.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

IAG: Induction-Augmented Generation Framework for Answering Reasoning Questions.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Argue with Me Tersely: Towards Sentence-Level Counter-Argument Generation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Hi-ArG: Exploring the Integration of Hierarchical Argumentation Graphs in Language Pretraining.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Contrastive Learning for Rumor Detection via Fitting Beta Mixture Model.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

PerCBA: Persistent Clean-label Backdoor Attacks on Semi-Supervised Graph Node Classification.
Proceedings of the IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL 2023) co-located with the 32nd International Joint Conference on Artificial Intelligence(IJCAI2023), 2023

Hence, Socrates is mortal: A Benchmark for Natural Language Syllogistic Reasoning.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Query Structure Modeling for Inductive Logical Reasoning Over Knowledge Graphs.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Estimation of Domain of Attraction for Discrete-Time Positive Interval Type-2 Polynomial Fuzzy Systems With Input Saturation.
IEEE Trans. Fuzzy Syst., 2022

Stabilization Analysis and Impulsive Controller Design for Positive Interval Type-2 Polynomial Fuzzy Systems.
IEEE Trans. Fuzzy Syst., 2022

FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners.
Sensors, 2022

A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems.
Sensors, 2022

A Novel Improved YOLOv3-SC Model for Individual Pig Detection.
Sensors, 2022

Utility-Oriented Computation Scheduling for Energy-Efficient Mobile Edge Computing Networks.
IEEE Open J. Comput. Soc., 2022

An overview of high utility itemsets mining methods based on intelligent optimization algorithms.
Knowl. Inf. Syst., 2022

Incrementally updating high utility quantitative itemsets mining algorithm.
J. Intell. Fuzzy Syst., 2022

Review of ensemble classification over data streams based on supervised and semi-supervised.
J. Intell. Fuzzy Syst., 2022

Interval type-2 T-S fuzzy MPC for CPS under hybrid attacks over a multi-channel framework.
J. Frankl. Inst., 2022

A balm: defend the clique-based attack from a fundamental aspect.
J. Comb. Optim., 2022

A two-stage deep learning model based on feature combination effects.
Neurocomputing, 2022

Mining high utility pattern with negative items in dynamic databases.
Int. J. Intell. Syst., 2022

More relaxed stability analysis and positivity analysis for positive polynomial fuzzy systems via membership functions dependent method.
Fuzzy Sets Syst., 2022

A secure relay selection scheme based on cooperative jamming for Underwater Acoustic Sensor Networks.
Comput. Networks, 2022

Medical expert and machine learning analysis of lumbar disc herniation based on magnetic resonance imaging.
Comput. Methods Programs Biomed., 2022

An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds.
Comput. J., 2022

A survey of active and passive concept drift handling methods.
Comput. Intell., 2022

Embedding temporal networks inductively via mining neighborhood and community influences.
Appl. Intell., 2022

Frequency Hopping Signal Sorting of UAV Based on Image Noise Reduction Technology.
Proceedings of the 4th International Conference on Video, Signal and Image Processing, 2022

NE-WNA: A Novel Network Embedding Framework Without Neighborhood Aggregation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Efficient Semi-supervised Multi-organ Segmentation Using Uncertainty Rectified Pyramid Consistency.
Proceedings of the Fast and Low-Resource Semi-supervised Abdominal Organ Segmentation, 2022

Algorithm for Integrating Multi-Proximity for Trust-Based Group Recommendation in Ridesharing.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

LSTN: Long Short-Term Traffic Flow Forecasting with Transformer Networks.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Incorporating Self Attention Mechanism into Polarization spectral image Reflection Network.
Proceedings of the 5th International Conference on Big Data Technologies, 2022

Graph Representation Learning via Adaptive Multi-layer Neighborhood Diffusion Contrast.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Curriculum Contrastive Learning for Fake News Detection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
AI-Driven Multiobjective Scheduling Algorithm of Flood Control Materials Based on Pareto Artificial Bee Colony.
Wirel. Commun. Mob. Comput., 2021

Tensor-Based Joint Channel Estimation and Symbol Detection for Time-Varying mmWave Massive MIMO Systems.
IEEE Trans. Signal Process., 2021

Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2021

An Attenuation Model of Node Signals in Wireless Underground Sensor Networks.
Remote. Sens., 2021

An augmented reality-based multimedia environment for experimental education.
Multim. Tools Appl., 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

An overview of complex data stream ensemble classification.
J. Intell. Fuzzy Syst., 2021

Mining of top-k high utility itemsets with negative utility.
J. Intell. Fuzzy Syst., 2021

ETKDS: An efficient algorithm of Top-K high utility itemsets mining over data streams under sliding window model.
J. Intell. Fuzzy Syst., 2021

A Survey of incremental high-utility pattern mining based on storage structure.
J. Intell. Fuzzy Syst., 2021

Machine learning research towards combating COVID-19: Virus detection, spread prevention, and medical assistance.
J. Biomed. Informatics, 2021

Nonlinear time series prediction algorithm based on AD-SSNET for artificial intelligence-powered Internet of Things.
Int. J. Distributed Sens. Networks, 2021

Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network.
EURASIP J. Wirel. Commun. Netw., 2021

Coordinating Flexible Demand Response and Renewable Uncertainties for Scheduling of Community Integrated Energy Systems with an Electric Vehicle Charging Station: A Bi-level Approach.
CoRR, 2021

A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT.
IEEE Access, 2021

Review of Classification Methods on Unbalanced Data Sets.
IEEE Access, 2021

Efficient Hybrid Beamforming Design in mmWave Massive MU-MIMO DF Relay Systems With the Mixed-Structure.
IEEE Access, 2021

Survey of Machine Learning and Deep Learning Techniques for Travel Demand Forecasting.
Proceedings of the 2021 IEEE SmartWorld, 2021

A Computer-Vision Based Engagement Evaluation System for More Effective Learning Design.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Automatic Face Mask Detection Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

DNANet: Dense Nested Attention Network for Single Image Dehazing.
Proceedings of the IEEE International Conference on Acoustics, 2021

SageDy: A Novel Sampling and Aggregating Based Representation Learning Approach for Dynamic Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Perceptions of Information Systems Security Compliance: An Empirical Study in Higher Education Setting.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Proof of Greatest Number Program and Find.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

A Novel Modified Sparrow Search Algorithm Based on Adaptive Weight and Improved Boundary Constraints.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain-Based Certification for Education, Employment, and Skill with Incentive Mechanism.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Stability Analysis and Estimation of Domain of Attraction for Positive Polynomial Fuzzy Systems With Input Saturation.
IEEE Trans. Fuzzy Syst., 2020

Blockchain Architecture forAuditing Automation and TrustBuilding in Public Markets.
CoRR, 2020

Blockchain Architecture for Auditing Automation and Trust Building in Public Markets.
Computer, 2020

SCGA-Net: Skip Connections Global Attention Network for Image Restoration.
Comput. Graph. Forum, 2020

Not All Areas Are Equal: A Novel Separation-Restoration-Fusion Network for Image Raindrop Removal.
Comput. Graph. Forum, 2020

Survey on data analysis in social media: A practical application aspect.
Big Data Min. Anal., 2020

A Survey of Key Technologies for High Utility Patterns Mining.
IEEE Access, 2020

Semi-Blind Receivers for Multi-User Massive MIMO Relay Systems Based on Block Tucker2-PARAFAC Tensor Model.
IEEE Access, 2020

A Novel Computing Power Allocation Algorithm for Blockchain System in Multiple Mining Pools Under Withholding Attack.
IEEE Access, 2020

A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-Work Based Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Budget Feasible Roadside Unit Allocation Mechanism in Vehicular Ad-Hoc Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Theory-Based Course Development Framework: A Case Study.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

A Novel Framework for Collaborated IT Project with the Consideration of Data Security and Privacy.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Seeking the Goals of K-12 Computing Education: A Text Analysis based Literature Review.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Converting Handwritten Text to Editable Format via Gesture Recognition for Education.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Lung Pattern Classification Via DCNN.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Promoting Information Security Policy Compliance - An Empirical Study.
Proceedings of the 26th Americas Conference on Information Systems, 2020

Large-Scale Multi-View Subspace Clustering in Linear Time.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Effects of and Defenses Against Adversarial Attacks on a Traffic Light Classification CNN.
Proceedings of the 2020 ACM Southeast Conference, 2020

Integrating Blockchain Technology into Healthcare.
Proceedings of the 2020 ACM Southeast Conference, 2020

A Chatbot-based Mobile Application to Predict and Early-prevent Human Mental Illness.
Proceedings of the 2020 ACM Southeast Conference, 2020

Machine Learning in the Analysis of Mental Disease.
Proceedings of the 2020 ACM Southeast Conference, 2020

Implementing Capsule Neural Networks in Traffic Light Image Recognition.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Mild cognitive impairment understanding: an empirical study by data-driven approach.
BMC Bioinform., December, 2019

Efficient methods to set decay factor of time decay model over data streams.
J. Intell. Fuzzy Syst., 2019

ShareSafe: An Improved Version of SecGraph.
KSII Trans. Internet Inf. Syst., 2019

Observer-based control of positive polynomial fuzzy systems with unknown time delay.
Neurocomputing, 2019

PatHT: an efficient methodof classification over evolving data streams.
Int. Arab J. Inf. Technol., 2019

Discovering Travel Community for POI Recommendation on Location-Based Social Networks.
Complex., 2019

Fast image captioning using LSTM.
Clust. Comput., 2019

An efficient ride-sharing recommendation for maximizing acceptance on geo-social data.
CCF Trans. Pervasive Comput. Interact., 2019

Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

Optimal Hybrid Beamforming Design for Millimeter-Wave Massive Multi-User MIMO Relay Systems.
IEEE Access, 2019

Practice What You Preach - Building a Capstone Management System as Undergraduate IT Capstone Projects.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Understand the Emerging Demands of Computing Education for Non-CS Major Students.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

The Adversarial Attacks Threats on Computer Vision: A Survey.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

Pattern-Adaptive Time Series Prediction via Online Learning and Paralleled Processing using CUDA.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

Finding a Niche and Developing an Undergraduate Data Analytics Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019

A Community-based Computational and Engineering Sciences Initiative toward National Development (COESIND).
Proceedings of the IEEE Frontiers in Education Conference, 2019

What are the Non-majors Looking for in CS Classes?
Proceedings of the IEEE Frontiers in Education Conference, 2019

Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

A2Text-Net: A Novel Deep Neural Network for Sarcasm Detection.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

E^2 C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

Understanding the Mobile Game App Activity.
Proceedings of the 2019 ACM Southeast Conference, 2019

Social Media Content Analytics beyond the Text: A Case Study of University Branding in Instagram.
Proceedings of the 2019 ACM Southeast Conference, 2019

AI Powered Book Recommendation System.
Proceedings of the 2019 ACM Southeast Conference, 2019

2018
Computation of Loss Distribution Based on the Structural Model for Credit Portfolios.
PhD thesis, 2018

Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems.
IEEE Trans. Comput. Soc. Syst., 2018

Privacy preserving feature selection and Multiclass Classification for horizontally distributed data.
Math. Found. Comput., 2018

A survey on security and privacy issues of blockchain technology.
Math. Found. Comput., 2018

Influence analysis: A survey of the state-of-the-art.
Math. Found. Comput., 2018

Maximising influence in sensed heterogeneous social network with privacy preservation.
Int. J. Sens. Networks, 2018

Cognitive Approach for Location Privacy Protection.
IEEE Access, 2018

Understanding Data Breach: A Visualization Aspect.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy Preserving Multiclass Classification for Horizontally Distributed Data.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

An Energy-Efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

A Novel Blockchain-based Education Records Verification Solution.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Improving IoT Services in Smart-Home Using Blockchain Smart Contract.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

LSTM Recurrent Neural Networks for Influenza Trends Prediction.
Proceedings of the Bioinformatics Research and Applications - 14th International Symposium, 2018

Deep learning approach for cyberattack detection.
Proceedings of the IEEE INFOCOM 2018, 2018

China's Efforts to Information Service for Visual-Impaired People.
Proceedings of the Computers Helping People with Special Needs, 2018

Designing Visually Interactive Learning Modules to Promote Students' Critical Thinking in Mathematics.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Defend the Clique-based Attack for Data Privacy.
Proceedings of the Combinatorial Optimization and Applications, 2018

2017
Time constraint influence maximization algorithm in the age of big data.
Int. J. Comput. Sci. Eng., 2017

Evolution Mechanism of Atmospheric Pollution Based on Phase Reconstruction Theory and Time Series Data.
Int. J. Appl. Evol. Comput., 2017

TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model.
Int. Arab J. Inf. Technol., 2017

Influence maximization by probing partial communities in dynamic online social networks.
Trans. Emerg. Telecommun. Technol., 2017

H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017

Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services.
Proceedings of the 2017 International Conference on Identification, 2017

Performance evaluation and analysis of a combined quasi-two-stage bridgeless PFC converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A quasi single-stage power factor correction converter based on a three-level boost converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

An Improved Binary Chicken Swarm Optimization Algorithm for Solving 0-1 Knapsack Problem.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems.
Sensors, 2016

概念漂移数据流挖掘算法综述 (Review of Concept Drift Data Streams Mining Techniques).
计算机科学, 2016

An exploration of broader influence maximization in timeliness networks with opportunistic selection.
J. Netw. Comput. Appl., 2016

The Roles of Social Network Mavens.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Predictive Contention Window-Based Broadcast Collision Mitigation Strategy for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Mining Public Business Knowledge: A Case Study in SEC's EDGAR.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Privacy Reserved Influence Maximization in GPS-Enabled Cyber-Physical and Online Social Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

An Efficient Social Event Invitation Framework Based on Historical Data of Smart Devices.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
A lazy associative classifier for time series.
Intell. Data Anal., 2015

Mining closed and multi-supports-based sequential pattern in high-dimensional dataset.
Int. Arab J. Inf. Technol., 2015

Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks.
Ad Hoc Networks, 2015

Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

2014
Efficient Method for Mining Patterns from Highly Similar and Dense Database based on Prefix-Frequent-Items.
J. Softw., 2014

Selecting One Dependency Estimators in Bayesian Network Using Different MDL Scores and Overfitting Criterion.
J. Inf. Sci. Eng., 2014

Neighborhood-based uncertainty generation in social networks.
J. Comb. Optim., 2014

A Discriminative Shapelets Transformation for Time Series Classification.
Int. J. Pattern Recognit. Artif. Intell., 2014

Data aggregation scheduling in wireless networks with Cognitive Radio capability.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

A survey of GPU accelerated SVM.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Closed Sequential Pattern Mining in High Dimensional Sequences.
J. Softw., 2013

Generating Uncertain Networks Based on Historical Network Snapshots.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

2012
Time Constraints with Temporal Logic Programming.
Proceedings of the Formal Methods and Software Engineering, 2012

2010
Broadband cognitive radio transmission based on sub-channel sensing and NC-OFDM.
Int. J. Commun. Networks Inf. Secur., 2010

2004
A coding and Modulation scheme for HDTV services in DMB-T.
IEEE Trans. Broadcast., 2004

2003
A combined code acquisition and symbol timing recovery method for TDS-OFDM.
IEEE Trans. Broadcast., 2003

A novel scheme of coding and modulation for digital television terrestrial broadcasting.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Code acquisition and symbol timing recovery method in TDS-OFDM for broadcast channels.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...