Miao Xie

Orcid: 0000-0002-9569-509X

According to our database1, Miao Xie authored at least 38 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Interconnected Neural Linear Contextual Bandits with UCB Exploration.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

2021
Characterizing Crowds to Better Optimize Worker Recommendation in Crowdsourced Testing.
IEEE Trans. Software Eng., 2021

Geographical Hidden Markov Tree.
IEEE Trans. Knowl. Data Eng., 2021

SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
Proceedings of the Ubiquitous Security - First International Conference, 2021

AutoBandit: A Meta Bandit Online Learning System.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
FERRARI: an efficient framework for visual exploratory subgraph search in graph databases.
VLDB J., 2020

Multi-scale temporal feature-based dense convolutional network for action recognition.
J. Electronic Imaging, 2020

Dual attention convolutional network for action recognition.
IET Image Process., 2020

A recommendation algorithm for sparse data via implicit relationship.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Mobile robot positioning method based on multi-sensor information fusion laser SLAM.
Clust. Comput., 2019

A Practical Semi-Parametric Contextual Bandit.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

An Indexing Framework for Efficient Visual Exploratory Subgraph Search in Graph Databases.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Higher-Order Network Structure Embedding in Supply Chain Partner Link Prediction.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

2018
PANDA: A System for Partial Topology-based Search on Large Networks.
Proc. VLDB Endow., 2018

Geographical Hidden Markov Tree for Flood Extent Mapping (With Proof Appendix).
CoRR, 2018

Geographical Hidden Markov Tree for Flood Extent Mapping.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

2017
PANDA: toward partial topology-based search on large networks in a single machine.
VLDB J., 2017

Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2017

A multi-objective biclustering algorithm based on fuzzy mathematics.
Neurocomputing, 2017

COCOON: Crowdsourced Testing Quality Maximization Under Context Coverage Constraint.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

CQM: coverage-constrained quality maximization in crowdsourcing test.
Proceedings of the 39th International Conference on Software Engineering, 2017

Who Should Be Selected to Perform a Task in Crowdsourced Testing?
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Privacy-Preserving Access to Big Data in the Cloud.
IEEE Cloud Comput., 2016

2015
Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

DynaDiffuse: A Dynamic Diffusion Model for Continuous Time Constrained Influence Maximization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges.
IEEE Syst. J., 2014

A vertex centric parallel algorithm for linear temporal logic model checking in Pregel.
J. Parallel Distributed Comput., 2014

Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.
Proceedings of the Network and System Security - 8th International Conference, 2014

Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
Anomaly Detection in Wireless Sensor Networks.
PhD thesis, 2013

Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

2012
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
A Short-Term Forecasting Algorithm for Network Traffic Based on Chaos Theory and SVM.
J. Netw. Syst. Manag., 2011

Anomaly detection in wireless sensor networks: A survey.
J. Netw. Comput. Appl., 2011

Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2009
Application Research of Data Mining Techniques in P2P Network.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

A Novel Routing Algorithm for Energy-Efficient in Wireless Sensor Networks.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009


  Loading...