Min Zheng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.


Temporal-Spatial Quantum Graph Convolutional Neural Network Based on Schrödinger Approach for Traffic Congestion Prediction.
IEEE Trans. Intell. Transp. Syst., August, 2023

MCnet: Multiscale visible image and infrared image fusion network.
Signal Process., July, 2023

Fast Identification of Vulnerable Set for Cascading Failure Analysis in Power Grid.
IEEE Trans. Ind. Informatics, April, 2023

Advantageous Strain Sensing Performances of FBG Strain Sensors Equipped with Planar UV-Curable Resin.
Sensors, March, 2023

AutoDiffusion: Training-Free Optimization of Time Steps and Architectures for Automated Diffusion Model Acceleration.
CoRR, 2023

UGC: Unified GAN Compression for Efficient Image-to-Image Translation.
CoRR, 2023

PhotoVerse: Tuning-Free Image Customization with Text-to-Image Diffusion Models.
CoRR, 2023

DiffusionEngine: Diffusion Model is Scalable Data Engine for Object Detection.
CoRR, 2023

DLIP: Distilling Language-Image Pre-training.
CoRR, 2023

AvatarVerse: High-quality & Stable 3D Avatar Creation from Text and Pose.
CoRR, 2023

HandMIM: Pose-Aware Self-Supervised Learning for 3D Hand Mesh Estimation.
CoRR, 2023

AlignDet: Aligning Pre-training and Fine-tuning in Object Detection.
CoRR, 2023

SwiftAvatar: Efficient Auto-Creation of Parameterized Stylized Character on Arbitrary Avatar Engines.
CoRR, 2023

Periodic Data Scheduling Scheme for Power Internet of Things Based on Age of Information.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

An Energy-constrained Cooperative Jamming Scheme for Wireless Security Communication in Power IoT.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Rate Adaptation Algorithm with LSTM in IEEE 802.11ac.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Global-to-Contextual Shared Semantic Learning for Fine-Grained Vision-Language Alignment.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

Developing an Interpretable Driver Risk Assessment Model to Increase Driver Awareness Using In-Vehicle Records.
Proceedings of the HCI International 2023 Posters, 2023

SwiftAvatar: Efficient Auto-Creation of Parameterized Stylized Character on Arbitrary Avatar Engines.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Directional Sensor Planning for Occlusion Avoidance.
IEEE Trans. Robotics, 2022

A few-shot fine-grained image classification method leveraging global and local structures.
Int. J. Mach. Learn. Cybern., 2022

Secure quantum fog computing model based on blind quantum computation.
J. Ambient Intell. Humaniz. Comput., 2022

A quantum blockchain-enabled framework for secure private electronic medical records in Internet of Medical Things.
Inf. Sci., 2022

Revisiting Local Descriptors via Frequent Pattern Mining for Fine-Grained Image Retrieval.
Entropy, 2022

Next-ViT: Next Generation Vision Transformer for Efficient Deployment in Realistic Industrial Scenarios.
CoRR, 2022

iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.
CoRR, 2022

Parallel Pre-trained Transformers (PPT) for Synthetic Data-based Instance Segmentation.
CoRR, 2022

TRT-ViT: TensorRT-oriented Vision Transformer.
CoRR, 2022

SepViT: Separable Vision Transformer.
CoRR, 2022

AlphaFold Accelerates Artificial Intelligence Powered Drug Discovery: Efficient Discovery of a Novel Cyclin-dependent Kinase 20 (CDK20) Small Molecule Inhibitor.
CoRR, 2022

Progressive Automatic Design of Search Space for One-Shot Neural Architecture Search.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

ScalableViT: Rethinking the Context-Oriented Generalization of Vision Transformer.
Proceedings of the Computer Vision, 2022

HiFace: Hybrid Task Learning for Face Reconstruction from Single Image.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Multi-granularity Distillation Scheme Towards Lightweight Semi-supervised Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2022, 2022

The Tenth Visual Object Tracking VOT2022 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Dressing in the Wild by Watching Dance Videos.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Message Parsing Based on Structure Description in IoT for Electric Power and Energy Systems.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

COVID-19 Image Segmentation Algorithms Based on Conditional Generative Adversarial Network.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

Spatially-Aware Context Neural Networks.
IEEE Trans. Image Process., 2021

Fine-Grained Image-Text Retrieval via Discriminative Latent Space Learning.
IEEE Signal Process. Lett., 2021

Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network.
Secur. Commun. Networks, 2021

A Comparative Study on the Vertical Structures and Microphysical Properties of Stratiform Precipitation over South China and the Tibetan Plateau.
Remote. Sens., 2021

An efficient quantum image steganography protocol based on improved EMD algorithm.
Quantum Inf. Process., 2021

Using IRP and local alignment method to detect distributed malware.
Comput. Secur., 2021

Implementation of Universal Health Management and Monitoring System in Resource-Constrained Environment Based on Internet of Things.
IEEE Access, 2021

POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Fine-Grained Image-Text Retrieval via Complementary Feature Learning.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

A high-precision channel slope deformation monitoring method based on airborne laser scanning point cloud.
Proceedings of the ICCIR 2021: International Conference on Control and Intelligent Robotics, 2021

Gaussian Context Transformer.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Exploration on Group Experiments of Biochemistry Experiment Courses in Medical Colleges Based on Grid Sorting.
Proceedings of the CIPAE 2021: 2nd International Conference on Computers, 2021

A novel coherence-based quantum steganalysis protocol.
Quantum Inf. Process., 2020

State-of-Charge Estimation of Lithium-Ion Battery Pack Based on Improved RBF Neural Networks.
Complex., 2020

iDEA: Static Analysis on the Security of Apple Kernel Drivers.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Linear Context Transform Block.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Average-Consensus Tracking of Sensor Network via Distributed Coordination Control of Heterogeneous Multi-Agent Systems.
IEEE Control. Syst. Lett., 2019

Identify Equivalent Frames.
CoRR, 2019

A New Design Method for PI-PD Control of Unstable Fractional-Order System with Time Delay.
Complex., 2019

Anti-TNF- αtreatment-related pathways and biomarkers revealed by transcriptome analysis in Chinese psoriasis patients.
BMC Syst. Biol., 2019

SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning.
IEEE Access, 2019

A Novel Social Recommendation Method Fusing User's Social Status and Homophily Based on Matrix Factorization Techniques.
IEEE Access, 2019

The Influence of Time-delay for the Bifurcation of the Fractional Neuron Network.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Stability Region Design of Fractional Complex Order $PI^{\lambda+\mu \mathrm{i}}$ Controller Using D Segmentation.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

M4D: A Malware Detection Method Using Multimodal Features.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Compact real-valued teaching-learning based optimization with the applications to neural network training.
Knowl. Based Syst., 2018

Yoink: An interaction-based partitioning API.
J. Comput. Chem., 2018

Time-Varying Impedance Control of Port Hamiltonian System with a New Energy-Storing Tank.
Complex., 2018

Image Super-Resolution via Self-Similarity Learning and Conformal Sparse Representation.
IEEE Access, 2018

Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Ensemble Clustering Using Maximum Relative Density Path.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

Retinal image segmentation using double-scale non-linear thresholding on vessel support regions.
CAAI Trans. Intell. Technol., 2017

Maximized Traffic Offloading by Content Sharing in D2D Communication.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

A Comprehensive Optimization of PD^μ Controller Design for Trade-off of Energy and System Performance.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017

Impact of Chinese Confucian cultural value on management and employee performance in China's service industry: A case study of service innovation under program management environment.
Proceedings of the 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, September 5-8, 2017, 2017

Face Liveness Verification Based on Hyperspectrum Analysis.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Improved results for linear discrete-time systems with an interval time-varying input delay.
Int. J. Syst. Sci., 2016

Quadratic separation framework for stability analysis of a class of systems with time delays.
Neurocomputing, 2016

Adaptive event-triggered communication scheme for networked control systems with randomly occurring nonlinearities and uncertainties.
Neurocomputing, 2016

Energy saving - Another perspective for parameter optimization of P and PI controllers.
Neurocomputing, 2016

Improved Stability and Stabilization Criteria for Uncertain T-S Fuzzy Systems with Interval Time-Varying Delay via Discrete Wirtinger-Based Inequality.
Int. J. Fuzzy Syst., 2016

Disturbance attenuation for Markov jump linear system over an additive white Gaussian noise channel.
Int. J. Control, 2016

Consensus of multi-agent systems under switching agent dynamics and jumping network topologies.
Int. J. Autom. Comput., 2016

Control Strategies for Network Systems Based on a Novel Event-Trigger Mechanism.
Proceedings of the Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems, 2016

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

A new method based on hough transform for quick line and circle detection.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

Housing dynamics with speculative expectations.
Proceedings of the 2015 International Conference on Behavioral, 2015

Comments on "Wirtinger-based integral inequality: Application to time-delay systems [Automatica 49 (2013) 2860-2866]".
Autom., 2014

DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A trust routing protocol based on D-S evidence theory in mobile ad hoc network.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

DroidRay: a security evaluation system for customized android firmwares.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Design and implementation of an Android host-based intrusion prevention system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Improved stability criteria for uncertain linear systems with interval time-varying delay.
J. Syst. Sci. Complex., 2013

DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
CoRR, 2013

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Exploration and Exploitation of Reference Frames in Distributed Video Coding.
IEEE Signal Process. Lett., 2012

Improved stability criteria for uncertain delayed neural networks.
Neurocomputing, 2012

IBI Cancellation and Circular Property Restoration for Broadband DS-CDMA Using FDE without CP Insertion.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

On codebook design for distributed relay beamforming network.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Wave-Based Reflections Reducing Approach for Bilateral Teleoperation.
Proceedings of the AsiaSim 2012, 2012

A Geospatial Analysis on the Potential Value of News Comments in Infectious Disease Surveillance.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Consistent quality control for wireless video surveillance using Distributed Video Coding.
Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention, 2011

An Improved KNN Based Outlier Detection Algorithm for Large Datasets.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Multivariable harmonic balance analysis of the neuronal oscillator for leech swimming.
J. Comput. Neurosci., 2008

Further Reduction of Normal Forms and Unique Normal Forms of Smooth Maps.
Int. J. Bifurc. Chaos, 2008

Systems-level modeling of neuronal circuits for leech swimming.
J. Comput. Neurosci., 2007

Sensory Feedback Mechanism Underlying Entrainment of Central Pattern Generator to Mechanical Resonance.
Biol. Cybern., 2006

Experimental Study of a Self-Tuning Algorithm for DBMS Buffer Pools.
J. Database Manag., 2005

Grapheme-to-phoneme conversion based on TBL algorithm in Mandarin TTS system.
Proceedings of the INTERSPEECH 2005, 2005

Grapheme-to-Phoneme Conversion Based on a Fast TBL Algorithm in Mandarin TTS Systems.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Transmit signal design for optimal deconvolution.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

What makes biological oscillators achieve robust self-excitation?
Proceedings of the American Control Conference, 2003

Dynamic Reconfiguration Algorithm: Dynamically Tuning Multiple Buffer Pools.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

Hypertext Interchange using ICA.
J. Documentation, 1995

Preparing mathematical equations in a document preparation environment.
J. Comput. Sci. Technol., 1994

Textbook Extended on CD.
Intell. Tutoring Media, 1994

Text-Hypertext Mutual Conversion and Hypertext Interchange through SGML.
Proceedings of the CIKM 93, 1993