Ning Ding

According to our database1, Ning Ding authored at least 136 papers between 2001 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Cooperative Target Enclosing Control of Multiple Mobile Robots Subject to Input Disturbances.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A new risk-adjusted EWMA control chart based on survival time for monitoring surgical outcome quality.
Qual. Reliab. Eng. Int., 2021

Comparative study on credit card fraud detection based on different support vector machines.
Intell. Data Anal., 2021

Pre-Trained Models: Past, Present and Future.
CoRR, 2021

PTR: Prompt Tuning with Rules for Text Classification.
CoRR, 2021

Few-NERD: A Few-Shot Named Entity Recognition Dataset.
CoRR, 2021

Prototypical Representation Learning for Relation Extraction.
CoRR, 2021

Learning Purified Feature Representations from Task-irrelevant Labels.
CoRR, 2021

A Hybrid Task-Oriented Dialog System with Domain and Task Adaptive Pretraining.
CoRR, 2021

Wearable ubiquitous energy system.
Sci. China Inf. Sci., 2021

Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Cooperative Moving-Target Enclosing of Networked Vehicles With Constant Linear Velocities.
IEEE Trans. Cybern., 2020

Split-Bregman Algorithm with Attenuation Correction for L-Shell Polychromatic X-ray Fluorescence Computed Tomography.
J. Medical Imaging Health Informatics, 2020

A 6.4-GS/s 10-b Time-Interleaved SAR ADC with Time-Skew Immune Sampling Network in 28-nm CMOS.
J. Circuits Syst. Comput., 2020

Research on National Pattern Reuse Design and Optimization Method Based on Improved Shape Grammar.
Int. J. Comput. Intell. Syst., 2020

Towards All-around Knowledge Transferring: Learning From Task-irrelevant Labels.
CoRR, 2020

Wavelength Selection for Estimating Soil Organic Matter Contents Through the Radiative Transfer Model.
IEEE Access, 2020

Modified Degree of Polarization Function for Rough Metallic Surface Parameter Estimation Based on Multispectral Polarimetric Measurement.
IEEE Access, 2020

Multi-Party Private Set Intersection in Vertical Federated Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Unified Model for Real-Time Crop Recognition and Stem Localization Exploiting Cross-Task Feature Fusion.
Proceedings of the 2020 IEEE International Conference on Real-time Computing and Robotics, 2020

DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.
Proceedings of the IUI '20: 25th International Conference on Intelligent User Interfaces, 2020

Generalized Local Aggregation for Large Scale Gaussian Process Regression.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Triple-to-Text Generation with an Anchor-to-Prototype Framework.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Infobox-to-text Generation with Tree-like Planning based Attention Network.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

CCRobot-III: a Split-type Wire-driven Cable Climbing Robot for Cable-stayed Bridge Inspection<sup>*</sup>.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

Simultaneous Flexible Keyword Detection and Text-dependent Speaker Recognition for Low-resource Devices.
Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods, 2020

TP-LSD: Tri-Points Based Line Segment Detector.
Proceedings of the Computer Vision - ECCV 2020, 2020

Length-Controllable Image Captioning.
Proceedings of the Computer Vision - ECCV 2020, 2020

Exploring the Tricks for Road Damage Detection with A One-Stage Detector.
Proceedings of the IEEE International Conference on Big Data, 2020

Adaptive Noise Suppression for Wake-Word Detection by Temporal-Difference Generalized Eigenvalue Beamformer.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Hierarchy-Aware Global Model for Hierarchical Text Classification.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Coupling Distant Annotation and Adversarial Training for Cross-Domain Chinese Word Segmentation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Integrating Linguistic Knowledge to Sentence Paraphrase Generation.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A pattern recognition modeling approach based on the intelligent ensemble classifier: Application to identification and appraisal of water-flooded layers.
J. Syst. Control. Eng., 2019

Research on the Quantitative Method of Cognitive Loading in a Virtual Reality System.
Inf., 2019

DELTA: A DEep learning based Language Technology plAtform.
CoRR, 2019

A New Turbine-Sail Coupled Propulsive System for Autonomous Sailboats.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Collaborative Object Transportation by Multiple Robots with Onboard Object Localization Algorithm.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

An Adaptive Position Keeping Algorithm For Autonomous Sailboats.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Wing Sail Land-yacht Modeling And System Verification.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Obstacle Avoidance for Autonomous Sailboats via Reinforcement Learning with Coarse-to-fine Strategy.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Joint Torque Estimation toward Dynamic and Compliant Control for Gear-Driven Torque Sensorless Quadruped Robot.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Design and Implementation of CCRobot-II: a Palm-based Cable Climbing Robot for Cable-stayed Bridge Inspection.
Proceedings of the International Conference on Robotics and Automation, 2019

Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Event Detection with Trigger-Aware Lattice Neural Network.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Application of Network Cloud Resources in College English Listening Class.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

On Exactly Learning Disjunctions and DNFs Without Equivalence Queries.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

A Readout Circuit of Microchannel Plate Light Detector in 0.13um CMOS Technology.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

Chinese Relation Extraction with Multi-Grained Information and External Linguistic Knowledge.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
Machine Learning-Based Charging Network Operation Service Platform Reservation Charging Service System.
Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, 2018

A Light-Weight Wheel-Based Cable Inspection Climbing Robot: From Simulation to Reality.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

A Biologically Inspired Cable Climbing Robot: CCRobot - Design and Implementation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Design of Ruminant Sound Detection for Dairy Cows Based on DWT-MFCC.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Construction of a bank customer data warehouse and an application of data mining.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

Research and implementation of network location algorithm based on LoRa system.
Proceedings of the 4th International Conference on Communication and Information Processing, 2018

2017
Learning AC<sup>0</sup> Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

A simple and parallel algorithm for robot position estimation by stereo visual-inertial sensor fusion.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

The potential Li4Ti5O12 battery products applications for New Zealand electric buses.
Proceedings of the 24th International Conference on Mechatronics and Machine Vision in Practice, 2017

Agnostically Learning Boolean Functions with Finite Polynomial Representation.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

Vulnerability Detection in IoT Firmware: A Survey.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Visual servoing based pickup of stationary objects with a dynamically controlled manipulator.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

Dynamic visual servoing based regulation of quadrotors on a predefined marker.
Proceedings of the IEEE International Conference on Information and Automation, 2017

GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

2016
Research data management in universities of central China: Practices at Wuhan University Library.
Electron. Libr., 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
Sci. China Inf. Sci., 2016

An Ontology Pattern for Emergency Event Modeling.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Online hierarchical scheduling on two machines with known total size of low-hierarchy jobs.
Int. J. Comput. Math., 2015

Using Epistemic Synchronization Index (ESI) to measure students' knowledge elaboration process in CSCL.
Comput. Educ., 2015

Energy and Performance of Smartphone Radio Bundling in Outdoor Environments.
Proceedings of the 24th International Conference on World Wide Web, 2015

An Event Ontology Description Framework Based on SKOS.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Some New Consequences of the Hypothesis That P Has Fixed Polynomial-Size Circuits.
Proceedings of the Theory and Applications of Models of Computation, 2015

Smartphone Energy Drain in the Wild: Analysis and Implications.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Smartphone Background Activities in the Wild: Origin, Energy Drain, and Optimization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Heterogeneous Roadside Unit Placement in Eco-Sustainable Communication Networks for Intelligent Transportation.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

A 2-V 40-MS/s 14-bit pipelined ADC for CMOS image sensor.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

Extraction of Event Elements Based on Event Ontology Reasoning.
Proceedings of the Intelligent Information and Database Systems - 7th Asian Conference, 2015

2014
Three-phase Magnitude-phase Detection Based on T/4 Time-lapse Elimination Method.
J. Softw., 2014

Cross-network externality analysis of the price structure on the credit card market in China.
Int. J. Serv. Stand., 2014

Online Minimum makespan Scheduling with a Buffer.
Int. J. Found. Comput. Sci., 2014

Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security - 17th International Conference, 2014

Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

On Computing Optimal Strategies in Open List Proportional Representation: The Two Parties Case.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Leadership and spirituality in business and public administration: a cross-cultural empirical study comparing the USA and France.
Int. J. Serv. Stand., 2013

Vehicle Safety Enhancement System: Sensing and Communication.
Int. J. Distributed Sens. Networks, 2013

Computing shortest homotopic cycles on polyhedral surfaces with hyperbolic uniformization metric.
Comput. Aided Des., 2013

Characterizing and modeling the impact of wireless signal strength on smartphone battery drain.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Medial axis construction and applications in 3D wireless sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A robot for classifying Chinese calligraphic types and styles.
Proceedings of the 2013 IEEE International Conference on Robotics and Automation, 2013

A finite element contour approach to affine invariant shape representation.
Proceedings of the IEEE International Conference on Image Processing, 2013

A Finite Element Region approach to shape representation and hand gesture recognition.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Emergency evacuation simulation in staircases considering evacuees' physical and psychological status.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

Voting with partial information: what questions to ask?
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
The impact of higher interest spread on the performance of banks in China.
Int. J. Serv. Stand., 2012

DOA Estimation of Multiple Speech Sources from a Stereophonic Mixture in Underdetermined Case.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

The only constant is change: incorporating time-varying network reservations in data centers.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Real-time monocular visual self-localization approach using natural circular landmarks for indoor navigation.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

Realizing the full potential of PSM using proxying.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The Application of Digital Elevation Model in the Coverage Network Planning Software.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

On Constant-Round Precise Zero-Knowledge.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Multiple sources' direction finding by using reliable component on phase difference manifold and kernel density estimator.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Online Minimum Makespan Scheduling with a Buffer.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Exploring gender and gender pairing in the knowledge elaboration processes of students using computer-supported collaborative learning.
Comput. Educ., 2011

A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011

Distributed algorithms for bottleneck identification and segmentation in 3D wireless sensor networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Proceedings of the Information Security Practice and Experience, 2011

DOA estimation in underdetermined stereophonic mixture by kernel density estimator.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Speaker localization and speech separation using Phase Difference versus Frequency distribution.
Proceedings of the 19th European Signal Processing Conference, 2011

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Precise bounded-concurrent zero-knowledge proofs for NP.
Sci. China Inf. Sci., 2010

NetViewer: A Universal Visualization Tool for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

On Obfuscating Programs with Tamper-proof Hardware.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.
IACR Cryptol. ePrint Arch., 2009

Precise Time and Space Simulatable Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2009

Computing Fenchel-Nielsen Coordinates in Teichmüller Shape Space.
Commun. Inf. Syst., 2009

Computing Fenchel-Nielsen coordinates in Teichmuller shape Space.
Proceedings of the IEEE International Conference on Shape Modeling and Applications, 2009

Research of Campus Wireless Mobile Model.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

The Simulation of Heavy Metal (Cu) Contamination in Surface Soils.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

How gender composition influences individual knowledge elaboration in CSCL.
Proceedings of the 8th International Conference on Computer Supported Collaborative Learning, 2009

Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Proceedings of the Advances in Cryptology, 2009

2008
Joint and individual knowledge elaboration in CSCL.
Proceedings of the Cre8ing a learning world: Proceedings of the 8th International Conference for the Learning Sciences, 2008

2007
Physhint: a qualitative study of student's knowledge elaboration in CSCL.
Proceedings of the 7th Iternational Conference on Computer Supported Collaborative Learning, 2007

A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2005
Study on information sharing in supply chain.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2001
Enterprise Alliance and Virtue Enterprise: A Systematic Analysis and Theoretical Explanation.
Proceedings of the Human Society and the Internet, 2001


  Loading...