Shang Gao

According to our database1, Shang Gao authored at least 51 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Stem-Leaf Segmentation and Phenotypic Trait Extraction of Individual Maize Using Terrestrial LiDAR Data.
IEEE Trans. Geoscience and Remote Sensing, 2019

Three-party quantum secret sharing against collective noise.
Quantum Information Processing, 2019

Two-party quantum key agreement over a collective noisy channel.
Quantum Information Processing, 2019

An End-to-End Load Balancer Based on Deep Learning for Vehicular Network Traffic Control.
IEEE Internet of Things Journal, 2019

Pseudo-label neighborhood rough set: Measures and attribute reductions.
Int. J. Approx. Reasoning, 2019

The visual human face super-resolution reconstruction algorithm based on improved deep residual network.
EURASIP J. Adv. Sig. Proc., 2019

Classifying cancer pathology reports with hierarchical self-attention networks.
Artificial Intelligence in Medicine, 2019

Grouped SMOTE With Noise Filtering Mechanism for Classifying Imbalanced Data.
IEEE Access, 2019

Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Model-based Hyperparameter Optimization of Convolutional Neural Networks for Information Extraction from Cancer Pathology Reports on HPC.
Proceedings of the 2019 IEEE EMBS International Conference on Biomedical & Health Informatics, 2019

Semi-Supervised Information Extraction for Cancer Pathology Reports.
Proceedings of the 2019 IEEE EMBS International Conference on Biomedical & Health Informatics, 2019

Deep Transfer Learning Across Cancer Registries for Information Extraction from Pathology Reports.
Proceedings of the 2019 IEEE EMBS International Conference on Biomedical & Health Informatics, 2019

A multi-scale face detection algorithm based on improved SSD model.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
CrowdGIS: Updating Digital Maps via Mobile Crowdsensing.
IEEE Trans. Automation Science and Engineering, 2018

The Transferability of Random Forest in Canopy Height Estimation from Multi-Source Remote Sensing Data.
Remote Sensing, 2018

Vehicle Safety Improvement through Deep Learning and Mobile Sensing.
IEEE Network, 2018

Security Threats in the Data Plane of Software-Defined Networks.
IEEE Network, 2018

Hierarchical attention networks for information extraction from cancer pathology reports.
JAMIA, 2018

Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones.
IEEE Internet of Things Journal, 2018

Deep clustering of protein folding simulations.
BMC Bioinformatics, 2018

Evolutionary Game Analysis of Ridesourcing Industry Between Transportation Network Companies and Passengers under New Policies of Ridesourcing.
IEEE Access, 2018

Checking an Authentication of Person Depends on RFID with Thermal Image.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Secure and Privacy Preserving RFID Based Access Control to Smart Buildings.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Hierarchical Convolutional Attention Networks for Text Classification.
Proceedings of The Third Workshop on Representation Learning for NLP, 2018

Vision and Infra-Red Sensor Based Fire Fighting Robot.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

Performance Evaluation of A Non-Isolated Three-Port Converter for PV-Battery Hybrid Energy System.
Proceedings of the IECON 2018, 2018

I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018

Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Android-Based Sleep Apnea Monitoring Software.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
Smartphone-assisted energy efficient data communication for wearable devices.
Computer Communications, 2017

WebLogger: Stealing your personal PINs via mobile web application.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

SCoP: Smartphone energy saving by merging push services in Fog computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Intelligent CPSS and its application to health care computing.
SCIENCE CHINA Information Sciences, 2016

Secure and energy efficient prefetching design for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
On input-to-state stability for stochastic coupled control systems on networks.
Applied Mathematics and Computation, 2015

2014
A new sparse representation-based classification algorithm using iterative class elimination.
Neural Computing and Applications, 2014

2013
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2011
An improved scheme for minimum cross entropy threshold selection based on genetic algorithm.
Knowl.-Based Syst., 2011

VASP: virtualization assisted security monitor for cross-platform protection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Optimizing virtual machines using hybrid virtualization.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

SPAD: software protection through anti-debugging using hardware virtualization.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Camera Model Identification Based on the Characteristic of CFA and Interpolation.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Real-time Enhancement for Xen Hypervisor.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Camera-Model Identification Using Markovian Transition Probability Matrix.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

A New Linear Optimization Technique Coupling Evolutionary Algorithm for Solving Multiobjective Optimization Problems.
Proceedings of the Fifth International Conference on Natural Computation, 2009

HBSP: A Lightweight Hardware Virtualization Based Framework for Transparent Software Protection in Commodity Operating Systems.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2007
The Method of PID Parameter Optimization Based on Modified Linear Quadratic Optimal Control in the Linear DC Motor.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

2002
A Web-based Hypertext Learning State Space Model and Learning Control.
Proceedings of the Internet and Multimedia Systems and Applications, 2002


  Loading...