Sheng-De Wang

Orcid: 0000-0001-8856-7850

According to our database1, Sheng-De Wang authored at least 125 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VP-DARTS: Validated Pruning Differentiable Architecture Search.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment.
IEEE Access, 2023

Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Anomaly Detection for Multivariate Industrial Sensor Data via Decoupled Generative Adversarial Network.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping Indicator.
Proceedings of the Advances in Information and Communication, 2023

2022
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records.
Knowl. Based Syst., 2022

CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata.
IEEE Access, 2022

Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol.
IEEE Access, 2022

Difficulty-Aware Mixup for Replay-based Continual Learning.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

Object Detection Edge Performance Optimization on FPGA-Based Heterogeneous Multiprocessor Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Enhanced Local Gradient Smoothing: Approaches to Attacked-region Identification and Defense.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

2021
Detecting and Scoring Equipment Faults in Real Time During Semiconductor Test Processes.
IEEE Des. Test, 2021

Communication-Efficient Separable Neural Network for Distributed Inference on Edge Devices.
CoRR, 2021

Provable Secure Group Key Establishment Scheme for Fog Computing.
IEEE Access, 2021

2020
A Novel Gaming Video Encoding Process Using In-Game Motion Vectors.
IEEE Trans. Circuits Syst. Video Technol., 2020

Using Partial Combination Models to Improve Prediction Quality and Transparency in Mixed Datasets.
IEEE Access, 2020

Quality-Aware Streaming Network Embedding with Memory Refreshing.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Grid Structure Attention for Natural Language Interface to Bash Commands.
Proceedings of the International Computer Symposium, 2020

2019
Data Reduction for real-time bridge vibration data on Edge.
Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics, 2019

2018
An Approach to the Design of Specific Hardware Circuits from C Programs.
J. Inf. Sci. Eng., 2018

Distributed Continuous Control with Meta Learning on Robotic Arms.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Detach and Adapt: Learning Cross-Domain Disentangled Deep Representation.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Learning Cross-Domain Disentangled Deep Representation with Supervision from A Single Domain.
CoRR, 2017

Domain-Adaptive generative adversarial networks for sketch-to-photo inversion.
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017

BLE Tree Networks for Sensor Devices in Internet of Things.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

PhishBox: An Approach for Phishing Validation and Detection.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Streaming analytics processing in manufacturing performance monitoring and prediction.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
The Concept of Attack Scenarios and Its Applications in Android Malware Detection.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

An Android Malware Detection Approach Using Bayesian Inference.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A hybrid multiple-character transition finite-automaton for string matching engine.
Microprocess. Microsystems, 2015

Machine Learning Based Hybrid Behavior Models for Android Malware Analysis.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

An adaptive network intrusion detection approach for the cloud environment.
Proceedings of the International Carnahan Conference on Security Technology, 2015

An FPGA Memory Hierarchy for High-level Synthesized OpenCL Kernels.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

OpenCL computing on FPGA using multiported shared memory.
Proceedings of the 25th International Conference on Field Programmable Logic and Applications, 2015

2014
PFBF: Pre-Filtered Bloom Filters.
Proceedings of the Intelligent Systems and Applications, 2014

2013
An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm.
ACM Trans. Archit. Code Optim., 2013

An Embedded NIDS with Multi-core Aware Packet Capture.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
The Enhancement of Security in Healthcare Information Systems.
J. Medical Syst., 2012

Mobile Agent Application and Integration in Electronic Anamnesis System.
J. Medical Syst., 2012

A Mobile Agent Approach for Secure Integrated Medical Information Systems.
J. Medical Syst., 2012

Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems.
Int. J. Commun. Syst., 2012

2011
Algorithms and Hardware Architectures for Variable Block Size Motion Estimation.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Embedded Network Intrusion Detection Systems with a Multi-core Aware Packet Capture Module.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

A Data Parallel Approach to XML Parsing and Query.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

2010
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis.
ACM Trans. Design Autom. Electr. Syst., 2010

Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems.
J. Inf. Sci. Eng., 2010

A virtual teleconferencing system based on face detection and 3D animation in a low-bandwidth environment.
Int. J. Imaging Syst. Technol., 2010

2009
Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space.
Pattern Recognit., 2009

Heuristic algorithm for the resource constrained scheduling problem during high-level synthesis.
IET Comput. Digit. Tech., 2009

Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

An enhanced uplink scheduling algorithm for video traffic transmission in IEEE 802.16 BWA systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Choosing the Kernel Parameters for the Directed Acyclic Graph Support Vector Machines.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

The Modified Grid Location Service for Mobile Ad-Hoc Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Layered Peer to Peer Streaming Using Hidden Markov Models.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Transmission Range Designation Broadcasting Methods for Wireless Ad Hoc Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity.
Proceedings of the IEEE International Conference on Systems, 2006

A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance.
Proceedings of the International Joint Conference on Neural Networks, 2006

A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Dynamic Scheduling Methods for Computational Grid Environments.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Weighting Initialization Strategy for Weighted Support Vector Machines.
Proceedings of the Pattern Recognition and Data Mining, 2005

2004
An adaptive H<sup>∞</sup> controller design for bank-to-turn missiles using ridge Gaussian neural networks.
IEEE Trans. Neural Networks, 2004

Training algorithms for fuzzy support vector machines with noisy data.
Pattern Recognit. Lett., 2004

Competitive algorithms for the clustering of noisy data.
Fuzzy Sets Syst., 2004

Jelly: A Dynamic Hierarchical P2P Overlay Network with Load Balance and Locality.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Japster: An Improved Peer-to-Peer Network Architecture.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2002
Fuzzy support vector machines.
IEEE Trans. Neural Networks, 2002

An Anonymous Endorsement System.
J. Inf. Sci. Eng., 2002

A Packet-Based Caching Proxy with Loss Recovery for Video Streaming.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

2001
A rotation invariant printed Chinese character recognition system.
Pattern Recognit. Lett., 2001

Fingerprint feature reduction by principal Gabor basis function.
Pattern Recognit., 2001

Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

Jato: A Compact Binary File Format for Java Class.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

2000
Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers.
IEEE Trans. Parallel Distributed Syst., 2000

Fuzzy auto-associative neural networks for principal component extraction of noisy data.
IEEE Trans. Neural Networks Learn. Syst., 2000

A fault-tolerant routing algorithm for wormhole routed meshes.
Parallel Comput., 2000

Adaptive tuning of the fuzzy controller for robots.
Fuzzy Sets Syst., 2000

1999
Robust algorithms for principal component analysis.
Pattern Recognit. Lett., 1999

Fault-Tolerant Wormhole Routing in Two-Dimensional Mesh Networks with Convex Faults.
Inf. Sci., 1999

Fuzzy system modeling using linear distance rules.
Fuzzy Sets Syst., 1999

Fuzzy system identification using an adaptive learning rule with terminal attractors.
Fuzzy Sets Syst., 1999

A secure and practical electronic voting scheme.
Comput. Commun., 1999

1998
A Fully Adaptive Routing Algorithm for Dynamically Injured Hypercubes, Meshes, and Tori.
IEEE Trans. Parallel Distributed Syst., 1998

Perceptron-perceptron net.
Pattern Recognit. Lett., 1998

Replication and Partitioning for Data Arrays in Distributed Memory Systems.
J. Inf. Sci. Eng., 1998

A self-organizing fuzzy control approach for bank-to-turn missiles.
Fuzzy Sets Syst., 1998

Adaptive and Fault-Tolerant Routing with 100% Node Utilization for Mesh Multicomputer.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

1997
k-winners-take-all neural net with Θ(1) time complexity.
IEEE Trans. Neural Networks, 1997

An Improved Algorithm for Fault-Tolerant Routing in Hypercubes.
IEEE Trans. Computers, 1997

The K1-Map Reduction for Pattern Classifications.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

1996
Transformations of star-delta and delta-star reliability networks.
IEEE Trans. Reliab., 1996

Tiling Nested Loops into Maximal Rectangular Blocks.
J. Parallel Distributed Comput., 1996

A self-organizing adaptive fuzzy controller.
Fuzzy Sets Syst., 1996

High-Performance Low-Cost Non-Blocking Switch for ATM.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1995
Ring-Connected Networks and Their Relationship to Cubical Ring Connected Cycles and Dynamic Redundancy Networks.
IEEE Trans. Parallel Distributed Syst., 1995

A simple architecture for constant time sorting machines.
SIGARCH Comput. Archit. News, 1995

Comments on "On the design of feedforward neural networks for binary mapping [1]".
Neurocomputing, 1995

An efficient pruning algorithm for value independent knapsack problem using a DAG structure.
Comput. Oper. Res., 1995

1994
Comments on "Distributed Algorithms for Network Recognition Problems".
IEEE Trans. Computers, 1994

A versatile ring-connected hypercube.
IEEE Micro, 1994

Compiler techniques for maximizing fine-grain and coarse-grain parallelism in loops with uniform dependences.
Proceedings of the 8th international conference on Supercomputing, 1994

Broadcasting on Faulty Hypercubes.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

1993
Performance modeling and analysis of load balancing policies with priority queueing.
J. Syst. Softw., 1993

An Efficient Quorum Generating Approach for Distributed Mutual Exclusion.
J. Inf. Sci. Eng., 1993

A new transformation method for nondominated coterie design.
Inf. Sci., 1993

Protocol Refinement for Maintaining Replicated Data in Distributed Systems.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

Ring-Connected Hypercubes and Their Relationship to Cubical Ring Connected Cycles and Dynamic Redundancy Networks.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Efficient Processor Assignment Algorithms and Loop Transformations for Executing Nested Parallel Loops on Multiprocessors.
IEEE Trans. Parallel Distributed Syst., 1992

A hybrid scheme for efficiently executing nested loops on multiprocessors.
Parallel Comput., 1992

Heuristic task assignment for distributed computing systems.
Inf. Sci., 1992

A Well-informed Approach to Distributed Task Assignment.
Comput. J., 1992

1991
Compiler Techniques for Extracting Loop-Level Parallelism.
J. Inf. Sci. Eng., 1991

A Scheduling Scheme for Efficiently Executing Hybrid Nested Loops.
Proceedings of the International Conference on Parallel Processing, 1991

Compiler techniques to extract parallelism within a nested loop.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1990
Structured partitioning of concurrent programs for execution on multiprocessors.
Parallel Comput., 1990

Design of robust linear state feedback laws: Ellipsoidal set-theoretic approach.
Autom., 1990

Self-adaptive neural architectures for control applications.
Proceedings of the IJCNN 1990, 1990

A neural network approach for Chinese character recognition.
Proceedings of the IJCNN 1990, 1990

1989
Minimization of task turnaround time for distributed systems.
Proceedings of the 13th Annual International Computer Software and Applications Conference, 1989


  Loading...