Shuo Chen

According to our database1, Shuo Chen authored at least 78 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Detecting and testing altered brain connectivity networks with k-partite network topology.
Computational Statistics & Data Analysis, 2020

2019
A Non-Invasive Continuous Blood Pressure Estimation Approach Based on Machine Learning.
Sensors, 2019

An Adaptive Framework for Multi-Vehicle Ground Speed Estimation in Airborne Videos.
Remote Sensing, 2019

Redox Is a Global Biodevice Information Processing Modality.
Proceedings of the IEEE, 2019

Low-resolution palmprint image denoising by generative adversarial networks.
Neurocomputing, 2019

Verifiable Computing for Approximate Computation.
IACR Cryptology ePrint Archive, 2019

An Easily Fabricated Linear Piezoelectric Actuator Using Sandwich Longitudinal Vibrators With Four Driving Feet.
IEEE Access, 2019

GANSynth: Adversarial Neural Audio Synthesis.
Proceedings of the 7th International Conference on Learning Representations, 2019

A Power Grid Operations Monitoring Platform Based on Big Data Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Research on Construction Workers' Activity Recognition Based on Smartphone.
Sensors, 2018

A Joint Low-Power Cell Search and Frequency Tracking Scheme in NB-IoT Systems for Green Internet of Things.
Sensors, 2018

Model Predictive Control Method with Constant Switching Frequency to Reduce Common-Mode Voltage for PMSM Drives.
J. Electrical and Computer Engineering, 2018

Estimating large covariance matrix with network topology for high-dimensional biomedical data.
Computational Statistics & Data Analysis, 2018

We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards Optimal Operation State Scheduling in RF-Powered Internet of Things.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Potential Games Design Using Local Information.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

2017
Kalman Filtered Bio Heat Transfer Model Based Self-adaptive Hybrid Magnetic Resonance Thermometry.
IEEE Trans. Med. Imaging, 2017

Analytical Rotor Position Estimation for SRM Based on Scaling of Reluctance Characteristics From Torque-Balanced Measurement.
IEEE Trans. Industrial Electronics, 2017

Q-Charge: A Quadcopter-Based Wireless Charging Platform for Large-Scale Sensing Applications.
IEEE Network, 2017

Asynchronous Introspection Theory: The Underpinnings of Phenomenal Consciousness in Temporal Illusion.
Minds and Machines, 2017

An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems.
Computer Networks, 2017

ExPO: Exponential-Based Privacy Preserving Online Auction for Electric Vehicles Demand Response in Microgrid.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017


Deep Multi-species Embedding.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
Modeling and Experimental Analysis on the Temperature Response of AlN-Film Based SAWRs.
Sensors, 2016

Prediction of the Strain Response of Poly-AlN/(100)Si Surface Acoustic Wave Resonator and Experimental Analysis.
Sensors, 2016

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Security and Communication Networks, 2016

Translational shaking tests achieved on a 6-DOF hydraulic parallel manipulator.
Industrial Robot, 2016

Design of low-complexity vector perturbation precoding technique for multiuser MIMO systems.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Visual domain adaptation using weighted subspace alignment.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

Demo: Mobile Wireless Charging and Sensing by Drones.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Online Topic-Aware Influence Maximization.
PVLDB, 2015

Rotational reset strategy for online semi-supervised NMF-based speech enhancement for long recordings.
Proceedings of the 2015 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2015

Cookies Lack Integrity: Real-World Implications.
Proceedings of the 24th USENIX Security Symposium, 2015

An IoT Service Framework for Smart Home: Case Study on HEM.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

A Composite Cognitive Workload Assessment System in Pilots Under Various Task Demands Using Ensemble Learning.
Proceedings of the Foundations of Augmented Cognition, 2015

An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Schema Matching Based on Source Codes.
Proceedings of the Database Systems for Advanced Applications, 2015

Enlightening Ph.D. Students with the Elegance of Logic - My Personal Memory About Prof. José Meseguer.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
R3: A Real-Time Route Recommendation System.
PVLDB, 2014

Fusion of Gaussian mixture models for possible mismatches of sensor model.
Information Fusion, 2014

Track fusion in the presence of sensor biases.
IET Signal Processing, 2014

Efficient location-aware influence maximization.
Proceedings of the International Conference on Management of Data, 2014

Approximate Dynamic Programming Based Data Center Resource Dynamic Scheduling for Energy Optimization.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Input-adaptive parallel sparse fast fourier transform for stream processing.
Proceedings of the 2014 International Conference on Supercomputing, 2014

A random matrix based method for tracking multiple extended targets.
Proceedings of the 17th International Conference on Information Fusion, 2014

2013
An Input-Adaptive Algorithm for High Performance Sparse Fast Fourier Transform.
Proceedings of the Languages and Compilers for Parallel Computing, 2013

A hybrid GPU/CPU FFT library for large FFT problems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Fusion of possible biased local estimates in sensor network based on sensor selection.
Proceedings of the 16th International Conference on Information Fusion, 2013

Data Decomposition Based Partial Replication Model for Software Services.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Probabilistic Fuzzy System for Uncertain Localization and Map Building of Mobile Robots.
IEEE Trans. Instrumentation and Measurement, 2012

Determining functional connectivity using fMRI data with diffusion-based anatomical weighting.
NeuroImage, 2012

2011
A novel support vector classifier for longitudinal high-dimensional data and its application to neuroimaging data.
Statistical Analysis and Data Mining, 2011

Wave-spec: a preprocessing package for mass spectrometry data.
Bioinformatics, 2011

2010
Embodied concept formation and reasoning via neural-symbolic integration.
Neurocomputing, 2010

A world survey of artificial brain projects, Part II: Biologically inspired cognitive architectures.
Neurocomputing, 2010

A world survey of artificial brain projects, Part I: Large-scale brain simulations.
Neurocomputing, 2010

Software controlling algorithms for the system performance optimization of confocal laser scanning microscope.
Biomed. Signal Proc. and Control, 2010

How to Share Your Favourite Search Results while Preserving Privacy and Quality.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Secure Data Aggregation through Proactive Defense.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Residue objects: a challenge to web browser security.
Proceedings of the European Conference on Computer Systems, 2010

2009
Dynamic Difficulty Adjustment in Computer Games Through Real-Time Anxiety-Based Affective Feedback.
Int. J. Hum. Comput. Interaction, 2009

A novel comprehensive wave-form MS data processing method.
Bioinformatics, 2009

Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

2008
The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach.
Proceedings of the Artificial General Intelligence 2008, 2008

Modeling Service Quality for Dynamic QoS Publishing.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Wavelet-based procedures for proteomic mass spectrometry data processing.
Computational Statistics & Data Analysis, 2007

Automatic Recommendation of Quality Requirements for Software Services.
Proceedings of ICEBE 2007, 2007

Automatically Segregating Greedy and Malicious Internet Flows.
Proceedings of IEEE International Conference on Communications, 2007

An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006

Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
Proceedings of the Network and Distributed System Security Symposium, 2005

2001
A sensorless vector control system for induction motors using q-axis flux with stator resistance identification.
IEEE Trans. Industrial Electronics, 2001

Virtual Net: An Efficient Simulation for Parallel Computation.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001


  Loading...