Shuting Xu

Orcid: 0009-0007-1890-4779

According to our database1, Shuting Xu authored at least 33 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Automated detection of airflow obstructive diseases: A systematic review of the last decade (2013-2022).
Comput. Methods Programs Biomed., November, 2023

Heuristic position allocation methods for forming multiple UAV formations.
Eng. Appl. Artif. Intell., 2023

Integrating HCI in Web Technologies Course.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023

OdinDTA: Combining Mutual Attention and Pre-training for Drug-target Affinity Prediction.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

2022
Application of photoplethysmography signals for healthcare systems: An in-depth review.
Comput. Methods Programs Biomed., 2022

A review of automated sleep disorder detection.
Comput. Biol. Medicine, 2022

Heart rate variability for medical decision support systems: A review.
Comput. Biol. Medicine, 2022

A course-based undergraduate research experience project in information security.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022

2021
Analysis of students' database design skills in capstone projects.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

Cross courses pedagogy development in data analytics.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

2020
Mechanism Analysis of Smart Cue on Aircraft for Loss of Control Mitigation.
IEEE Access, 2020

An Autoencoder Based Insider Attack Detection in Imbalanced Data.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Modeling Human Pilot Behavior for Aircraft With a Smart Inceptor.
IEEE Trans. Hum. Mach. Syst., 2019

2018
A Deep Learning Based Framework for Cloud Masquerade Attack Detection.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Review of control models for human pilot behavior.
Annu. Rev. Control., 2017

Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data Centers.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Information Security Training Customized by Risk Profile.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
On periodic scheduling of fixed-slot bandwidth reservations for big data transfer.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

A Theoretical Model for Customizable Learning/Training to Enhance Individuals' Systems Security Behavior.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
An Optimal Least Significant Bit Based Image Steganography Algorithm.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

2009
Matrix Decomposition Techniques for Data Privacy.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy preserving churn prediction.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
A novel data distortion approach via selective SSVD for privacy protection.
Int. J. Inf. Comput. Secur., 2008

The relationship between the features of sparse matrix and the matrix solving status.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

An online condition number query system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Fast Fourier Transform Based Data Perturbation Method for Privacy Protection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Enhancing clustering blog documents by utilizing author/reader comments.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Singular value decomposition based data distortion strategy for privacy protection.
Knowl. Inf. Syst., 2006

Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006

2005
Matrix Condition Number Prediction with SVM Regression and Feature Selection.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Data Distortion for Privacy Protection in a Terrorist Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005

2004
A Parallel Hybrid Web Document Clustering Algorithm and its Performance Study.
J. Supercomput., 2004

A new data mining approach to predicting matrix condition numbers.
Commun. Inf. Syst., 2004


  Loading...