Tao Feng

According to our database1, Tao Feng authored at least 194 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Novel Data-Driven Cardiac Gating Signal Extraction Method for PET.
IEEE Trans. Med. Imaging, 2019

Constructions for Optimal Ferrers Diagram Rank-Metric Codes.
IEEE Trans. Information Theory, 2019

The Shift Bound for Abelian Codes and Generalizations of the Donoho-Stark Uncertainty Principle.
IEEE Trans. Information Theory, 2019

An Industrial Micro-Defect Diagnosis System via Intelligent Segmentation Region.
Sensors, 2019

Optimal granulation selection for similarity measure-based multigranulation intuitionistic fuzzy decision-theoretic rough sets.
Journal of Intelligent and Fuzzy Systems, 2019

Global analysis of a vector-host epidemic model in stochastic environments.
J. Franklin Institute, 2019

Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing.
I. J. Network Security, 2019

A Searchable CP-ABE Privacy Preserving Scheme.
I. J. Network Security, 2019

Optimal Multiply Constant-weight Codes from Generalized Howell Designs.
Graphs and Combinatorics, 2019

Fast assimilation of frequently acquired 4D seismic data for reservoir history matching.
Computers & Geosciences, 2019

On the existence of O'Nan configurations in ovoidal Buekenhout-Metz unitals in PG(2, q2).
Discrete Mathematics, 2019

Optimal 2-D (n × m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes.
Des. Codes Cryptogr., 2019

Analysis of a stochastic HIV-1 infection model with degenerate diffusion.
Applied Mathematics and Computation, 2019

Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection.
IEEE Access, 2019

Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

Route Choice Decisions of E-bike Users: Analysis of GPS Tracking Data in the Netherlands.
Proceedings of the Geospatial Technologies for Local and Regional Development, 2019

2018
Distributed Optimal Consensus Control for Nonlinear Multiagent System With Unknown Dynamic.
IEEE Trans. Neural Netw. Learning Syst., 2018

Self-Gating: An Adaptive Center-of-Mass Approach for Respiratory Gating in PET.
IEEE Trans. Med. Imaging, 2018

A New Access Control System Based on CP-ABE in Named Data Networking.
I. J. Network Security, 2018

A based on blinded CP-ABE searchable encryption cloud storage service scheme.
Int. J. Communication Systems, 2018

Multiuser access control searchable privacy-preserving scheme in cloud storage.
Int. J. Communication Systems, 2018

Multi-adjoint based group decision-making under an intuitionistic fuzzy information system Using LATEX.
Int. J. Comput. Intell. Syst., 2018

On the isotopism classes of the Budaghyan-Helleseth commutative semifields.
Finite Fields and Their Applications, 2018

New 2-designs from strong difference families.
Finite Fields and Their Applications, 2018

Research on trusted DNP3-BAE protocol based on hash chain.
EURASIP J. Wireless Comm. and Networking, 2018

Frame difference families and resolvable balanced incomplete block designs.
Des. Codes Cryptogr., 2018

Model Checking Optimal Infinite-Horizon Control for Probabilistic Gene Regulatory Networks.
IEEE Access, 2018

A Human-Tracking Robot Using Ultra Wideband Technology.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

Optimal Sensor Placement Based on System Reliability Criterion Under Epistemic Uncertainty.
IEEE Access, 2018

ODP: An Infrastructure for On-Demand Service Profiling.
Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, 2018

An Efficient and Anonymous KP-ABE Scheme with Keyword Search.
Proceedings of the Information Science and Applications 2018, 2018

An Indoor Sound Source Localization Dataset for Machine Learning.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

HAASD: A dataset of Household Appliances Abnormal Sound Detection.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Improving Low-Resource Neural Machine Translation with Weight Sharing.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2018

2017
Flexible distributed heterogeneous computing in traffic noise mapping.
Computers, Environment and Urban Systems, 2017

Optimal Output Regulation for Heterogeneous Multiagent Systems via Adaptive Dynamic Programming.
IEEE Trans. Neural Netw. Learning Syst., 2017

LQR-Based Optimal Distributed Cooperative Design for Linear Discrete-Time Multiagent Systems.
IEEE Trans. Neural Netw. Learning Syst., 2017

Multimodal Data fusion for SRGPS antenna motion error reduction.
Multimedia Tools Appl., 2017

Three-way decisions for composed set-valued decision tables.
Journal of Intelligent and Fuzzy Systems, 2017

Finite flag-transitive affine planes with a solvable automorphism group.
J. Comb. Theory, Ser. A, 2017

Decentralized adaptive tracking control scheme for nonlinear large-scale interconnected systems via adaptive dynamic programming.
Neurocomputing, 2017

Multimodal data fusion for SB-JPALS status prediction under antenna motion fault mode.
Neurocomputing, 2017

An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage.
Int. J. Communication Systems, 2017

Uncertainty and reduction of variable precision multigranulation fuzzy rough sets based on three-way decisions.
Int. J. Approx. Reasoning, 2017

Some new results on permutation polynomials over finite fields.
Des. Codes Cryptogr., 2017

A handheld diagnostic system for 6LoWPAN networks.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

EigenTrust for Hierarchically Structured Chord.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Design of a CMOS System-on-Chip for Passive, Near-Field Ultrasonic Energy Harvesting and Back-Telemetry.
IEEE Trans. VLSI Syst., 2016

Optimal decision of multi-inconsistent information systems based on information fusion.
Int. J. Machine Learning & Cybernetics, 2016

Variable precision multigranulation decision-theoretic fuzzy rough sets.
Knowl.-Based Syst., 2016

Reduced-order observer-based distributed tracking control for high-order multi-agent systems with heterogeneous leader.
J. Franklin Institute, 2016

A family of m-ovoids of parabolic quadrics.
J. Comb. Theory, Ser. A, 2016

Secure Content Delivery Scheme Based on Yaksha System for CCMANETs.
JCM, 2016

Globally optimal distributed cooperative control for general linear multi-agent systems.
Neurocomputing, 2016

Group Divisible Packings and Coverings with Any Minimum Leave and Minimum Excess.
Graphs and Combinatorics, 2016

Matching divisible designs with block size four.
Discrete Mathematics, 2016

Publish/subscribe scheme for content centric MANETs.
Comput. Sci. Inf. Syst., 2016

Characterizing apple picking patterns for robotic harvesting.
Computers and Electronics in Agriculture, 2016

Effective Multi-stream Joining in Apache Samza Framework.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
A Characterization of Two-Weight Projective Cyclic Codes.
IEEE Trans. Information Theory, 2015

Distributed Cooperative Optimal Control for Multiagent Systems on Directed Graphs: An Inverse Optimal Approach.
IEEE Trans. Cybernetics, 2015

Self-Powered Monitoring of Repeated Head Impacts Using Time-Dilation Energy Measurement Circuit.
IEEE Trans. Biomed. Circuits and Systems, 2015

A new method of formalizing anonymity based on protocol composition logic.
Security and Communication Networks, 2015

Differentiation of Eight Commercial Mushrooms by Electronic Nose and Gas Chromatography-Mass Spectrometry.
J. Sensors, 2015

Cameron-Liebler line classes with parameter x=(q2-1)/2.
J. Comb. Theory, Ser. A, 2015

Stability analysis of heuristic dynamic programming algorithm for nonlinear systems.
Neurocomputing, 2015

On homogeneous planar functions.
Finite Fields and Their Applications, 2015

A finite embedding theorem for partial Steiner 3-designs.
Finite Fields and Their Applications, 2015

Two-dimensional balanced sampling plans avoiding adjacent units.
Discrete Mathematics, 2015

New pseudo-planar binomials in characteristic two and related schemes.
Des. Codes Cryptogr., 2015

Semi-cyclic holey group divisible designs with block size three.
Des. Codes Cryptogr., 2015

Paley type sets from cyclotomic classes and Arasu-Dillon-Player difference sets.
Des. Codes Cryptogr., 2015

On the Existence of Certain Optimal Self-Dual Codes with Lengths Between 74 and 116.
Electr. J. Comb., 2015

Constructions of strongly regular Cayley graphs and skew Hadamard difference sets from cyclotomic classes.
Combinatorica, 2015

Consensus rate regulation for general linear multi-agent systems under directed topology.
Applied Mathematics and Computation, 2015

Feasibility of B-mode diagnostic ultrasonic energy transfer and telemetry to a cm2 sized deep-tissue implant.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Hybrid SDN architecture to integrate with legacy control and management plane: An experiences-based study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDN.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

A memory capacity model for high performing data-filtering applications in Samza framework.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Some New Results on the Cross Correlation of m-Sequences.
IEEE Trans. Information Theory, 2014

On the Weight Distribution of Cyclic Codes With Niho Exponents.
IEEE Trans. Information Theory, 2014

Mobile User Authentication Using Statistical Touch Dynamics Images.
IEEE Trans. Information Forensics and Security, 2014

Hybrid CMOS Rectifier Based on Synergistic RF-Piezoelectric Energy Scavenging.
IEEE Trans. on Circuits and Systems, 2014

A method of eliminating the signal-dependent random noise from the raw CMOS image sensor data based on Kalman filter.
Signal Processing, 2014

Superimposing activity-travel sequence conditions on GPS data imputation.
J. Location Based Services, 2014

The preconditioned Jacobian-free Newton-Krylov methods for nonequilibrium radiation diffusion equations.
J. Computational Applied Mathematics, 2014

Belief functions on general intuitionistic fuzzy information systems.
Inf. Sci., 2014

Model-free optimal control design for a class of linear discrete-time systems with multiple delays using adaptive dynamic programming.
Neurocomputing, 2014

The flower intersection problem for S(2, 4, v)'s.
Discrete Mathematics, 2014

Difference sets with few character values.
Des. Codes Cryptogr., 2014

Fast, Low-Memory Algorithm for Construction of Nanosecond Level Snapshots of Financial Markets.
Proceedings of the Annual Conference of the Extreme Science and Engineering Discovery Environment, 2014

TIPS: context-aware implicit user identification using touch screen in uncontrolled environments.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Reductions of Intuitionistic Fuzzy Covering Systems Based on Discernibility Matrices.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Joint allocation and scheduling of network resource for multiple control applications in SDN.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Eye contact reminder system for people with autism.
Proceedings of the 6th International Conference on Mobile Computing, 2014

USR: Enabling identity awareness and usable app access control during hand-free mobile interactions.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior.
Proceedings of the 6th International Conference on Mobile Computing, 2014

A communication protocol of man overboard system based on BeiDou.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Distributed LQR design for multi-agent systems on directed graph topologies.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Analysis on a Multi-objective Binary Disperse Bacterial Colony Chemotaxis Algorithm and Its Convergence.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014

Performing software defined route-based IP spoofing filtering with SEFA.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Multi resolution touch panel with built-in fingerprint sensing support.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Optimal 2-D (n×m, 3, 2, 1)-optical Orthogonal Codes.
IEEE Trans. Information Theory, 2013

The Weight Distribution of a Class of Cyclic Codes Related to Hermitian Forms Graphs.
IEEE Trans. Information Theory, 2013

Evaluation of the Weight Distribution of a Class of Cyclic Codes Based on Index 2 Gauss Sums.
IEEE Trans. Information Theory, 2013

Three-class association schemes from cyclotomy.
J. Comb. Theory, Ser. A, 2013

On linearization and preconditioning for radiation diffusion coupled to material thermal conduction equations.
J. Comput. Physics, 2013

The Development and Change of Teachers' Strategic Knowledge in Teachers' Online Community of Practice.
IJABIM, 2013

Metamorphosis of simple twofold triple systems into twofold (K4-e)(K4-e)-designs.
Electronic Notes in Discrete Mathematics, 2013

Metamorphosis of simple twofold triple systems into maximum twofold (K4-e)(K4-e)-packings.
Discrete Mathematics, 2013

Abelian and non-abelian Paley type group schemes.
Des. Codes Cryptogr., 2013

Query-Efficient Locally Decodable Codes of Subexponential Length.
Computational Complexity, 2013

Continuous Mobile Authentication Using Virtual Key Typing Biometrics.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Situational Awareness for Improving Network Resilience Management.
Proceedings of the Information Security Practice and Experience, 2013

Information fusion of multi-fuzzy information systems.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Continuous mobile authentication using a novel Graphic Touch Gesture Feature.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Investigating Mobile Device Picking-up motion as a novel biometric modality.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Cyclotomic constructions of skew Hadamard difference sets.
J. Comb. Theory, Ser. A, 2012

Strongly regular graphs from unions of cyclotomic classes.
J. Comb. Theory, Ser. B, 2012

The reduction and fusion of fuzzy covering systems based on the evidence theory.
Int. J. Approx. Reasoning, 2012

The fine triangle intersection problem for kite systems.
Discrete Mathematics, 2012

Pseudocyclic and non-amorphic fusion schemes of the cyclotomic association schemes.
Des. Codes Cryptogr., 2012

On cyclic codes of length 22r-1 with two zeros whose dual codes have three weights.
Des. Codes Cryptogr., 2012

Gene, pathway and network frameworks to identify epistatic interactions of single nucleotide polymorphisms derived from GWAS data.
BMC Systems Biology, 2012

Querying Provenance for Ranking and Recommending.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012

Artificial Emotion Model of Child Playmate Robot Based on a Combined Method.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

TUNOS: A novel SDN-oriented networking operating system.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Towards Quality Aware Collaborative Video Analytic Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Combinatorial Constructions for Optimal Two-Dimensional Optical Orthogonal Codes With Lambda =2.
IEEE Trans. Information Theory, 2011

Networking as a Service: a Cloud-based Network Architecture.
JNW, 2011

Non-abelian skew Hadamard difference sets fixed by a prescribed automorphism.
J. Comb. Theory, Ser. A, 2011

On finite difference approximation of a matrix-vector product in the Jacobian-free Newton-Krylov method.
J. Computational Applied Mathematics, 2011

Reductions of a fuzzy covering decision system.
IJMIC, 2011

The fine triangle intersection problem for K4-e-designs.
Discrete Mathematics, 2011

Association schemes arising from bent functions.
Des. Codes Cryptogr., 2011

OpenRouter: OpenFlow extension and implementation based on a commercial router.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Reduction of rough approximation space based on matroid.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

A SOOA Based Distributed Computing Mechanism for Road Traffic Noise Mapping.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

The belief and plausibility functions of incomplete fuzzy covering systems.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Under-determined blind source separation based on sub-band division.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

A quick survey on selected approaches for preparing programmable networks.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Reliability Modeling and Analysis of Clockless Wave Pipeline Core for Embedded Combinational Logic Design.
IEEE Trans. Instrumentation and Measurement, 2010

Strongly regular graphs associated with ternary bent functions.
J. Comb. Theory, Ser. A, 2010

Query-Efficient Locally Decodable Codes.
Electronic Colloquium on Computational Complexity (ECCC), 2010

The triangle intersection numbers of a pair of disjoint S(2, 4, v)s.
Discrete Mathematics, 2010

The triangle intersection problem for S(2, 4, v) designs.
Discrete Mathematics, 2010

Nonexistence of Some (945, 177, 33)-difference Sets.
Ars Comb., 2010

Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010

Predicting High-level Music Semantics Using Social Tags via Ontology-based Reasoning.
Proceedings of the 11th International Society for Music Information Retrieval Conference, 2010

A generalized model of covering rough sets and its application in medical diagnosis.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Changeable Threshold Signature Scheme Based on Lattice Theory.
Proceedings of the International Conference on E-Business and E-Government, 2010

The embedded GIS technology in LBS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A quickly constructing strategy for mathematical model based on mathematical templates in embedded GIS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

2009
UC-Secure Source Routing Protocol.
IACR Cryptology ePrint Archive, 2009

On self-orthogonal group ring codes.
Des. Codes Cryptogr., 2009

Difference sets with n = 5 p r .
Des. Codes Cryptogr., 2009

Note On (m, 2, m-1, m-2/2) Relative Difference Sets.
Ars Comb., 2009

Impact of Wireless IEEE802.11n Encryption Methods on Network Performance of Operating Systems.
Proceedings of the Second International Conference on Emerging Trends in Engineering & Technology, 2009

2008
Statistical analysis of mobile radio reception: an extension of clarke's model.
IEEE Trans. Communications, 2008

Semi-regular relative difference sets with large forbidden subgroups.
J. Comb. Theory, Ser. A, 2008

Constructions for strictly cyclic 3-designs and applications to optimal OOCs with lambda=2.
J. Comb. Theory, Ser. A, 2008

Generalized fuzzy rough sets determined by a triangular norm.
Inf. Sci., 2008

Two types of switchable lambda-fold (K4-e)-designs.
Discrete Mathematics, 2008

Codebooks from almost difference sets.
Des. Codes Cryptogr., 2008

A new approach for UC security concurrent deniable authentication.
Science in China Series F: Information Sciences, 2008

An efficient method to identify differentially expressed genes in microarray experiments.
Bioinformatics, 2008

Adaptive finite element methods for the identification of distributed parameters in elliptic equation.
Adv. Comput. Math., 2008

SMNDP: A Practical and Provably Secure Multi-path Source Routing.
Proceedings of the MSN 2008, 2008

A Secure and Efficient Group Key Agreement for Ad Hoc Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
A Generic Construction of Complex Codebooks Meeting the Welch Bound.
IEEE Trans. Information Theory, 2007

Stochastic Differential Equation Theory Applied to Wireless Channels.
IEEE Trans. Communications, 2007

Influenza Virus Database (IVDB): an integrated information resource and analysis platform for influenza virus research.
Nucleic Acids Research, 2007

Relative (pa, pb, pa, pa-b)-difference sets in p-subgroups of SL(n, K).
Finite Fields and Their Applications, 2007

Information-Theoretic Measure of Uncertainty in Generalized Fuzzy Rough Sets.
Proceedings of the Rough Sets, 2007

2006
Adaptive Finite Element Methods for the Identification of Elastic Constants.
J. Sci. Comput., 2006

Existence of Z-cyclic 3PTWh (p) for any Prime p congruent 1 (mod 4).
Des. Codes Cryptogr., 2006

Covering-Based Generalized Rough Fuzzy Sets.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Extracting a Simplified View of Design Functionality Based on Vector Simulation.
Proceedings of the Hardware and Software, 2006

Extracting a simplified view of design functionality via vector simulation.
Proceedings of the Eleventh Annual IEEE International High-Level Design Validation and Test Workshop 2006, 2006

2005
Using 2-domain partitioned OBDD data structure in an enhanced symbolic simulator.
ACM Trans. Design Autom. Electr. Syst., 2005

SilkDB: a knowledgebase for silkworm biology and genomics.
Nucleic Acids Research, 2005

Uncertainty in generalized fuzzy rough sets.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

2004
On using a 2-domain partitioned OBDD data structure in verification.
Proceedings of the Ninth IEEE International High-Level Design Validation and Test Workshop 2004, 2004

Improved Symoblic Simulation by Dynamic Funtional Space Partitioning.
Proceedings of the 2004 Design, 2004

Improved symbolic simulation by functional-space decomposition.
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004

2003
Enhanced Symbolic Simulation for Functional Verification of Embedded Array Systems.
Design Autom. for Emb. Sys., 2003

Correction and rectification of light fields.
Computers & Graphics, 2003

Enhanced symbolic simulation for efficient verification of embedded array systems.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

2002
Combining ATPG and Symbolic Simulation for Efficient Validation of Embedded Array Systems.
Proceedings of the Proceedings IEEE International Test Conference 2002, 2002

Stereo Computation Using Radial Adaptive Windows.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2000
Spatio-Temporal Segmentation for Video Surveillance.
Proceedings of the 15th International Conference on Pattern Recognition, 2000


  Loading...