Tao Guo

According to our database1, Tao Guo authored at least 99 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Enabling 5G RAN Slicing With EDF Slice Scheduling.
IEEE Trans. Vehicular Technology, 2019

Finding Attribute-Aware Similar Region for Data Analysis.
PVLDB, 2019

Mobile Edge Assisted Live Streaming System for Omnidirectional Video.
Mobile Information Systems, 2019

Landslide Susceptibility Mapping Based on Weighted Gradient Boosting Decision Tree in Wanzhou Section of the Three Gorges Reservoir Area (China).
ISPRS Int. J. Geo-Information, 2019

On the Information Leakage in Private Information Retrieval Systems.
CoRR, 2019

An Attention-based Model for Joint Extraction of Entities and Relations with Implicit Entity Features.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

A Span-based Joint Model for Opinion Target Extraction and Target Sentiment Classification.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

SPL: Exploiting Unlabeled Data for Multi-label Image Classification.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

2018
On MIMO Linear Physical-Layer Network Coding: Full-Rate Full-Diversity Design and Optimization.
IEEE Trans. Wireless Communications, 2018

A Room-Temperature CNT/Fe3O4 Based Passive Wireless Gas Sensor.
Sensors, 2018

An Adaptive Method for Switching between Pedestrian/Car Indoor Positioning Algorithms based on Multilayer Time Sequences.
Sensors, 2018

A new global fuzzy fault-tolerant control for a double inverted pendulum based on time-delay replacement.
Neural Computing and Applications, 2018

The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding.
CoRR, 2018

Adaptive Optimization Design of Vector Error Diffusion Algorithm and IP Core for FPGA.
Proceedings of the 2018 IEEE SmartWorld, 2018

POIsam: a System for Efficient Selection of Large-scale Geospatial Data on Maps.
Proceedings of the 2018 International Conference on Management of Data, 2018

Efficient Selection of Geospatial Data on Maps for Interactive and Visualized Exploration.
Proceedings of the 2018 International Conference on Management of Data, 2018

Pose Specification Based Online Person Identification.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2018

Multimodal Fusion for Traditional Chinese Painting Generation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Symmetric Multilevel Imperfect Secret Sharing.
Proceedings of the IEEE Information Theory Workshop, 2018

The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding.
Proceedings of the 2018 Information Theory and Applications Workshop, 2018

SURGE: Continuous Detection of Bursty Regions over a Stream of Spatial Objects.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

C++ Memory Detection Tool Based on Dynamic Instrumentation.
Proceedings of the Advances in Internet, 2018

2017
Adaptive fuzzy decentralized control for uncertain large-scale nonlinear time-delay systems with virtual control functions.
Neural Computing and Applications, 2017

SURGE: Continuous Detection of Bursty Regions Over a Stream of Spatial Objects.
CoRR, 2017

Automatic parking slot detection based on around view monitor (AVM) systems.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Distributed Algorithms on Exact Personalized PageRank.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Enabling efficient content dissemination for cooperative vehicular networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Automatic Posture Alignment Method of Spacecraft in Docking Process of Solar Wing.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Prefetching-based content download for highway vehicular ad hoc networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

MuMs: Energy-Aware VM Selection Scheme for Cloud Data Center.
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017

A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Research on UPnP Protocol Security of Gateway Device.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Research on the Impact of Multimedia Computer-based English Teaching in High School.
iJET, 2016

Research on the effects of blasting vibration attenuation by pre-split crack with HHT method.
Comput. Syst. Sci. Eng., 2016

Integrity-oriented service scheduling for vehicle-to-roadside data access.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Multi-floor Indoor Navigation with Geomagnetic Field Positioning and Ant Colony Optimization Algorithm.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Extended Multiple Descriptions with Reconstruction Consistency Constraints.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Energy-Efficient WLAN Offloading Through Network Discovery Period Optimization.
IEEE Trans. Vehicular Technology, 2015

Efficient Processing of Spatial Group Keyword Queries.
ACM Trans. Database Syst., 2015

Numerical simulation of slot coupling of UWB to landmine shielding shell.
J. Comput. Meth. in Science and Engineering, 2015

A practical off-line taint analysis framework and its application in reverse engineering of file format.
Computers & Security, 2015

Efficient Algorithms for Answering the m-Closest Keywords Query.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

2014
A Novel Market Simulation Methodology on Hydro Storage.
IEEE Trans. Smart Grid, 2014

Backstepping control for output-constrained nonlinear systems based on nonlinear mapping.
Neural Computing and Applications, 2014

Behavior Classification based Self-learning Mobile Malware Detection.
JCP, 2014

Robust control reconfiguration of resource allocation systems with Petri nets and integer programming.
Automatica, 2014

SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

SymWalker: Symbolic Execution in Routines of Binary Code.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Analysis on Password Protection in Android Applications.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Local Mobility Management for Networked Femtocells Based on X2 Traffic Forwarding.
IEEE Trans. Vehicular Technology, 2013

Synthesis Algorithm of Homology Detection Based on AHP.
Int. J. Comput. Intell. Syst., 2013

Radio access network virtualization for future mobile carrier networks.
IEEE Communications Magazine, 2013

Optimal Network Discovery Period for Energy-Efficient WLAN Offloading.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Active LTE RAN Sharing with Partial Resource Reservation.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

Simplified Adaptive Fuzzy Decentralized Control for Uncertain Large-Scale Nonlinear Delayed Systems.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

A semi-supervised collaboration-training based on genetic algorithm for unlabeled data selection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
A two-dimensional architecture for end-to-end resource management in virtual network environments.
IEEE Network, 2012

Confidence Estimation for Graph-based Semi-supervised Learning.
JSW, 2012

Seamless Handover for LTE Macro-Femto Networks Based on Reactive Data Bicasting.
IEEE Communications Letters, 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

Optimal policy for joint spectrum resource management in multi-band cognitive radio networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

FSMesh - Flexibly Securing Mashups by User Defined DOM Environment.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Optimal Strategy for QoS Provision under Spectrum Mobility in Cognitive Radio Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

File Parsing Vulnerability Detection with Symbolic Execution.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

A behavior analysis based Mobile Malware Defense System.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

Supervisory control reconfiguration and optimization of resource allocation systems with a Petri net and mathematical programming approach.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Energy efficient ANDSF-assisted network discovery for non-3GPP access networks.
Proceedings of the 17th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2012

2011
Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification.
Journal of Multimedia, 2011

Analysis of spatial patterns in a vegetation model.
Applied Mathematics and Computation, 2011

Program Slicing Stored XSS Bugs in Web Application.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

5W1H-based Conceptual Modeling Framework for Domain Ontology and Its Application on STPO.
Proceedings of the Seventh International Conference on Semantics Knowledge and Grid (SKG 2011), 2011

Ontology Model-Based Static Analysis of Security Vulnerabilities.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Shared Backup Network Provision for Virtual Network Embedding.
Proceedings of IEEE International Conference on Communications, 2011

Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Policy-Aware Virtual relay placement for inter-domain path diversity.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Receptor editing-inspired negative selection algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Security Assurance with Metamorphic Testing and Genetic Algorithm.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Simplified adaptive fuzzy decentralized regulation for uncertain large-scale nonlinear delayed systems.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Rule Restriction in Event Descriptive Unit Identify.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
CRBAR: Cooperative relay-based auto rate MAC for multirate wireless networks.
IEEE Trans. Wireless Communications, 2009

Differentiated cooperative multiple access for multimedia communications over fading wireless networks.
IET Communications, 2009

Analysis of high frequency breakdown of noble gases in A MEMS-based Rb-87 lamp for miniaturized passive rubidium atomic clock.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Electron mobility in enhanced N-type silicon nanowire MOSFET.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

2008
Adaptive Affinity Propagation Clustering
CoRR, 2008

Performance of a Cooperative Relay-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A Differentiated Cooperative MAC for QoS enhancement in Wireless LANs.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Accelerating Computation of DNA Sequence Alignment in Distributed Environment.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

Adaptive Fuzzy Decentralized Control for a Class of Uncertain Large-Scale Time-Delay Nonlinear Systems.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Towards high accuracy road maps generation from massive GPS Traces data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Building Chinese Sense Annotated Corpus with the Help of Software Tools.
Proceedings of the Linguistic Annotation Workshop, 2007

2004
BSubLoc: database of protein subcellular localization.
Nucleic Acids Research, 2004

2002
The Consistency of an Access Control List.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2000
A two-level hybrid evolutionary algorithm for modeling one-dimensional dynamic systems by higher-order ODE models.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2000


  Loading...