Xi Tan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2020
H<sub>∞</sub> Consensus for Multiagent-Based Supply Chain Systems Under Switching Topology and Uncertain Demands.
IEEE Trans. Syst. Man Cybern. Syst., 2020

An interpretable mortality prediction model for COVID-19 patients.
Nat. Mach. Intell., 2020

2018
Bayesian Nonparametrics to Model Content, User, and Latent Structure in Hawkes Processes
PhD thesis, 2018

Optimizing Ad Refresh In Mobile App Advertising.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

The Indian Buffet Hawkes Process to Model Evolving Latent Influences.
Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, 2018

Nested CRP with Hawkes-Gaussian Processes.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2018

2016
Content-based Modeling of Reciprocal Relationships using Hawkes and Gaussian Processes.
Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence, 2016

2013
Improving feature location using structural similarity and iterative graph mapping.
J. Syst. Softw., 2013

2012
SCUTA: a server-side access control system for web applications.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Automated Analysis of Fundamental Features of Brain Structures.
Neuroinformatics, 2011

Cryptographic link signatures for spectrum usage authentication in cognitive radio.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Assessing Software Quality by Program Clustering and Defect Prediction.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Position paper: why are there so many vulnerabilities in web applications?
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Iterative context-aware feature location.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Re-designing the Web's Access Control System - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2008
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Heuristic Approach to Caption Enhancement for Effective Video OCR.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

2007
Image Denoising Based on the Ridgelet Frame Using the Generalized Cross Validation Technique.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Ingredient Separation of Natural Images: A Multiple Transform Domain Method Based on Sparse Coding Strategy.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007


  Loading...