Xiang He

According to our database1, Xiang He authored at least 72 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A coarse-to-fine scene text detection method based on Skeleton-cut detector and Binary-Tree-Search based rectification.
Pattern Recognition Letters, 2018

One-cycle controlled quadratic buck converter.
I. J. Circuit Theory and Applications, 2018

Non-locally Enhanced Encoder-Decoder Network for Single Image De-raining.
CoRR, 2018

Non-locally Enhanced Encoder-Decoder Network for Single Image De-raining.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Design, Modeling, and Analysis of Inductive Resonant Coupling Wireless Power Transfer for Micro Aerial Vehicles (MAVs).
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

2017
Optimal Time-Varying Pricing for Toll Roads Under Multiple Objectives: A Simulation-Based Optimization Approach.
Transportation Science, 2017

Scene text detection based on skeleton-cut detector.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Repetitive control design and implementation for periodic motion tracking in aerial robots.
Proceedings of the 2017 American Control Conference, 2017

2016
Leaf Classification Utilizing a Convolutional Neural Network with a Structure of Single Connected Layer.
Proceedings of the Intelligent Computing Theories and Application, 2016

A Transparent File Encryption Scheme Based on FUSE.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Portable 3D visual sensor based indoor localization on mobile device.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device.
Sensors, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States.
IEEE Trans. Information Theory, 2014

Providing Secrecy With Structured Codes: Two-User Gaussian Channels.
IEEE Trans. Information Theory, 2014

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Communications, 2014

Surrogate-Based Optimization of Expensive-to-Evaluate Objective for Optimal Highway Toll Charges in Transportation Network.
Comp.-Aided Civil and Infrastruct. Engineering, 2014

WiFi iLocate: WiFi based indoor localization for smartphone.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

WiFi based indoor localization with adaptive motion model using smartphone motion sensors.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
End-to-End Secure Multi-Hop Communication with Untrusted Relays.
IEEE Trans. Wireless Communications, 2013

The Role of Feedback in Two-Way Secure Communications.
IEEE Trans. Information Theory, 2013

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Information Theory, 2013

MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Information Theory, 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

The research and implementation of customised launcher in Android.
IJWMC, 2013

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
CoRR, 2013

Association Link Network Based Core Events Discovery on the Web.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper
CoRR, 2012

The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

A flow admission control scheme for QoS in wireless ad hoc networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
The Gaussian Many-to-One Interference Channel With Confidential Messages.
IEEE Trans. Information Theory, 2011

Text Semantic Mining Model Based on the Algebra of Human Concept Learning.
IJCINI, 2011

Secrecy when the eavesdropper controls its channel states.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011

Model Interactive Search between User and Associated Link Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

MIMO multiple access channel with an arbitrarily varying eavesdropper.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Cooperation with an untrusted relay: a secrecy perspective.
IEEE Trans. Information Theory, 2010

Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2010

MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
CoRR, 2010

The Gaussian Many-to-1 Interference Channel with Confidential Messages
CoRR, 2010

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
CoRR, 2010

The role of channel states in secret key generation.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010

Providing Secrecy Irrespective of Eavesdropper's Channel State.
Proceedings of the Global Communications Conference, 2010

2009
Two-Hop Secure Communication Using an Untrusted Relay.
EURASIP J. Wireless Comm. and Networking, 2009

The Role of Feedback in Two-way Secure Communications
CoRR, 2009

Two-hop Secure Communication Using an Untrusted Relay
CoRR, 2009

Interference Channels with Strong Secrecy
CoRR, 2009

Cooperation with an Untrusted Relay: A Secrecy Perspective
CoRR, 2009

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
CoRR, 2009

Providing Secrecy with Lattice Codes
CoRR, 2009

K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom
CoRR, 2009

The Gaussian Many-to-One Interference Channel with Confidential Messages
CoRR, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
CoRR, 2009

Secure communication with a Byzantine relay.
Proceedings of the IEEE International Symposium on Information Theory, 2009

The Gaussian many-to-one interference channel with confidential messages.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A new outer bound for the gaussian interference channel with confidential messages.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
The role of an untrusted relay in secret communication.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008

Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the energy-delay trade-off of a two-way relay network.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Efficient Fast Algorithm for MQ Arithmetic Coder.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
IEICE Transactions, 2006

2005
Fast acquisition of dense depth data by a new structured light scheme.
Computer Vision and Image Understanding, 2005

Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

2002
Dense depth map acquisition by hierarchic structured light.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

2000
Performance Analysis of Parallel Query Processing Algorithms for Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 2000


  Loading...