Xiang He

According to our database1, Xiang He authored at least 67 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Bayesian Stochastic Kriging Optimization Model Dealing with Heteroscedastic Simulation Noise for Freeway Traffic Management.
Transportation Science, 2019

Locality and Structure Regularized Low Rank Representation for Hyperspectral Image Classification.
IEEE Trans. Geoscience and Remote Sensing, 2019

Open-sector rapid-reactive collision avoidance: Application in aerial robot navigation through outdoor unstructured environments.
Robotics and Autonomous Systems, 2019

3D MRI of whole-brain water permeability with intrinsic diffusivity encoding of arterial labeled spin (IDEALS).
NeuroImage, 2019

Robust Adaptive Graph Regularized Non-Negative Matrix Factorization.
IEEE Access, 2019

Innovations of Microcontroller Unit Based on Experiment.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

Non-Local Context Encoder: Robust Biomedical Image Segmentation against Adversarial Attacks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
A coarse-to-fine scene text detection method based on Skeleton-cut detector and Binary-Tree-Search based rectification.
Pattern Recognition Letters, 2018

One-cycle controlled quadratic buck converter.
I. J. Circuit Theory and Applications, 2018

Non-locally Enhanced Encoder-Decoder Network for Single Image De-raining.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Spectral-Spatial Hyperspectral Image Classification via Locality and Structure Constrained Low-Rank Representation.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Design, Modeling, and Analysis of Inductive Resonant Coupling Wireless Power Transfer for Micro Aerial Vehicles (MAVs).
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

2017
Optimal Time-Varying Pricing for Toll Roads Under Multiple Objectives: A Simulation-Based Optimization Approach.
Transportation Science, 2017

A novel motion monitoring system for activities of daily living.
EAI Endorsed Trans. Pervasive Health Technol., 2017

Maximizing throughput gain via resource allocation in D2D communications.
EURASIP J. Wireless Comm. and Networking, 2017

Scene text detection based on skeleton-cut detector.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Repetitive control design and implementation for periodic motion tracking in aerial robots.
Proceedings of the 2017 American Control Conference, 2017

2016
Leaf Classification Utilizing a Convolutional Neural Network with a Structure of Single Connected Layer.
Proceedings of the Intelligent Computing Theories and Application, 2016

A Transparent File Encryption Scheme Based on FUSE.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Portable 3D visual sensor based indoor localization on mobile device.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device.
Sensors, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States.
IEEE Trans. Information Theory, 2014

Providing Secrecy With Structured Codes: Two-User Gaussian Channels.
IEEE Trans. Information Theory, 2014

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Communications, 2014

Surrogate-Based Optimization of Expensive-to-Evaluate Objective for Optimal Highway Toll Charges in Transportation Network.
Comp.-Aided Civil and Infrastruct. Engineering, 2014

WiFi iLocate: WiFi based indoor localization for smartphone.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

WiFi based indoor localization with adaptive motion model using smartphone motion sensors.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
End-to-End Secure Multi-Hop Communication with Untrusted Relays.
IEEE Trans. Wireless Communications, 2013

The Role of Feedback in Two-Way Secure Communications.
IEEE Trans. Information Theory, 2013

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Information Theory, 2013

MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Information Theory, 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

The research and implementation of customised launcher in Android.
IJWMC, 2013

Association Link Network Based Core Events Discovery on the Web.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

A flow admission control scheme for QoS in wireless ad hoc networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Text Semantic Mining Model Based on the Algebra of Human Concept Learning.
IJCINI, 2011

Secrecy when the eavesdropper controls its channel states.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011

Model Interactive Search between User and Associated Link Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

MIMO multiple access channel with an arbitrarily varying eavesdropper.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Cooperation with an untrusted relay: a secrecy perspective.
IEEE Trans. Information Theory, 2010

Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2010

The role of channel states in secret key generation.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010

Providing Secrecy Irrespective of Eavesdropper's Channel State.
Proceedings of the Global Communications Conference, 2010

2009
Two-Hop Secure Communication Using an Untrusted Relay.
EURASIP J. Wireless Comm. and Networking, 2009

K-user interference channels: Achievable secrecy rate and degrees of freedom.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Secure communication with a Byzantine relay.
Proceedings of the IEEE International Symposium on Information Theory, 2009

The Gaussian many-to-one interference channel with confidential messages.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A new outer bound for the gaussian interference channel with confidential messages.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
The role of an untrusted relay in secret communication.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008

Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the energy-delay trade-off of a two-way relay network.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Efficient Fast Algorithm for MQ Arithmetic Coder.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
IEICE Transactions, 2006

2005
Fast acquisition of dense depth data by a new structured light scheme.
Computer Vision and Image Understanding, 2005

Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

2002
Dense depth map acquisition by hierarchic structured light.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

2000
Performance Analysis of Parallel Query Processing Algorithms for Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 2000


  Loading...