Xiang He

Orcid: 0000-0003-0740-0253

According to our database1, Xiang He authored at least 125 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MSAT: biologically inspired multistage adaptive threshold for conversion of spiking neural networks.
Neural Comput. Appl., May, 2024

Lightweight and Real-Time Infrared Image Processor Based on FPGA.
Sensors, February, 2024

Fault Diagnosis of Highway Machinery Hydraulic System Based on LS-TF.
IEEE Trans. Instrum. Meas., 2024

SA-GS: Scale-Adaptive Gaussian Splatting for Training-Free Anti-Aliasing.
CoRR, 2024

Brain-inspired and Self-based Artificial Intelligence.
CoRR, 2024

Efficient Training Spiking Neural Networks with Parallel Spiking Unit.
CoRR, 2024

An Efficient Knowledge Transfer Strategy for Spiking Neural Networks from Static to Event Domain.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Advanced FEC for 200 Gb/s Transceiver in 800 GbE and 1.6 TbE Standard.
IEEE Commun. Stand. Mag., September, 2023

AI-based energy-efficient path planning of multiple logistics UAVs in intelligent transportation systems.
Comput. Commun., July, 2023

An energy-efficient classification system for peach ripeness using YOLOv4 and flexible piezoelectric sensor.
Comput. Electron. Agric., July, 2023

An Integrated Single-Beam Three-Axis High-Sensitivity Magnetometer.
Sensors, March, 2023

EmAtlas: a comprehensive atlas for exploring spatiotemporal activation in mammalian embryogenesis.
Nucleic Acids Res., January, 2023

Online Deployment Algorithms for Microservice Systems With Complex Dependencies.
IEEE Trans. Cloud Comput., 2023

Detection and filling of functional holes in microservice systems: Method and infrastructure support.
Inf. Softw. Technol., 2023

A Survey on Deep Neural Network Partition over Cloud, Edge and End Devices.
CoRR, 2023

MSAT: Biologically Inspired Multi-Stage Adaptive Threshold for Conversion of Spiking Neural Networks.
CoRR, 2023

Improving the Performance of Spiking Neural Networks on Event-based Datasets with Knowledge Transfer.
CoRR, 2023

EvolutionSim: An Extensible Simulation Toolkit for Microservice System Evolution.
Proceedings of the IEEE International Conference on Web Services, 2023

ServiceSim: A Modelling and Simulation Toolkit of Microservice Systems in Cloud-Edge Environment.
Proceedings of the Service-Oriented Computing - 21st International Conference, 2023

Predicting Effect and Cost of Microservice System Evolution Using Graph Neural Network.
Proceedings of the Service-Oriented Computing - 21st International Conference, 2023

HSMS-ADP: Adaptive DNNs Partitioning for End-Edge Collaborative Inference in High-Speed Mobile Scenarios.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Adaptive Deep Inference Framework for Cloud-Edge Collaboration.
Proceedings of the International Conference on Computers, 2023

2022
Design and Trajectory Tracking Control of a New Bi-Copter UAV.
IEEE Robotics Autom. Lett., 2022

Robust Bi-Stochastic Graph Regularized Matrix Factorization for Data Clustering.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Stochastic circuit synthesis via satisfiability.
Integr., 2022

Multi-agent system optimisation in factories of the future: cyber collaborative warehouse study.
Int. J. Prod. Res., 2022

RescureService: A Benchmark Microservice System for the Research of Mobile Edge and Cloud Computing.
CoRR, 2022

Spike Calibration: Fast and Accurate Conversion of Spiking Neural Network for Object Detection and Segmentation.
CoRR, 2022

A Conceptual Model Supporting Systematic Design of Service Governance Systems.
Proceedings of the IEEE International Conference on Service-Oriented System Engineering, 2022

The Effect of Online Review Valence and Scarcity Message on Purchase Intention: An Anticipated Regret Perspective.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022

2021
Using Improved Edge Detection Method to Detect Mining-Induced Ground Fissures Identified by Unmanned Aerial Vehicle Remote Sensing.
Remote. Sens., 2021

Programming framework and infrastructure for self-adaptation and optimized evolution method for microservice systems in cloud-edge environments.
Future Gener. Comput. Syst., 2021

Magic Pyramid: Accelerating Inference with Early Exiting and Token Pruning.
CoRR, 2021

PAM: Understanding Product Images in Cross Product Category Attribute Extraction.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

An Empirical Study on Underlying Correlations between Runtime Performance Deficiencies and "Bad Smells" of Microservice Systems.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

CHASE: Commonsense-Enriched Advertising on Search Engine with Explicit Knowledge.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

EPF4M: An Evolution-Oriented Programming Framework for Microservices.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
Reproducibility assessment of neuromelanin-sensitive magnetic resonance imaging protocols for region-of-interest and voxelwise analyses.
NeuroImage, 2020

基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model).
计算机科学, 2020

Decentralized Multi-agent information-theoretic control for target estimation and localization: finding gas leaks.
Int. J. Robotics Res., 2020

AutoKnow: Self-Driving Knowledge Collection for Products of Thousands of Types.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Optimal Evolution Planning and Execution for Multi-version Coexisting Microservice Systems.
Proceedings of the Service-Oriented Computing - 18th International Conference, 2020

Survey on Requirement-Driven Microservice System Evolution.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

MV4MS: A Spring Cloud based Framework for the Co-Deployment of Multi-Version Microservices.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
A Bayesian Stochastic Kriging Optimization Model Dealing with Heteroscedastic Simulation Noise for Freeway Traffic Management.
Transp. Sci., 2019

Locality and Structure Regularized Low Rank Representation for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2019

Autonomous Chemical-Sensing Aerial Robot for Urban/Suburban Environmental Monitoring.
IEEE Syst. J., 2019

Open-sector rapid-reactive collision avoidance: Application in aerial robot navigation through outdoor unstructured environments.
Robotics Auton. Syst., 2019

3D MRI of whole-brain water permeability with intrinsic diffusivity encoding of arterial labeled spin (IDEALS).
NeuroImage, 2019

Robust Adaptive Graph Regularized Non-Negative Matrix Factorization.
IEEE Access, 2019

Platform Discount Deciding, Seller Pricing and Advertising Investment in the Shopping Festival Based on Two-Sided Market Theory.
Proceedings of the Smart Business: Technology and Data Enabled Innovative Business Models and Practices, 2019

Social Media or Website? Research on Online Advertising Type Based on Evolutionary Game.
Proceedings of the Smart Business: Technology and Data Enabled Innovative Business Models and Practices, 2019

Innovations of Microcontroller Unit Based on Experiment.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

Re-deploying Microservices in Edge and Cloud Environment for the Optimization of User-Perceived Service Quality.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

Study on the Connectivity of Language Network in Word Reading and Object Recognition Based on tfMRI.
Proceedings of the Brain Informatics - 12th International Conference, 2019

Non-Local Context Encoder: Robust Biomedical Image Segmentation against Adversarial Attacks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
A coarse-to-fine scene text detection method based on Skeleton-cut detector and Binary-Tree-Search based rectification.
Pattern Recognit. Lett., 2018

One-cycle controlled quadratic buck converter.
Int. J. Circuit Theory Appl., 2018

Non-locally Enhanced Encoder-Decoder Network for Single Image De-raining.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Spectral-Spatial Hyperspectral Image Classification via Locality and Structure Constrained Low-Rank Representation.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Design, Modeling, and Analysis of Inductive Resonant Coupling Wireless Power Transfer for Micro Aerial Vehicles (MAVs).
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

2017
Optimal Time-Varying Pricing for Toll Roads Under Multiple Objectives: A Simulation-Based Optimization Approach.
Transp. Sci., 2017

A novel motion monitoring system for activities of daily living.
EAI Endorsed Trans. Pervasive Health Technol., 2017

Maximizing throughput gain via resource allocation in D2D communications.
EURASIP J. Wirel. Commun. Netw., 2017

Scene text detection based on skeleton-cut detector.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Repetitive control design and implementation for periodic motion tracking in aerial robots.
Proceedings of the 2017 American Control Conference, 2017

2016
Leaf Classification Utilizing a Convolutional Neural Network with a Structure of Single Connected Layer.
Proceedings of the Intelligent Computing Theories and Application, 2016

A Transparent File Encryption Scheme Based on FUSE.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Portable 3D visual sensor based indoor localization on mobile device.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device.
Sensors, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States.
IEEE Trans. Inf. Theory, 2014

Providing Secrecy With Structured Codes: Two-User Gaussian Channels.
IEEE Trans. Inf. Theory, 2014

MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Commun., 2014

Surrogate-Based Optimization of Expensive-to-Evaluate Objective for Optimal Highway Toll Charges in Transportation Network.
Comput. Aided Civ. Infrastructure Eng., 2014

WiFi iLocate: WiFi based indoor localization for smartphone.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

WiFi based indoor localization with adaptive motion model using smartphone motion sensors.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
End-to-End Secure Multi-Hop Communication with Untrusted Relays.
IEEE Trans. Wirel. Commun., 2013

The Role of Feedback in Two-Way Secure Communications.
IEEE Trans. Inf. Theory, 2013

Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay.
IEEE Trans. Inf. Theory, 2013

MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom.
IEEE Trans. Inf. Theory, 2013

Cooperative Security at the Physical Layer: A Summary of Recent Advances.
IEEE Signal Process. Mag., 2013

The research and implementation of customised launcher in Android.
Int. J. Wirel. Mob. Comput., 2013

Association Link Network Based Core Events Discovery on the Web.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
The Gaussian interference wiretap channel when the eavesdropper channel is arbitrarily varying.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

A flow admission control scheme for QoS in wireless ad hoc networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
The Gaussian Many-to-One Interference Channel With Confidential Messages.
IEEE Trans. Inf. Theory, 2011

Text Semantic Mining Model Based on the Algebra of Human Concept Learning.
Int. J. Cogn. Informatics Nat. Intell., 2011

Secrecy when the eavesdropper controls its channel states.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Gaussian two-way wiretap channel with an arbitrarily varying eavesdropper.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom.
Proceedings of the Global Communications Conference, 2011

Model Interactive Search between User and Associated Link Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

MIMO multiple access channel with an arbitrarily varying eavesdropper.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Cooperation with an untrusted relay: a secrecy perspective.
IEEE Trans. Inf. Theory, 2010

Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
CoRR, 2010

The Gaussian Many-to-1 Interference Channel with Confidential Messages
CoRR, 2010

The role of channel states in secret key generation.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel.
Proceedings of IEEE International Conference on Communications, 2010

Providing Secrecy Irrespective of Eavesdropper's Channel State.
Proceedings of the Global Communications Conference, 2010

Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Two-Hop Secure Communication Using an Untrusted Relay.
EURASIP J. Wirel. Commun. Netw., 2009

Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
CoRR, 2009

K-user interference channels: Achievable secrecy rate and degrees of freedom.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Secure communication with a Byzantine relay.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Geological Spatial Data Mining Basing on Web Geological Database.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

A new outer bound for the gaussian interference channel with confidential messages.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Interference channels with strong secrecy.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
The role of an untrusted relay in secret communication.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels.
Proceedings of IEEE International Conference on Communications, 2008

Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the energy-delay trade-off of a two-way relay network.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

Providing secrecy with lattice codes.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

On the role of feedback in two-way secure communication.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

End-to-end secure multi-hop communication with untrusted relays is possible.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2007
Efficient Fast Algorithm for MQ Arithmetic Coder.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
IEICE Trans. Commun., 2006

2005
Fast acquisition of dense depth data by a new structured light scheme.
Comput. Vis. Image Underst., 2005

Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

2002
Dense depth map acquisition by hierarchic structured light.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

2000
Performance Analysis of Parallel Query Processing Algorithms for Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 2000


  Loading...