Xiang Lu

According to our database1, Xiang Lu authored at least 86 papers between 2003 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Dual-View Conditional Variational Auto-Encoder for Emotional Dialogue Generation.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

System reliability of a gravity dam-foundation system using Bayesian networks.
Reliab. Eng. Syst. Saf., 2022

An integrated fuzzy decision support system for analyzing challenges and pathways to promote green and climate smart mining.
Expert Syst. Appl., 2022

Quantum speedup dynamics process without non-Markovianity.
Quantum Inf. Process., 2021

On Bayesian Analysis of Parsimonious Gaussian Mixture Models.
J. Classif., 2021

A predictive paradigm for COVID-19 prognosis based on the longitudinal measure of biomarkers.
Briefings Bioinform., 2021

Device-free crowd counting with WiFi channel state information and deep neural networks.
Wirel. Networks, 2020

A Host-Based Anomaly Detection Framework Using XGBoost and LSTM for IoT Devices.
Wirel. Commun. Mob. Comput., 2020

WiFlowCount: Device-Free People Flow Counting by Exploiting Doppler Effect in Commodity WiFi.
IEEE Syst. J., 2020

A three-tier redundant architecture for safe and reliable cloud-based CNC over public internet networks.
Robotics Comput. Integr. Manuf., 2020

Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review.
BMC Medical Informatics Decis. Mak., 2020

Phone Position Independent Recognition of FineWalking Modes with Phone Sensors.
Ad Hoc Sens. Wirel. Networks, 2020

A Novel Framework for Improving Pulse-Coupled Neural Networks With Fuzzy Connectedness for Medical Image Segmentation.
IEEE Access, 2020

RF-Drone: Multi-Tag System for RF-ID Enables Drone Tracking in GPS-Denied Environments.
IEICE Trans. Commun., 2019

Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation.
Comput. Networks, 2019

Ensemble Learning Regression for Estimating Unconfined Compressive Strength of Cemented Paste Backfill.
IEEE Access, 2019

Prediction of Ecological Pressure on Resource-Based Cities Based on an RBF Neural Network Optimized by an Improved ABC Algorithm.
IEEE Access, 2019

Feature Fusion-Based Multi-Task ConvNet for Simultaneous Optical Performance Monitoring and Bit-Rate/Modulation Format Identification.
IEEE Access, 2019

Distribution Characteristics of Fragments Size and Optimization of Blasting Parameters Under Blasting Impact Load in Open-Pit Mine.
IEEE Access, 2019

Research on Pricing Mechanism and Security of Digital Currency.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Study on Acttive Filter Based on Memristor and Memcapacitor.
Proceedings of the Fifteenth International Conference on Wireless and Optical Communications Networks, 2018

Device-Free Localization Based on CSI Fingerprints and Deep Neural Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

ViMediaNet: an emulation system for interactive multimedia based telepresence services.
J. Supercomput., 2017

Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Netw. Appl., 2017

基于PKI体系的跨域密钥协商协议 (Cross-domain PKI-based Key Agreement Protocol).
计算机科学, 2017

A quantitative design methodology for high-speed interpolation/averaging ADCs.
Integr., 2017

Slacks-Based Efficiency Measurements with Undesirable Outputs in Data Envelopment Analysis.
Int. J. Inf. Technol. Decis. Mak., 2017

CSI fingerprinting with SVM regression to achieve device-free passive localization.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2017

Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

How they interact? Understanding cyber and physical interactions against fault propagation in smart grid.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Netw. Appl., 2016

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
KSII Trans. Internet Inf. Syst., 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

A practical, fast, and low-cost kinematic calibration scheme for a deformable manipulator by using Leap Motion.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reliability demonstration methodology for products with Gamma Process by optimal accelerated degradation testing.
Reliab. Eng. Syst. Saf., 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

Smooth path planning for a home service robot using η<sup>3</sup>-splines.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Self-calibration of deformable arm with a monocular camera.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Whole-body pose estimation in physical rider-bicycle interactions with a monocular camera and a set of wearable gyroscopes.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Efficient localization based on imprecise anchors in RFID system.
Proceedings of the IEEE International Conference on Communications, 2014

Performance of Space Network Time Synchronization Protocol in Proximity Link.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation.
IEEE Trans. Smart Grid, 2013

An Engine for Automatic Code Generation of Security Protocols in Multiple Languages.
Smart Comput. Rev., 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

iFridge: an intelligent fridge for food management based on RFID technology.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Electrophoresis-based motion planning and control of a nanowire in fluid suspension.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

Quantitative analysis for high speed interpolated/averaging ADC.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems.
Int. J. Distributed Sens. Networks, 2012

Development of distributed grid intelligence platform for solid state transformer.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Modeling and control architecture for the competitive networked robot system based on POMDP.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2012

Authentications and Key Management in 3G-WLAN Interworking.
Mob. Networks Appl., 2011

Talk to transformers: An empirical study of device communications for the FREEDM system.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

Modeling Power Supply Noise in Delay Testing.
IEEE Des. Test Comput., 2007

The Application of Watersnakes Algorithm in Segmentation of the Hippocampus from Brain MR Image.
Proceedings of the Medical Imaging and Informatics, 2nd International Conference, 2007

An Algorithm for Constructing All Families of Codes of Arbitrary Requirement in an OCDMA System
CoRR, 2006

Why Ti=4Td for PID Controller Tuning.
Proceedings of the Ninth International Conference on Control, 2006

Fault modeling, delay evaluation and path selection for delay test under process variation in nano-scale VLSI circuits.
PhD thesis, 2005

Longest-path selection for delay test under process variation.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005

Simple and optimal output-sensitive construction of contour trees using monotone paths.
Comput. Geom., 2005

Static Compaction of Delay Tests Considering Power Supply Noise.
Proceedings of the 23rd IEEE VLSI Test Symposium (VTS 2005), 2005

A vector-based approach for power supply noise analysis in test compaction.
Proceedings of the Proceedings 2005 IEEE International Test Conference, 2005

A Statistical Fault Coverage Metric for Realistic Path Delay Faults.
Proceedings of the 22nd IEEE VLSI Test Symposium (VTS 2004), 2004

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide.
Proceedings of the Fifth International Workshop on Microprocessor Test and Verification (MTV 2004), 2004

PARADE: PARAmetric Delay Evaluation under Process Variation.
Proceedings of the 5th International Symposium on Quality of Electronic Design (ISQED 2004), 2004

A circuit level fault model for resistive bridges.
ACM Trans. Design Autom. Electr. Syst., 2003

Progressive Simplification of Tetrahedral Meshes Preserving All Isosurface Topologies.
Comput. Graph. Forum, 2003

A Circuit Level Fault Model for Resistive Opens and Bridges.
Proceedings of the 21st IEEE VLSI Test Symposium (VTS 2003), 27 April, 2003

Process variation dimension reduction based on SVD.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

CodSim -- A Combined Delay Fault Simulator.
Proceedings of the 18th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2003), 2003