Xiangyang Li

According to our database1, Xiangyang Li authored at least 128 papers between 1994 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to performance analysis and resource allocation in wireless networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Prestack Waveform Inversion by Using an Optimized Linear Inversion Scheme.
IEEE Trans. Geoscience and Remote Sensing, 2019

Q Estimation by Combining ISD With LSR Method Based on Shaping-Regularized Inversion.
IEEE Geosci. Remote Sensing Lett., 2019

A novel hybrid localization scheme for deep mine based on wheel graph and chicken swarm optimization.
Computer Networks, 2019

Indoor Person Identification and Fall Detection through Non-intrusive Floor Seismic Sensing.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Understanding User Behaviors When Phishing Attacks Occur.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

An Analysis on the Weibo Topic "US-China Trade War" Based on K-Means Algorithm.
Proceedings of the Intelligent Systems and Applications, 2019

An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Augmenting Authentication with Context-Specific Behavioral Biometrics.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Cross-Site Scripting (XSS) Detection Integrating Evidences in Multiple Stages.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Review-Based User Profiling: A Systematic Mapping Study.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2019

Energy audition based cyber-physical attack detection system in IoT.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Real Time Wi-Fi Indoor Positioning System Based on RSSI Measurements: A Distributed Load Approach with the Fusion of Three Positioning Algorithms.
Wireless Personal Communications, 2018

Assessing Hydrological Modelling Driven by Different Precipitation Datasets via the SMAP Soil Moisture Product and Gauged Streamflow Data.
Remote Sensing, 2018

Application of Optimal Transport to Exact Zoeppritz Equation AVA Inversion.
IEEE Geosci. Remote Sensing Lett., 2018

Data compensation based on the additional feature information for collaborative interactive operation with optical human motion capture system.
IJMSSC, 2018

Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges.
IEEE Access, 2018

iPand: Accurate Gesture Input with Smart Acoustic Sensing on Hand.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Cybersecurity in liberal arts general education curriculum.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Evaluation of a Lead-Zinc Mine's Ventilation System Based on Unascertained Measurement Model.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

Imaging Subsurface Civil Infrastructure with Smart Seismic Network.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

iPand: Accurate Gesture Input with Ambient Acoustic Sensing on Hand.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Big Data Channel Awareness in Cooperative D2D Wireless Fusion Networks in IoT.
Proceedings of the Intelligent Systems and Applications, 2018

Research on the Degradation of Indian Regional Navigation Satellite System Based on STK.
Proceedings of the Intelligent Systems and Applications, 2018

Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Summary of Research on Blockchain in the Field of Intellectual Property.
Proceedings of the 2018 International Conference on Identification, 2018

Simulating Phishing Email Processing with Instance-Based Learning and Cognitive Chunk Activation.
Proceedings of the Brain Informatics - International Conference, 2018

2017
A Real-Time Passenger Flow Estimation and Prediction Method for Urban Bus Transit Systems.
IEEE Trans. Intelligent Transportation Systems, 2017

Analysis and Validation of Transmitter's Beam Footprint Detection and Tracking for Noncooperative Bistatic SAR.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2017

A New Distortion Correction Method for FMCW SAR Real-Time Imaging.
IEEE Geosci. Remote Sensing Lett., 2017

A novel joint optimization of downlink transmission using physical layer security in cooperative 5G wireless networks.
IJDSN, 2017

Hessian-constrained detail-preserving 3D implicit reconstruction from raw volumetric dataset.
Computers & Graphics, 2017

Development and Performance Evaluation of Filterbank Multicarrier Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Cooperative Downlink Resource Allocation in 5G Wireless Backhaul Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Time Lord: Covert Timing Channel Implementation and Realistic Experimentation.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Raising flags: Detecting covert storage channels using relative entropy.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

The Optimization of Forced Ventilation Parameters on Blind Roadway Based on Fluent Numerical Simulation.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Optimization Study of Ventilation Parameters in Roadway Type Stope Based on Fluent Software.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Psychological Empowerment and Work Effort: A Gender Based Cross-Cultural Comparison.
Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09, 2017

Fog computing middleware for distributed cooperative data analytics.
Proceedings of the IEEE Fog World Congress, 2017

Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

ViViSnoop: Someone is snooping your typing without seeing it!
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Cloudlet Placement and Minimum-Delay Routing in Cloudlet Computing.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Natural human-computer interaction control of multi operators in collaborative virtual maintenance based on optical human motion capture system.
IJMSSC, 2016

Channel aware spatial constellation design in VLC MIMO communication systems.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

Matching Theory for Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Martian - message broadcast via LED lights to heterogeneous smartphones: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Collaborative detection of Covert Storage Channels.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Cold Start Purchase Prediction with Budgets Constraints.
Proceedings of the 2nd International Workshop on Social Influence Analysis co-located with 25th International Joint Conference on Artificial Intelligence (IJCAI 2016), 2016

Prediction of Traffic Density and Interest Using Real Time Mobile Traffic Data.
Proceedings of the International Conference on Identification, 2016

Equivalent validation of beam footprint detection for non-cooperative bistatic SAR.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

The application of the method of TDOA localization in locating a human being behind corners based on the multistatic radar system.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

Multistatic radars locating a human being behind corners based on the method of mirror localization.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

Relationship Privacy Leakage in Network Traffics.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Mechanism design of generating the risk communication strategies responding food safety incidents.
Proceedings of the 12th IEEE International Conference on Control and Automation, 2016

OLITS: An Ohm's Law-like traffic splitting model based on congestion prediction.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Detail-Preserving 3D Shape Modeling from Raw Volumetric Dataset via Hessian-Constrained Local Implicit Surfaces Optimization.
Proceedings of the 2016 International Conference on Cyberworlds, 2016

Review of Heterogeneous Wireless Fusion in Mobile 5G Networks: Benefits and Challenges.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Keynote speech.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Simplified Real-Time Imaging Flow for High-Resolution FMCW SAR.
IEEE Geosci. Remote Sensing Lett., 2015

An Improved Method for the Modeling of Frequency-Dependent Amplitude-Versus-Offset Variations.
IEEE Geosci. Remote Sensing Lett., 2015

Lane Detection and Tracking Using a Parallel-snake Approach.
Journal of Intelligent and Robotic Systems, 2015

Minimized-expansion based lossless image authentication algorithm.
J. Ambient Intelligence and Humanized Computing, 2015

Real-time interactive motion control of virtual human in virtual maintenance based on limited information.
IJMSSC, 2015

A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure.
IJCIP, 2015

A novel case adaptation method based on an improved integrated genetic algorithm for power grid wind disaster emergencies.
Expert Syst. Appl., 2015

Interactive volumetric segmentation through least-squares optimization of local hessian-constrained implicits.
Proceedings of the 21st ACM Symposium on Virtual Reality Software and Technology, 2015

An SDN-supported collaborative approach for DDoS flooding detection and containment.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A statistical study of covert timing channels using network packet frequency.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

CBR Method for Risk Assessment on Power Grid Protection Under Natural Disasters: Case Representation and Retrieval.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Urban Power Network Vulnerability Assessment Based on Multi-attribute Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing.
IEEE Trans. Parallel Distrib. Syst., 2014

MC2: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring.
TOSN, 2014

Performance Evaluation of Frequency-Domain Algorithms for Chirped Low Frequency UWB SAR Data Processing.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2014

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.
J. Comput. Sci. Technol., 2014

SA-MAC: Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks.
J. Comput. Sci. Technol., 2014

Parallel-Snake with Balloon Force for Lane Detection.
IEICE Transactions, 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Scalability of control planes for Software defined networks: Modeling and evaluation.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Type-2 diabetes management using Analytic Hierarchy Process and Analytic Network Process.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

2013
Coherent analysis for radar signal generator.
IEICE Electronic Express, 2013

An integrative synchronization and imaging approach for bistatic spaceborne/stratospheric SAR with a fixed receiver.
EURASIP J. Adv. Sig. Proc., 2013

Intelligent Network Course Platform Based on Agent.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Design of Array Signal Processing System Based on TMS320C6678.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

On-road vehicle and pedestrian detection using improved codebook model.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2013

High precision 3D measurement using area modulated phase-shifting binary patterns.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Pattern Regulator: Protecting Temporal Usage Privacy for Wireless Body Area Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Rapid and accurate phase matching for 3D measurement.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Implementation and Transmission Error Handling of Multi-channel LVDS.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Discovery method on failure factors of collaborative allocation under power grid emergency.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Recognition of cough using features improved by sub-band energy transformation.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

5WTAG: Detecting the Topics of Chinese Microblogs Based on 5W Model.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Lossless Image Authentication Algorithm Based on Three-Compa Image Basic Blocks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Fiber-Optical Sensors: Basics and Applications in Multiphase Reactors.
Sensors, 2012

Preliminary study on noncooperative positioning using UWB impulse radio.
Proceedings of the IEEE International Conference on Ultra-Wideband, 2012

Through-wall localization with UWB sensor network.
Proceedings of the IEEE International Conference on Ultra-Wideband, 2012

2011
Investment Cost Analysis for Key Industries of New Energy Based on Boston Experience Curve.
Proceedings of the Modeling Risk Management in Sustainable Construction, 2011

Research on Algorithm of Image Processing of Butt Weld.
Proceedings of the Information Computing and Applications, 2011

Research on Key Technology of Collaborative Virtual Maintenance Training System in Large-Scale Complex Equipment.
Proceedings of the Advances in Computer Science, 2011

2010
Arithmetic Processing of Image of Weld Seam Based on Morphological Filtering.
Proceedings of the Information Computing and Applications - International Conference, 2010

Cluster supply chain cooperation based on multi-agent.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
The Effect of Notch Filter on RFI Suppression.
Wireless Sensor Network, 2009

Developing taxonomy and model for security centric supply chain management.
IJMTM, 2009

An Optimized Model for Blasting Parameters in Underground Mines' Deep-Hole Caving Based on Rough Set and Artificial Neural Network.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

2008
Inference Degradation of Active Information Fusion within Bayesian Network Models.
IJIIT, 2008

An Aspect Oriented Configuration Identification Model for Incremental Development.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Security Management Modeling in Collaborative Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Knowledge Discovery from Virtual Enterprise Model Based on Semantic Annotation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
A knowledge integration framework for complex network management.
Industrial Management and Data Systems, 2007

Efficient knowledge integration to support a complex supply network management.
IJMTM, 2007

IP multimedia subsystem converged call control services.
Bell Labs Technical Journal, 2007

2006
A Soft Sensor Based on Multiple Neural Networks Combined with Two Information Fusion Methods.
Proceedings of the Ninth International Conference on Control, 2006

Supply Chain Real Time Coordination Method Based on Buyback Contract with Fuzzy Random Demand.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

2005
Active affective State detection and user assistance with dynamic bayesian networks.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2005

A supervised clustering algorithm for computer intrusion detection.
Knowl. Inf. Syst., 2005

2004
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, 2004

User Affective State Assessment for HCI Systems.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
Ellipse-based shape description and retrieval method.
Science in China Series F: Information Sciences, 2002

2001
Probabilistic techniques for intrusion detection based on computer audit data.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2001

Decision Tree Classifiers for Computer Intrusion Detection.
Scalable Computing: Practice and Experience, 2001

A Machine Learning Algorithm Based on Supervised Clustering and Classification.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001

2000
Color Restoration and Image Retrieval for Dunhuang Fresco Preservation.
IEEE MultiMedia, 2000

Virtual Dunhuang Mural Restoration System in Collaborative Network Environment.
Comput. Graph. Forum, 2000

A novel self-optimizing approach for knowledge acquisition.
Proceedings of the IEEE International Conference on Systems, 2000

1996
A Model-Based Computer-Aided Prototyping System.
Journal of Systems Integration, 1996

1994
An Object-Centered Application Development System.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

Modeling Activities of Application Domains.
Proceedings of the Applications of Databases, First International Conference, 1994


  Loading...