Xiangyang Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Accuth$^+$+: Accelerometer-Based Anti-Spoofing Voice Authentication on Wrist-Worn Wearables.
IEEE Trans. Mob. Comput., May, 2024

HRLAIF: Improvements in Helpfulness and Harmlessness in Open-domain Reinforcement Learning From AI Feedback.
CoRR, 2024

NaturalSpeech 3: Zero-Shot Speech Synthesis with Factorized Codec and Diffusion Models.
CoRR, 2024

Ecmas: Efficient Circuit Mapping and Scheduling for Surface Code.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2024

2023
Efficient JITL framework for nonlinear industrial chemical engineering soft sensing based on adaptive multi-branch variable scale integrated convolutional neural networks.
Adv. Eng. Informatics, October, 2023

FP-BFT: A fast pipeline Byzantine consensus algorithm.
IET Blockchain, September, 2023

Detecting Insulator Strings as Linked Chain Structure in Smart Grid Inspection.
IEEE Trans. Ind. Informatics, August, 2023

Detection and recognition of dim and small targets in sea clutter background based on polarization decomposition.
Int. J. Model. Simul. Sci. Comput., June, 2023

Secure Transformer Inference.
IACR Cryptol. ePrint Arch., 2023

Instruction Fusion: Advancing Prompt Evolution through Hybridization.
CoRR, 2023

A Unified Framework for Multi-Domain CTR Prediction via Large Language Models.
CoRR, 2023

ALT: Towards Fine-grained Alignment between Language and CTR Models for Click-Through Rate Prediction.
CoRR, 2023

PromptTTS 2: Describing and Generating Voices with Text Prompt.
CoRR, 2023

How Can Recommender Systems Benefit from Large Language Models: A Survey.
CoRR, 2023

CTRL: Connect Tabular and Language Model for CTR Prediction.
CoRR, 2023

Rethinking Dense Retrieval's Few-Shot Ability.
CoRR, 2023

State Perception and Prediction of Digital Twin Based on Proxy Model.
IEEE Access, 2023

AutoGen: An Automated Dynamic Model Generation Framework for Recommender System.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023

E-Talk: Accelerating Active Speaker Detection with Audio-Visual Fusion and Edge-Cloud Computing.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Research on Cross-Chain Consensus Models in Complex Trust Environments.
Proceedings of the International Conference on Networking and Network Applications, 2023

Effective and Efficient Qubit Mapper.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

On the "Meaning System" of Design from Kao Gong Ji.
Proceedings of the Design, User Experience, and Usability, 2023

MR.Brick: Designing A Remote Mixed-reality Educational Game System for Promoting Children's Social & Collaborative Skills.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Laser Active Alignment Algorithm based on Spot Features and Curve Fitting.
Proceedings of the 8th International Conference on Automation, 2023

Fault Root Cause Diagnosis Method Based on BILSTM to Reconstruct Granger Causality.
Proceedings of the CAA Symposium on Fault Detection, 2023

Fault diagnosis of asynchronous motors based on 2DCNN-GRU network optimization.
Proceedings of the CAA Symposium on Fault Detection, 2023

A Pipeline-based Chain Structure Byzantine Consensus Algorithm for Blockchain Systems.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Practical and Efficient Secure Aggregation for Privacy-Preserving Machine Learning.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

Plug-and-Play Document Modules for Pre-trained Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Multi-Beam Conformal Array Antenna Based on Highly Conductive Graphene Films for 5G Micro Base Station Applications.
Sensors, 2022

Design of Intelligent Monitoring System in Galloping Power Transmission Line.
Sensors, 2022

Deep Learning Based Cooperative Resource Allocation in 5G Wireless Networks.
Mob. Networks Appl., 2022

A cross-domain knowledge transfer method for process discovery of urban community services with small datasets.
Bus. Process. Manag. J., 2022

Miniaturized Wideband CP Antenna Using Hybrid Embedded Metasurface Structure.
IEEE Access, 2022

BinauralGrad: A Two-Stage Conditional Diffusion Probabilistic Model for Binaural Audio Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Low Resource Style Transfer via Domain Adaptive Meta Learning.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Online Traffic Allocation Based on Percentile Charging for Practical CDNs.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Time-Frequency Analysis-Based Transient Harmonic Feature Extraction for Load Monitoring.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

MHMC: Real-Time Hand Motion Capture Using Millimeter-Wave Radar.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

QCIR: Pattern Matching Based Universal Quantum Circuit Rewriting Framework.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Adversarial Email Generation against Spam Detection Models through Feature Perturbation.
Proceedings of the IEEE International Conference on Assured Autonomy, 2022

HoloCleanX: A Multi-source Heterogeneous Data Cleaning Solution Based on Lakehouse.
Proceedings of the Health Information Science - 11th International Conference, 2022

Shenzhen Maker Culture with Innovation and Entrepreneurship Policy in the Context of Belt and Road Initiatives.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022

Analysis on Aesthetic Turn and Social Factors of Beijing Jade Art in the Middle of the 20<sup>th</sup> Century.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022

Contrastive Learning enhanced Author-Style Headline Generation.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

IntTower: The Next Generation of Two-Tower Model for Pre-Ranking System.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Generating evacuation task plans for community typhoon emergencies: an integration of case-driven and model-driven approaches.
Oper. Res., 2021

Hesitant fuzzy <i>β</i> covering rough sets and applications in multi-attribute decision making.
J. Intell. Fuzzy Syst., 2021

Modeling and simulation methods of sea clutter based on measured data.
Int. J. Model. Simul. Sci. Comput., 2021

Line Marching Algorithm For Planar Kinematic Swarm Robots: A Dynamic Leader-Follower Approach.
CoRR, 2021

Insurance Assistant: An Intelligent Platform for Video Insurance Assessment.
Proceedings of the Companion of The Web Conference 2021, 2021

Knowledge Enhanced Transformers System for Claim Stance Classification.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

Label-Aware Text Representation for Multi-Label Text Classification.
Proceedings of the IEEE International Conference on Acoustics, 2021

Understanding Security Behavior of Real Users: Analysis of a Phishing Study.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Research on Equipment Maintenance Guidance Technology Based on MR and Digital Twin.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

Anti Leakage: Protecting Privacy Hidden in Our Speech.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

The Truman Show: Attack On The Privacy Of Smart Homes Through Traffic Analysis.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

Optimal Data Collection for A Mobile Sink.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

Crafting Adversarial Email Content against Machine Learning Based Spam Email Detection.
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021

Exploring Text-Transformers in AAAI 2021 Shared Task: COVID-19 Fake News Detection in English.
Proceedings of the Combating Online Hostile Posts in Regional Languages during Emergency Situation, 2021

2020
Discretization Algorithm for Incomplete Economic Information in Rough Set Based on Big Data.
Symmetry, 2020

Cognitive Resource Allocation for Target Tracking in Location-Aware Radar Networks.
IEEE Signal Process. Lett., 2020

A cross-region transfer learning method for classification of community service cases with small datasets.
Knowl. Based Syst., 2020

Chinese clinical named entity recognition with variant neural structures based on BERT methods.
J. Biomed. Informatics, 2020

Learning-Automata-Based Confident Information Coverage Barriers for Smart Ocean Internet of Things.
IEEE Internet Things J., 2020

FenceMask: A Data Augmentation Approach for Pre-extracted Image Features.
CoRR, 2020

Gcluster: a simple-to-use tool for visualizing and comparing genome contexts for numerous genomes.
Bioinform., 2020

Distributed Tracking of Leader-Follower Multiagent Systems Subject to Disturbed Leader's Information.
IEEE Access, 2020

Fooling A Deep-Learning Based Gait Behavioral Biometric System.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur.
EAI Endorsed Trans. Security Safety, 2019

Weighted Laplacian and Its Theoretical Applications.
CoRR, 2019

A novel hybrid localization scheme for deep mine based on wheel graph and chicken swarm optimization.
Comput. Networks, 2019

Fixed Point Results for Fractal Generation in Extended Jungck-SP Orbit.
IEEE Access, 2019

Analytical Design Space of Power Amplifiers Including the Class-A/B/J Continuum for Dynamic Load Modulation.
IEEE Access, 2019

AI Based Supercomputer: Opportunities and Challenges.
Proceedings of the Space Information Networks - 4th International Conference, 2019

Mutual Connection in 5G Based Space Information Networks: Opportunities and Challenges.
Proceedings of the Space Information Networks - 4th International Conference, 2019

Understanding User Behaviors When Phishing Attacks Occur.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

An Analysis on the Weibo Topic "US-China Trade War" Based on K-Means Algorithm.
Proceedings of the Intelligent Systems and Applications, 2019

An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Augmenting Authentication with Context-Specific Behavioral Biometrics.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Cross-Site Scripting (XSS) Detection Integrating Evidences in Multiple Stages.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Performance Evaluation in Large Scale Cooperative Wireless Fusion Networks: Opportunities and Challenges.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

A Novel Strategy for Barrier Confident Information Coverage in Sensor Networks.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Review-Based User Profiling: A Systematic Mapping Study.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2019

2018
Real Time Wi-Fi Indoor Positioning System Based on RSSI Measurements: A Distributed Load Approach with the Fusion of Three Positioning Algorithms.
Wirel. Pers. Commun., 2018

Assessing Hydrological Modelling Driven by Different Precipitation Datasets via the SMAP Soil Moisture Product and Gauged Streamflow Data.
Remote. Sens., 2018

Data compensation based on the additional feature information for collaborative interactive operation with optical human motion capture system.
Int. J. Model. Simul. Sci. Comput., 2018

Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges.
IEEE Access, 2018

Situational Awareness in Space Based Blockchain Wireless Networks.
Proceedings of the Space Information Networks - Third International Conference, 2018

Blockchain Based Distributed Network Architecture.
Proceedings of the Space Information Networks - Third International Conference, 2018

Blockchain Application in Space Information Network Security.
Proceedings of the Space Information Networks - Third International Conference, 2018

Cybersecurity in liberal arts general education curriculum.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Evaluation of a Lead-Zinc Mine's Ventilation System Based on Unascertained Measurement Model.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

Big Data Channel Awareness in Cooperative D2D Wireless Fusion Networks in IoT.
Proceedings of the Intelligent Systems and Applications, 2018

Research on the Degradation of Indian Regional Navigation Satellite System Based on STK.
Proceedings of the Intelligent Systems and Applications, 2018

A Summary of Research on Blockchain in the Field of Intellectual Property.
Proceedings of the 2018 International Conference on Identification, 2018

Modified DV-Hop Localization Algorithm Based on Intersecting Circle and Hops Revaluation.
Proceedings of the 3rd International Conference on Intelligent Information Processing, 2018

Big Data-Based Precise Diagnosis in Space Range Communication Systems.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Positioning accuracy analysis of Indian regional navigation satellite system on STK.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Simulating Phishing Email Processing with Instance-Based Learning and Cognitive Chunk Activation.
Proceedings of the Brain Informatics - International Conference, 2018

2017
Analysis and Validation of Transmitter's Beam Footprint Detection and Tracking for Noncooperative Bistatic SAR.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2017

A New Distortion Correction Method for FMCW SAR Real-Time Imaging.
IEEE Geosci. Remote. Sens. Lett., 2017

A novel joint optimization of downlink transmission using physical layer security in cooperative 5G wireless networks.
Int. J. Distributed Sens. Networks, 2017

Hessian-constrained detail-preserving 3D implicit reconstruction from raw volumetric dataset.
Comput. Graph., 2017

Development and Performance Evaluation of Filterbank Multicarrier Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Cooperative Downlink Resource Allocation in 5G Wireless Backhaul Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Overview of Terahertz Radar Cooperation in Space Based Information Networks.
Proceedings of the Space Information Networks - Second International Conference, 2017

Raising Flags: Detecting Covert Storage Channels Using Relative Entropy.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Time Lord: Covert Timing Channel Implementation and Realistic Experimentation.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

The Optimization of Forced Ventilation Parameters on Blind Roadway Based on Fluent Numerical Simulation.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Optimization Study of Ventilation Parameters in Roadway Type Stope Based on Fluent Software.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Psychological Empowerment and Work Effort: A Gender Based Cross-Cultural Comparison.
Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09, 2017

Energy Oriented Resource Allocation in Heterogeneous 5G Networks.
Proceedings of the Communications, Signal Processing, and Systems, 2017

Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
分布式多业务系统信道分配算法 (Distributed Channel Allocation Algorithm for Multi-services Systems).
计算机科学, 2016

Natural human-computer interaction control of multi operators in collaborative virtual maintenance based on optical human motion capture system.
Int. J. Model. Simul. Sci. Comput., 2016

Channel aware spatial constellation design in VLC MIMO communication systems.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

Matching Theory for Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Broadening the Path to Cybersecurity Profession in Predominantly Undergraduate and Liberal Arts Institutions (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Collaborative detection of Covert Storage Channels.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Cold Start Purchase Prediction with Budgets Constraints.
Proceedings of the 2nd International Workshop on Social Influence Analysis co-located with 25th International Joint Conference on Artificial Intelligence (IJCAI 2016), 2016

Prediction of Traffic Density and Interest Using Real Time Mobile Traffic Data.
Proceedings of the International Conference on Identification, 2016

Equivalent validation of beam footprint detection for non-cooperative bistatic SAR.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

The application of the method of TDOA localization in locating a human being behind corners based on the multistatic radar system.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

Multistatic radars locating a human being behind corners based on the method of mirror localization.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

Relationship Privacy Leakage in Network Traffics.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Mechanism design of generating the risk communication strategies responding food safety incidents.
Proceedings of the 12th IEEE International Conference on Control and Automation, 2016

OLITS: An Ohm's Law-like traffic splitting model based on congestion prediction.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Detail-Preserving 3D Shape Modeling from Raw Volumetric Dataset via Hessian-Constrained Local Implicit Surfaces Optimization.
Proceedings of the 2016 International Conference on Cyberworlds, 2016

Review of Heterogeneous Wireless Fusion in Mobile 5G Networks: Benefits and Challenges.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Keynote speech.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Simplified Real-Time Imaging Flow for High-Resolution FMCW SAR.
IEEE Geosci. Remote. Sens. Lett., 2015

Lane Detection and Tracking Using a Parallel-snake Approach.
J. Intell. Robotic Syst., 2015

Minimized-expansion based lossless image authentication algorithm.
J. Ambient Intell. Humaniz. Comput., 2015

Real-time interactive motion control of virtual human in virtual maintenance based on limited information.
Int. J. Model. Simul. Sci. Comput., 2015

A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2015

A novel case adaptation method based on an improved integrated genetic algorithm for power grid wind disaster emergencies.
Expert Syst. Appl., 2015

Interactive volumetric segmentation through least-squares optimization of local hessian-constrained implicits.
Proceedings of the 21st ACM Symposium on Virtual Reality Software and Technology, 2015

An SDN-supported collaborative approach for DDoS flooding detection and containment.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A statistical study of covert timing channels using network packet frequency.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

CBR Method for Risk Assessment on Power Grid Protection Under Natural Disasters: Case Representation and Retrieval.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Urban Power Network Vulnerability Assessment Based on Multi-attribute Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2014
MC<sup>2</sup>: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring.
ACM Trans. Sens. Networks, 2014

Performance Evaluation of Frequency-Domain Algorithms for Chirped Low Frequency UWB SAR Data Processing.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2014

Parallel-Snake with Balloon Force for Lane Detection.
IEICE Trans. Inf. Syst., 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Scalability of control planes for Software defined networks: Modeling and evaluation.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Type-2 diabetes management using Analytic Hierarchy Process and Analytic Network Process.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

2013
Coherent analysis for radar signal generator.
IEICE Electron. Express, 2013

An integrative synchronization and imaging approach for bistatic spaceborne/stratospheric SAR with a fixed receiver.
EURASIP J. Adv. Signal Process., 2013

Intelligent Network Course Platform Based on Agent.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Design of Array Signal Processing System Based on TMS320C6678.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

On-road vehicle and pedestrian detection using improved codebook model.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2013

High precision 3D measurement using area modulated phase-shifting binary patterns.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Pattern Regulator: Protecting Temporal Usage Privacy for Wireless Body Area Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Rapid and accurate phase matching for 3D measurement.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Implementation and Transmission Error Handling of Multi-channel LVDS.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Discovery method on failure factors of collaborative allocation under power grid emergency.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Recognition of cough using features improved by sub-band energy transformation.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

5WTAG: Detecting the Topics of Chinese Microblogs Based on 5W Model.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Lossless Image Authentication Algorithm Based on Three-Compa Image Basic Blocks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Fiber-Optical Sensors: Basics and Applications in Multiphase Reactors.
Sensors, 2012

Preliminary study on noncooperative positioning using UWB impulse radio.
Proceedings of the IEEE International Conference on Ultra-Wideband, 2012

Through-wall localization with UWB sensor network.
Proceedings of the IEEE International Conference on Ultra-Wideband, 2012

2011
Investment Cost Analysis for Key Industries of New Energy Based on Boston Experience Curve.
Proceedings of the Modeling Risk Management in Sustainable Construction, 2011

Research on Algorithm of Image Processing of Butt Weld.
Proceedings of the Information Computing and Applications, 2011

Research on Key Technology of Collaborative Virtual Maintenance Training System in Large-Scale Complex Equipment.
Proceedings of the Advances in Computer Science, 2011

2010
Arithmetic Processing of Image of Weld Seam Based on Morphological Filtering.
Proceedings of the Information Computing and Applications - International Conference, 2010

Cluster supply chain cooperation based on multi-agent.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
The Effect of Notch Filter on RFI Suppression.
Wirel. Sens. Netw., 2009

Developing taxonomy and model for security centric supply chain management.
Int. J. Manuf. Technol. Manag., 2009

Modeling the supply chain based on multi-agent conflicts.
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009

An Optimized Model for Blasting Parameters in Underground Mines' Deep-Hole Caving Based on Rough Set and Artificial Neural Network.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

2008
Inference Degradation of Active Information Fusion within Bayesian Network Models.
Int. J. Intell. Inf. Technol., 2008

Converged network common charging controller function.
Bell Labs Tech. J., 2008

An Aspect Oriented Configuration Identification Model for Incremental Development.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Security Management Modeling in Collaborative Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Security Challenge and Defense in VoIP Infrastructures.
IEEE Trans. Syst. Man Cybern. Part C, 2007

A knowledge integration framework for complex network management.
Ind. Manag. Data Syst., 2007

Efficient knowledge integration to support a complex supply network management.
Int. J. Manuf. Technol. Manag., 2007

IP multimedia subsystem converged call control services.
Bell Labs Tech. J., 2007

2006
A Supervised Clustering and Classification Algorithm for Mining Data With Mixed Variables.
IEEE Trans. Syst. Man Cybern. Part A, 2006

A Soft Sensor Based on Multiple Neural Networks Combined with Two Information Fusion Methods.
Proceedings of the Ninth International Conference on Control, 2006

Supply Chain Real Time Coordination Method Based on Buyback Contract with Fuzzy Random Demand.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

2005
Active affective State detection and user assistance with dynamic bayesian networks.
IEEE Trans. Syst. Man Cybern. Part A, 2005

A supervised clustering algorithm for computer intrusion detection.
Knowl. Inf. Syst., 2005

Path Exposure, Target Location, Classification and Tracking in Sensor Networks.
Proceedings of the Handbook of Sensor Networks: Algorithms and Architectures, 2005

2004
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, 2004

User Affective State Assessment for HCI Systems.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
Ellipse-based shape description and retrieval method.
Sci. China Ser. F Inf. Sci., 2002

2001
Probabilistic techniques for intrusion detection based on computer audit data.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Decision Tree Classifiers for Computer Intrusion Detection.
Scalable Comput. Pract. Exp., 2001

A Machine Learning Algorithm Based on Supervised Clustering and Classification.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001

2000
Color Restoration and Image Retrieval for Dunhuang Fresco Preservation.
IEEE Multim., 2000

Virtual Dunhuang Mural Restoration System in Collaborative Network Environment.
Comput. Graph. Forum, 2000

A novel self-optimizing approach for knowledge acquisition.
Proceedings of the IEEE International Conference on Systems, 2000

1996
A Model-Based Computer-Aided Prototyping System.
J. Syst. Integr., 1996

1994
An Object-Centered Application Development System.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

Modeling Activities of Application Domains.
Proceedings of the Applications of Databases, First International Conference, 1994


  Loading...