Xiao Fu

According to our database1, Xiao Fu authored at least 40 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment.
Service Oriented Computing and Applications, 2019

Detecting Land Degradation in Eastern China Grasslands with Time Series Segmentation and Residual Trend analysis (TSS-RESTREND) and GIMMS NDVI3g Data.
Remote Sensing, 2019

Research on exchange rate forecasting based on deep belief network.
Neural Computing and Applications, 2019

D2D Relay Incenting and Charging Modes That Are Commercially Compatible With B2D Services.
IEEE Access, 2019

Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019

Stochastic Optimization for Coupled Tensor Decomposition with Applications in Statistical Learning.
Proceedings of the IEEE Data Science Workshop, 2019

Development of a Deep Learning Method to Predict Optimal Ablation Patterns for Atrial Fibrillation.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2019

2018
Profiling Web users using big data.
Social Netw. Analys. Mining, 2018

Bio-Inspired Covert Active Sonar Strategy.
Sensors, 2018

An Efficient Graph-Based Spatio-Temporal Indexing Method for Task-Oriented Multi-Modal Scene Data Organization.
ISPRS Int. J. Geo-Information, 2018

Bio-Inspired Steganography for Secure Underwater Acoustic Communications.
IEEE Communications Magazine, 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

Scalable Team-Based Software Engineering Education via Automated Systems.
Proceedings of the Learning With MOOCS, 2018

Shared Human-Machine Control for Self-Aware Prostheses.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.
Proceedings of the IEEE Global Communications Conference, 2018

SQL Injection in Cloud: An Actual Case Study.
Proceedings of the Advances on P2P, 2018

A Brief History of Self-destructing Data: From 2005 to 2017.
Proceedings of the Advances on P2P, 2018

2017
Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Network, 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Progression of Diabetic Capillary Occlusion: A Model.
PLoS Computational Biology, 2016

Trust based decisions in supply chains with an agent.
Decision Support Systems, 2016

Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Proceedings of the Information Security - 17th International Conference, 2014

How to Send a Self-Destructing Email: A Method of Self-Destructing Email System.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
A Sensing Chair design for home based physiological signs monitoring.
Proceedings of the IEEE International Symposium on Medical Measurements and Applications, 2013

A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Fast Parameters Estimation in Medication Efficacy Assessment Model for Heart Failure Treatment.
Comp. Math. Methods in Medicine, 2012

Rough Sets and Neural Networks Based Aerial Images Segmentation Method.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Advanced VRM Incorporated with 3D DCB Package for Computor Power Management Applications.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
A Reliable Energy-Efficient Multi-Level Routing Algorithm for Wireless Sensor Networks Using Fuzzy Petri Nets.
Sensors, 2011

2005
Online Support Vector Regression for System Identification.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Compute visibility without depth in multi-reference images.
Proceedings of the 8th International Conference on Control, 2004

Inverse image warping without searching.
Proceedings of the 8th International Conference on Control, 2004


  Loading...