Xiao Tang

According to our database1, Xiao Tang authored at least 79 papers between 2002 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Achieving Positive Secrecy Rate in Wireless Multiple Access Wiretap Channels.
IEEE Trans. Veh. Technol., 2020

A Salient Object Detection Algorithm Based on Hierarchical Cognitive Mechanism.
Traitement du Signal, 2020

Field Evaluation of Low-Cost Particulate Matter Sensors in Beijing.
Sensors, 2020

Improved Runge-Kutta-Chebyshev methods.
Math. Comput. Simul., 2020

Discovering knowledge combinations in multidimensional collaboration network: A method based on trust link prediction and knowledge similarity.
Knowl. Based Syst., 2020

Conflict Analysis Based on Three-Way Decision Theoretic Fuzzy Rough Set over Two Universes.
Ingénierie des Systèmes d Inf., 2020

Quantitative three-way class-specific attribute reducts based on region preservations.
Int. J. Approx. Reason., 2020

An EPEC Analysis among Mobile Edge Caching, Content Delivery Network and Data Center.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

GrabAR: Occlusion-aware Grabbing Virtual Objects in AR.
Proceedings of the UIST '20: The 33rd Annual ACM Symposium on User Interface Software and Technology, 2020

Hybrid Encoder-Decoder Deep Networks for Decoding Neural Drive Information towards Precise Muscle Force Estimation.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach.
IEEE Trans. Wirel. Commun., 2019

Multi-Leader-Follower Game for MEC-Assisted Fusion-Based Vehicle On-Road Analysis.
IEEE Trans. Veh. Technol., 2019

Joint Network Coding and ARQ Design Toward Secure Wireless Communications.
IEEE Trans. Commun., 2019

Distributional Chaoticity of <i>C</i><sub>0</sub>-Semigroup on a Frechet Space.
Symmetry, 2019

Aerosol Optical Radiation Properties in Kunming (the Low-Latitude Plateau of China) and Their Relationship to the Monsoon Circulation Index.
Remote. Sens., 2019

Sign Normalised Hammerstein Spline Adaptive Filtering Algorithm in an Impulsive Noise Environment.
Neural Process. Lett., 2019

New explicit stabilized stochastic Runge-Kutta methods with weak second order for stiff Itô stochastic differential equations.
Numer. Algorithms, 2019

Considering Monopoly Maintenance Cost for an Automobile Purchase in China: A DEA-Based Approach.
J. Syst. Sci. Complex., 2019

The Investigation of E-Learning System Design Quality on Usage Intention.
J. Comput. Inf. Syst., 2019

Enhancing Augmented VR Interaction via Egocentric Scene Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Removing background interference for crowd counting via de-background detail convolutional network.
Neurocomputing, 2019

Two variants of the IIR spline adaptive filter for combating impulsive noise.
EURASIP J. Adv. Signal Process., 2019

SAR image despeckling with a multilayer perceptron neural network.
Int. J. Digit. Earth, 2019

Sign-Normalized IIR Spline Adaptive Filtering Algorithms for Impulsive Noise Environments.
Circuits Syst. Signal Process., 2019

Asymptotically optimal approximation of some stochastic integrals and its applications to the strong second-order methods.
Adv. Comput. Math., 2019

A Course-Aware Opportunistic Routing Protocol for FANETs.
IEEE Access, 2019

Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints.
IEEE Access, 2019

A Convolutional Neural Network based Resource Management Algorithm for NOMA enhanced D2D and Cellular Hybrid Networks.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Measurement and Modeling of Path Loss and Channel Capacity Analysis for 5G UMa Scenario.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Angular Spread Analysis and Modeling of UAV Air-to-Ground Channels at 3.5 GHz.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Joint Wireless Power and Information Transfer for Primary Secure Transmission.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Hierarchical Game for Electric Vehicle Public Charging Market.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Minimization of Offloading Delay for Two-Tier UAV with Mobile Edge Computing.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Distributed Downloading Strategy for Multi-Source Data Fusion in Edge-Enabled Vehicular Network : (Invited Paper).
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Steady-state performance for the sign normalized algorithm based on Hammerstein spline adaptive filtering.
Proceedings of the 2019 International Conference on Control, 2019

Path Loss Measurement and Modeling for Industrial Environment.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019

Sign normalised spline adaptive filtering algorithms against impulsive noise.
Signal Process., 2018

基于最优相似度三支决策的模糊粗糙集模型 (Fuzzy Rough Set Model Based on Three-way Decisions of Optimal Similar Degrees).
计算机科学, 2018

Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless Networks.
IEEE J. Sel. Areas Commun., 2018

Toward an Integrated Decision-Making Model for Consumer Electronic.
J. Comput. Inf. Syst., 2018

Some Iterative Properties of ( F 1 , F 2 ) -Chaos in Non-Autonomous Discrete Systems.
Entropy, 2018

Jamming Mitigation via Hierarchical Security Game for IoT Communications.
IEEE Access, 2018

QoS and Security Aware Power Allocation Scheme for Wiretap Cognitive Radio Networks.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

An Improved Least Trimmed Square Hausdorff Distance Finger Vein Recognition.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Securing Small Cell Networks Under Interference Constraint: A Quasi-Variational Inequality Approach.
Proceedings of the IEEE Global Communications Conference, 2018

Energy Efficiency Competition for Visible Light Communication under Illumination Constraint.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Computational design of wind-up toys.
ACM Trans. Graph., 2017

Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective.
IEEE Trans. Commun., 2017

Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework.
IEEE Trans. Commun., 2017

Interference-Aware Resource Competition Toward Power-Efficient Ultra-Dense Networks.
IEEE Trans. Commun., 2017

Re-Evaluating Electromyogram-Force Relation in Healthy Biceps Brachii Muscles Using Complexity Measures.
Entropy, 2017

Power-Efficient Secure Transmission Against Full-Duplex Active Eavesdropper: A Game-Theoretic Framework.
IEEE Access, 2017

The Improved Approximation Accuracy Based on Knowledge Granularity.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Robust secrecy competition in wireless networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Hierarchical power competition for security enhancement in wireless networks.
Proceedings of the IEEE International Conference on Communications, 2017

An EPEC Analysis for Power Allocation in LTE-V Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

High strong order stochastic Runge-Kutta methods for Stratonovich stochastic differential equations with scalar noise.
Numer. Algorithms, 2016

Combating full-duplex active eavesdropper: A game-theoretic perspective.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Iterative Power Optimization Towards Secure Multi-Channel Full-Duplex Communication.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

基于小波变换和粗糙集的早搏信号识别算法 (Premature Beat Signal Recognition Algorithm Based on Wavelet Transform and Rough Set).
计算机科学, 2015

An Improved Attribute Reduction Algorithm based on Granular Computing.
Int. J. Comput. Commun. Control, 2015

Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Dig Deeper or Diversify? The Rewards and Penalties of Knowledge Exploration and Exploitation Capabilities in the Context of IS Scholar Publication Productivity.
Proceedings of the International Conference on Information Systems, 2015

User association as a stochastic game for enhanced performance in heterogeneous networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Efficient Power Control via Non-Cooperative Target SINR Competition in Distributed Wireless Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Why Do IS Scholars Cite Other Scholars? An Empirical Analysis of the Direct and Moderating Effects of Cooperation and Competition among IS Scholars on Individual Citation Behavior.
Proceedings of the International Conference on Information Systems, 2014

Coalition-assisted energy efficiency optimization via uplink macro-femto cooperation.
Proceedings of the IEEE Global Communications Conference, 2014

Fit between Knowledge Transfer Complexity and Media Capability: A Meta-Analysis.
Proceedings of the International Conference on Information Systems, 2013

Simulation Model of Knowledge Complexity in New Knowledge Transfer Performance.
Proceedings of the 19th Americas Conference on Information Systems, 2013

An attribute reduction method based on SVM.
Proceedings of the Eighth International Conference on Natural Computation, 2012

A rotation and scale invariance face Recognition Method Based on Complex Network and Image Contour.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

Application Service Provider (ASP) in China: An Empirical Study of System and Service Satisfaction.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Design pattern's application.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Capacitor-free, fast transient response CMOS low-dropout regulator with multiple-loop control.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

Experimental Demonstration of a Detection-Time-Bin-Shift Polarization Encoding Quantum Key Distribution System.
IEEE Commun. Lett., 2008

A Quantum Network Manager that Supports a One-Time Pad Stream.
Proceedings of the Second International Conference on Quantum, 2008

Experimental demonstration of an active quantum key distribution network with over gbps clock synchronization.
IEEE Commun. Lett., 2007

Document Reverse Engineering: From Paper to XML.
Proceedings of the Document Analysis Systems V, 5th International Workshop, 2002