Xiaofeng Wang

According to our database1, Xiaofeng Wang authored at least 233 papers between 1998 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
RSimplex: A Robust Control Architecture for Cyber And Physical Failures.
TCPS, 2018

Heuristic routing algorithm toward scalable distributed generalized assignment problem.
Soft Comput., 2018

The Effect of Zeolite Composition and Grain Size on Gas Sensing Properties of SnO2/Zeolite Sensor.
Sensors, 2018

Distribution-aware cache replication for cooperative road side units in VANETs.
Peer-to-Peer Networking and Applications, 2018

Super-resolution image reconstruction using surface fitting with hierarchical structure.
J. Visual Communication and Image Representation, 2018

An Ostrowski-type method with memory using a novel self-accelerating parameter.
J. Computational Applied Mathematics, 2018

A new accelerating technique applied to a variant of Cordero-Torregrosa method.
J. Computational Applied Mathematics, 2018

A Combined Back and Foreground-Based Stereo Matching Algorithm Using Belief Propagation and Self-Adapting Dissimilarity Measure.
IJPRAI, 2018

A family of Newton-type iterative methods using some special self-accelerating parameters.
Int. J. Comput. Math., 2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Learning Optimal Seeds for Ranking Saliency.
Cognitive Computation, 2018

Regularized Super-Resolution Reconstruction Based on Edge Prior.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Image Classification Based on Improved Spatial Pyramid Matching Model.
Proceedings of the Intelligent Computing Theories and Application, 2018

Improved Collaborative Filtering Algorithm Based on Multifactor Fusion and User Features Clustering.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Lebesgue-Approximation-Based Model Predictive Control for Nonlinear Sampled-Data Systems with Measurement Noises.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Information Forensics and Security, 2017

Efficiently Attentive Event-Triggered Systems With Limited Bandwidth.
IEEE Trans. Automat. Contr., 2017

Reversible data hiding in encrypted image with separable data extraction from image decryption.
Multimedia Tools Appl., 2017

Maintaining the accuracy of focusing topology area in network simulation.
J. Simulation, 2017

GB(2D)2 PCA-based convolutional network for face recognition.
J. Electronic Imaging, 2017

Domain Adaptation Image Classification Based on Multi-sparse Representation.
TIIS, 2017

Self-regularized fixed-rank representation for subspace segmentation.
Inf. Sci., 2017

Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction.
CoRR, 2017

Optimizing Filter Size in Convolutional Neural Networks for Facial Action Unit Recognition.
CoRR, 2017

Automatic liver segmentation from abdominal CT volumes using graph cuts and border marching.
Computer Methods and Programs in Biomedicine, 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Monocular Vision Based Object Recognition and Tracking for Intelligent Robot.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2017

Human action recognition using transfer learning with deep representations.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Two Stages Empty Containers Repositioning of Asia-Europe Shipping Routes Under Revenue Maximization.
Proceedings of the Intelligence Science I, 2017

Improved CNN Based on Super-Pixel Segmentation.
Proceedings of the Intelligence Science I, 2017

A Coding Efficiency Improvement Algorithm for Future Video Coding.
Proceedings of the Intelligence Science I, 2017

Seat Belt Detection Using Convolutional Neural Network BN-AlexNet.
Proceedings of the Intelligent Computing Theories and Application, 2017

Flexible Analysis of Cross-Organizational Process Modeling Based on π Calculus.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Gender and Age Classification of Human Faces for Automatic Detection of Anomalous Human Behaviour.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Moving target detection based on improved three frame difference and visual background extractor.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Sporadic model predictive control using Lebesgue approximation.
Proceedings of the 2017 American Control Conference, 2017

2016
Lebesgue-Sampling-Based Diagnosis and Prognosis for Lithium-Ion Batteries.
IEEE Trans. Industrial Electronics, 2016

A Self-Powered Insole for Human Motion Recognition.
Sensors, 2016

Spectral clustering steered low-rank representation for subspace segmentation.
J. Visual Communication and Image Representation, 2016

Power-Aware Classifier Selection in Wireless Sensor Networks.
J. Inf. Sci. Eng., 2016

A kind of Lagrange dynamic simplified modeling method for multi-DOF robot.
Journal of Intelligent and Fuzzy Systems, 2016

Extraction and Classification of the Cultural Relic Model Based on Local Geometric Features.
JACIII, 2016

Data-driven model-free adaptive sliding mode control for the multi degree-of-freedom robotic exoskeleton.
Inf. Sci., 2016

Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks.
IJPRAI, 2016

Source camera identification from image texture features.
Neurocomputing, 2016

Research of the delaying crack propagation on an aero-engine rotor.
IJMA, 2016

Hamilton Circuits and Essential Girth of Claw Free Graphs.
Graphs and Combinatorics, 2016

An overview of 3GPP enhancements on machine to machine communications.
IEEE Communications Magazine, 2016

Lebesgue approximation model of continuous-time nonlinear dynamic systems.
Automatica, 2016

Integration of Learning Activity and Process-Oriented Assessment to Promote the Self-Directed e-Learning.
Proceedings of the Intelligent Environments 2016, 2016

Multiple Health Phases Based Remaining Useful Lifetime Prediction on Bearings.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2016

SMig: Stream Migration Extension for HTTP/2.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

Dynamic fault tolerant control for multi-agent uncertain system with intermittent sampling.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Intrusion detection of specific area based on video.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

An improved feature fusion algorithm for image retrieval.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

LS-SLAM: SLAM with Lebesgue sampling.
Proceedings of the 2016 American Control Conference, 2016

2015
Cloud-Assisted Live Streaming for Crowdsourced Multimedia Content.
IEEE Trans. Multimedia, 2015

A Visual Model-Based Perceptual Image Hash for Content Authentication.
IEEE Trans. Information Forensics and Security, 2015

Real-Time L1 Adaptive Control for Uncertain Networked Control Systems.
IEEE Trans. Automat. Contr., 2015

A robust approach to detect digital forgeries by exploring correlation patterns.
Pattern Anal. Appl., 2015

Steganography forensics method for detecting least significant bit replacement attack.
J. Electronic Imaging, 2015

Unique Fulkerson coloring of Petersen minor-free cubic graphs.
Eur. J. Comb., 2015

UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

Nonlinear iterative learning control of 5 DOF upper-limb rehabilitation robot.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

A Mixed Weisfeiler-Lehman Graph Kernel.
Proceedings of the Graph-Based Representations in Pattern Recognition, 2015

Collective Traces modeling in Collaborative Working Environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

CapSeat: capacitive proximity sensing for automotive activity recognition.
Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2015

Consensus-based simultaneous arrival of multiple UAVs with constrained velocity.
Proceedings of the American Control Conference, 2015

Decentralized event-triggered consensus of Linear Multi-agent Systems under Directed Graphs.
Proceedings of the American Control Conference, 2015

2014
Networked Strong Tracking Filtering with Multiple Packet Dropouts: Algorithms and Applications.
IEEE Trans. Industrial Electronics, 2014

On the Degrees of Freedom for Multi-Hop Wireless Networks under Layered TDD Constraint.
EAI Endorsed Trans. Scalable Information Systems, 2014

A comparison of contrast measurements in passive autofocus systems for low contrast images.
Multimedia Tools Appl., 2014

Traditional Classroom vs E-learning in Higher Education: Difference between Students' Behavioral Engagement.
iJET, 2014

Double shielded Public Key Cryptosystems.
IACR Cryptology ePrint Archive, 2014

Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups.
IACR Cryptology ePrint Archive, 2014

Packing resonant hexagons in fullerenes.
Discrete Optimization, 2014

Stabilizing bit-rates in networked control systems with decentralized event-triggered communication.
Discrete Event Dynamic Systems, 2014

A statistical feature based approach to distinguish PRCG from photographs.
Computer Vision and Image Understanding, 2014

Parts-based face super-resolution via non-negative matrix factorization.
Computers & Electrical Engineering, 2014

The Theory and Practice of Randori Coding Dojos.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2014

A concept acquisition method based on visual perception.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

Cognitive memory systems in consciousness and memory model.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

A Fuzzy Control Theory and Neural Network Based Sensor Network Control System.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Automatic Ontology Construction Method Based on Web Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Fibonacci sequence and cascaded directed relay networks with time-division-duplex constraint.
Proceedings of the IEEE International Conference on Communications, 2014

Readability to Financial Report: A Comparative Study of Chinese and Foreign Countries.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

Real-time lebesgue-sampled model for continuous-time nonlinear systems.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Adaptive model predictive control of uncertain constrained systems.
Proceedings of the American Control Conference, 2014

2013
An ICA Mixture Hidden Conditional Random Field Model for Video Event Classification.
IEEE Trans. Circuits Syst. Video Techn., 2013

Distributed Control of Uncertain Networked Systems: A Decoupled Design.
IEEE Trans. Automat. Contr., 2013

Research Dojo: applying agile principles to agile research - workshop summary from XP2013.
ACM SIGSOFT Software Engineering Notes, 2013

Semantic trajectory-based event detection and event pattern mining.
Knowl. Inf. Syst., 2013

Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System.
JNW, 2013

A PSO-Optimized Minimum Spanning Tree-Based Topology Control Scheme for Wireless Sensor Networks.
IJDSN, 2013

Calculation and control of flow path length in superelevation sections.
Intelligent Automation & Soft Computing, 2013

Discovering semantic associations between web services based on the electrostatic force theory.
Comput. Syst. Sci. Eng., 2013

Transform coefficient coding design for AVS2 video coding standard.
Proceedings of the 2013 Visual Communications and Image Processing, 2013

A Contourlet-Domain Image Signature for Content Authentication.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A New Key Exchange Protocol on Thompson Groups.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

L1Simplex: fault-tolerant control of cyber-physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

L1 adaptive control of uncertain networked control systems.
Proceedings of the American Control Conference, 2013

2012
Carriage Error Identification Based on Cross-Correlation Analysis and Wavelet Transformation.
Sensors, 2012

The spatio-temporal modeling for criminal incidents.
Security Informatics, 2012

Asynchronous task execution in networked control systems using decentralized event-triggering.
Systems & Control Letters, 2012

L1 adaptive controller for nonlinear time-varying reference systems.
Systems & Control Letters, 2012

Ice hockey shooting event modeling with mixture hidden Markov model.
Multimedia Tools Appl., 2012

Image forensic signature for content authenticity analysis.
J. Visual Communication and Image Representation, 2012

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Transactions, 2012

A Novel Image Signature Method for Content Authentication.
Comput. J., 2012

A bee foraging-based memetic Harmony Search method.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A novel Harmony Search method with dual memory.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Automatic Crime Prediction Using Events Extracted from Twitter Posts.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

An Architecture Description Language Based on Dynamic Description Logics.
Proceedings of the Intelligent Information Processing VI, 2012

Stabilizing bit-rates in quantized event triggered control systems.
Proceedings of the Hybrid Systems: Computation and Control (part of CPS Week 2012), 2012

A Niching Harmony Search Method for Multi-modal Optimization.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

A Modified PSO Method Based on Cultural Algorithm and Quantum Computing.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

A decoupled design in distributed control of uncertain networked control systems.
Proceedings of the American Control Conference, 2012

Stabilizing bit-rate of disturbed event triggered control systems.
Proceedings of the 4th IFAC Conference on Analysis and Design of Hybrid Systems, 2012

2011
Event-Triggering in Distributed Networked Control Systems.
IEEE Trans. Automat. Contr., 2011

An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection.
Sig. Proc.: Image Comm., 2011

An Identity-Based Mediated Signature Scheme Without Trusted PKG.
Informatica (Slovenia), 2011

Optimal design of reverse logistics network on e-waste in Shanghai.
IJNVO, 2011

Cognitive Cycle in Mind Model CAM.
Int. J. Intelligence Science, 2011

An approach for adaptive associative classification.
Expert Syst. Appl., 2011

Ring signature scheme based on multivariate public key cryptosystems.
Computers & Mathematics with Applications, 2011

On event design in event-triggered feedback systems.
Automatica, 2011

(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Passive Forensics Method to Detect Tampering for Double JPEG Compression Image.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

The spatio-temporal generalized additive model for criminal incidents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

A Negative Selection Algorithm-based motor fault detection scheme.
Proceedings of the Seventh International Conference on Natural Computation, 2011

A family of three-step eighth-order iterative methods for solving nonlinear equations.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Attentively efficient controllers for event-triggered feedback systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

A Robust Approach to Detect Tampering by Exploring Correlation Patterns.
Proceedings of the Computer Analysis of Images and Patterns, 2011

Recursive particle swarm optimization applications in radial basis function networks modeling system.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

Outlier-Tolerant Fitting and Online Diagnosis of Outliers in Dynamic Process Sampling Data Series.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.
Proceedings of the Agents and Data Mining Interaction, 2011

2010
Self-Triggering Under State-Independent Disturbances.
IEEE Trans. Automat. Contr., 2010

Hash key-based video encryption scheme for H.264/AVC.
Sig. Proc.: Image Comm., 2010

An efficient local Chan-Vese model for image segmentation.
Pattern Recognition, 2010

Mining hidden connections among biomedical concepts from disjoint biomedical literature sets through semantic-based association rule.
Int. J. Intell. Syst., 2010

Exploratory analysis of protein translation regulatory networks using hierarchical random graphs.
BMC Bioinformatics, 2010

Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Automatically face detection based on BP neural network and Bayesian decision.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Research on Collaborative Development Technology System Evolvement Mechanism Based on Brusselator Model.
Proceedings of the International Conference on E-Business and E-Government, 2010

A new Laplacian mixture conditional random field model for image labeling.
Proceedings of the IEEE International Conference on Acoustics, 2010

Context-Based Semantic Approach to Ontology Creation of Maritime Information in Chinese.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Relaxing the consistency condition in distributed event-triggered networked control systems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Performance prediction in uncertain networked control systems using ℒ1-adaptation-based distributed event-triggering.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

A mind model for brain-like computer.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
A Novel Density-Based Clustering Framework by Using Level Set Method.
IEEE Trans. Knowl. Data Eng., 2009

Self-Triggered Feedback Control Systems With Finite-Gain L2 Stability.
IEEE Trans. Automat. Contr., 2009

Nowhere-zero 4-flow in almost Petersen-minor free graphs.
Discrete Mathematics, 2009

A note on Berge-Fulkerson coloring.
Discrete Mathematics, 2009

A compact alternate direct implicit difference method for solving parabolic equation of multi-dimension.
Applied Mathematics and Computation, 2009

Ice hockey shot event modeling with mixture hidden Markov model.
Proceedings of the 1st ACM international workshop on Events in multimedia, 2009

A new localized superpixel Markov random field for image segmentation.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Research on the Video Segmentation Method with Integrated Multi-features Based on GMM.
Proceedings of the 2009 International Conference on Digital Image Processing, 2009

Event-Triggering in Distributed Networked Systems with Data Dropouts and Delays.
Proceedings of the Hybrid Systems: Computation and Control, 12th International Conference, 2009

A Novel Data Purification Algorithm Based on Outlier Mining.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Maritime information engine.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

A Hase-based SAKA Protocol Algorithm.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Improved layered space time architecture over quasi-static fading channels with unequal power allocation and multistage decoding.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

Automatically Organize Web Text Resources with Frequent Term Tree.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion.
IEEE Trans. Circuits Syst. Video Techn., 2008

A Novel Multi-Layer Level Set Method for Image Segmentation.
J. UCS, 2008

Multilayered linear dispersion codes for flat fading multiple-input multiple-output channels.
IET Communications, 2008

Modeling language and tools for the semantic link network.
Concurrency and Computation: Practice and Experience, 2008

Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Science in China Series F: Information Sciences, 2008

Classification of plant leaf images with complicated background.
Applied Mathematics and Computation, 2008

An Improved ID-based Restrictive Partially Blind Signature Scheme.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Security Architecture for Grid-Based Distributed Simulation Platform.
Proceedings of the PACIIA 2008, 2008

Message Substitute Attack on Concurrent Signatures Protocol and its Improvement.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

The Design of Rural Power Network Powerquality Monitoring and Analysis Platform Onlabview.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Numerical Simulation of Natural Ventilation Intypical Piggery of South-East China.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Automated Segmentation Using a Fast Implementation of the Chan-Vese Models.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008

Recognition of Plant Leaves Using Support Vector Machine.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

Multiple Classification of Plant Leaves Based on Gabor Transform and LBP Operator.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

A new implementation of trellis coded quantization based data hiding.
Proceedings of the IEEE International Conference on Acoustics, 2008

Decentralized Event-Triggered Broadcasts over Networked Control Systems.
Proceedings of the Hybrid Systems: Computation and Control, 11th International Workshop, 2008

Pattern Recognition Method based on the Attribute Computing Network.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Granular Computing-based Qualitative Criterion Cluster and the License Plate Characters' Recognition.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Error Performance of Linear Dispersion Codes.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Period and Deadline Selection for Schedulability in Real-Time Systems.
Proceedings of the 20th Euromicro Conference on Real-Time Systems, 2008

ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ID-Based Convertible Limited (Multi-)Verifier Signature Scheme.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A new room decoration assistance system based on 3D reconstruction and integrated service.
Proceedings of the 7th ACM International Conference on Image and Video Retrieval, 2008

Research on the Video Segmentation Method with Integrated Multi-features Based on GMM.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Event design in event-triggered feedback control systems.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

2007
A new approach to diversity and multiplexing gains for wideband MIMO channels.
IEEE Trans. Wireless Communications, 2007

Semidefinite programming relaxation approach for multiuser detection of QAM signals.
IEEE Trans. Wireless Communications, 2007

Shape recognition based on neural networks trained by differential evolution algorithm.
Neurocomputing, 2007

New concatenated coding and space-time modulation scheme for MIMO wireless communications.
IET Communications, 2007

Leaf shape based plant species recognition.
Applied Mathematics and Computation, 2007

A New Turbo Multi-User Receiver With Recursive SIC-MMSE Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Granular Ranking Algorithm Based on Rough Sets.
Proceedings of the Fuzzy Information and Engineering, 2007

Generalized Trellis Coded Quantization for Data Hiding.
Proceedings of the IEEE International Conference on Acoustics, 2007

QAM-MIMO Signal Detection Using Semidefinite Programming Relaxation.
Proceedings of the Global Communications Conference, 2007

A Granular Ranking Algorithm for Mining Market Values.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A New Topic Influence Model Research in Online Community.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Context Modeling to Enforce Interoperability in Web Service Definition.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Flexible call admission control for multiclass services in wireless LANs.
IJWMC, 2006

A new symbol-alphabet-aware multi-user detection scheme.
IEEE Communications Letters, 2006

A landau-lifshitz-type equation in studying thin film micromagnetics.
Computers & Mathematics with Applications, 2006

Abox Inference for Large Scale OWL-Lite Data.
Proceedings of the 2006 International Conference on Semantics, 2006

Asymmetrical SSL Tunnel Based VPN.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Minimum Distortion Look-Up Table Based Data Hiding.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

A New VPN Solution Based on Asymmetrical SSL Tunnels.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Improved Layered Space Time Architecture Through Unequal Power Allocation and Multistage Decoding.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
A Novel Call Admission Control in Multi-Service Wireless LANs.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Performance Analysis of UMTS Handover with the Help of WLAN.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Shape Recognition Based on Radial Basis Probabilistic Neural Network and Application to Plant Species Identification.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Phase-Shift-Based Layered Linear Space-Time Codes.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Recognition of Leaf Images Based on Shape Features Using a Hypersphere Classifier.
Proceedings of the Advances in Intelligent Computing, 2005

Leaf Recognition Based on the Combination of Wavelet Transform and Gaussian Interpolation.
Proceedings of the Advances in Intelligent Computing, 2005

Shape Matching and Recognition Base on Genetic Algorithm and Application to Plant Species Identification.
Proceedings of the Advances in Intelligent Computing, 2005

2004
On the code and interleaver design of broadband OFDM systems.
IEEE Communications Letters, 2004

Performance Analysis of Multi-pattern Frequency Hopping Wireless LANs.
Proceedings of the Telecommunications and Networking, 2004

A robust offset cancellation scheme for analog multipliers [utilises digital integrator].
Proceedings of the 2004 11th IEEE International Conference on Electronics, 2004

2003
A new diversity scheme for frequency selective MIMO channels.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2002
Unique Normal Forms for Nilpotent Planar Vector Fields.
I. J. Bifurcation and Chaos, 2002

Reinforcement Learning to Play an Optimal Nash Equilibrium in Team Markov Games.
Proceedings of the Advances in Neural Information Processing Systems 15 [Neural Information Processing Systems, 2002

Constructing of a Large-Scale Chinese-English Parallel Corpus.
Proceedings of the 3rd Workshop on Asian Language Resources and International Standardization, 2002

2001
An overlapping window decorrelating multiuser detector for DS-CDMA radio channels.
IEEE Trans. Communications, 2001

2000
Universal learning network and its application to chaos control.
Neural Networks, 2000

Agent-Based Risk Learning for Computing Systems.
Proceedings of the 4th International Conference on Multi-Agent Systems, 2000

1999
Constrained minimum-BER multiuser detection.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Chaos control using maximum Lyapunov number of universal learning network.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

Efficient implementation of linear multiuser detectors.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998


  Loading...