Xiaofeng Wang

According to our database1, Xiaofeng Wang authored at least 292 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
High-performance docker integration scheme based on OpenStack.
World Wide Web, 2020

Game Theory on Power Control in Wireless Sensor Networks Based on Successive Interference Cancellation.
Wirel. Pers. Commun., 2020

Image alignment based perceptual image hash for content authentication.
Signal Process. Image Commun., 2020

Low Dose CT Image Reconstruction Based on Structure Tensor Total Variation Using Accelerated Fast Iterative Shrinkage Thresholding Algorithm.
Sensors, 2020

CheetahVIS: A Visual Analytical System for Large Urban Bus Data.
Proc. VLDB Endow., 2020

Probabilistic SVM classifier ensemble selection based on GMDH-type neural network.
Pattern Recognit., 2020

Constructing fine-grained entity recognition corpora based on clinical records of traditional Chinese medicine.
BMC Medical Informatics Decis. Mak., 2020

The usage of WeChat to promote academic publishing in China: A case study on Chinese Laser Press.
Learn. Publ., 2020

Optimization of preventive maintenance for series manufacturing system by differential evolution algorithm.
J. Intell. Manuf., 2020

Sampled-data stabilization of a class of nonlinear differential algebraic systems via partial-state and output feedback.
J. Frankl. Inst., 2020

Learning reliable-spatial and spatial-variation regularization correlation filters for visual tracking.
Image Vis. Comput., 2020

Fast and robust visual tracking with hard balanced focal loss and guided domain adaption.
Image Vis. Comput., 2020

High-Fidelity Router Emulation Technologies Based on Multi-Scale Virtualization.
Inf., 2020

New criteria on event-triggered cluster synchronization of neutral-type neural networks with Lévy noise and non-Lipschitz condition.
Neurocomputing, 2020

Estimating posterior inference quality of the relational infinite latent feature model for overlapping community detection.
Frontiers Comput. Sci., 2020

Diffusion tensor imaging quantifying the severity of chronic hepatitis in rats.
BMC Medical Imaging, 2020

A blow-up criterion of the coupled chemotaxis-fluid equations in R3.
Appl. Math. Lett., 2020

A Novel Method of Detecting Chinese Rendered Text on Tilted Screen of Mobile Devices.
IEEE Access, 2020

Corrections to "Molecular Property Prediction Based on a Multichannel Substructure Graph".
IEEE Access, 2020

Molecular Property Prediction Based on a Multichannel Substructure Graph.
IEEE Access, 2020

Coarse-to-fine Grained Image Splicing Localization Method Based on Noise Level Inconsistency.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

2019
Warning Propagation Algorithm for the MAX-3-SAT Problem.
IEEE Trans. Emerg. Top. Comput., 2019

Tactical and Operational Cooperative Empty Container Repositioning Optimization Model Based on Business Flow and Initial Solutions Generation Rules.
Symmetry, 2019

Recent Progress in Self-Powered Skin Sensors.
Sensors, 2019

Identification of Hydrothermal Alteration Minerals for Exploring Gold Deposits Based on SVM and PCA Using ASTER Data: A Case Study of Gulong.
Remote. Sens., 2019

Machine learning methods for research highlight prediction in biomedical effects of nanomaterial application.
Pattern Recognit. Lett., 2019

A multi-scale level set method based on local features for segmentation of images with intensity inhomogeneity.
Pattern Recognit., 2019

Image splicing localization using noise distribution characteristic.
Multim. Tools Appl., 2019

Collaborative model with adaptive selection scheme for visual tracking.
Int. J. Mach. Learn. Cybern., 2019

高性能网络安全告警信息的关联分析方法 (High-performance Association Analysis Method for Network Security Alarm Information).
计算机科学, 2019

基于可穿戴设备的心电图自适应分类算法研究 (Study on Patient-adaptive Algorithm for ECG Classification Based on Wearable Devices).
计算机科学, 2019

Complete Weight Enumerator for a Class of Linear Codes from Defining Sets and Their Applications.
J. Syst. Sci. Complex., 2019

Multi-Level Fusion Processing Algorithm for Complex Radar Signals Based on Evidence Theory.
J. Inf. Process. Syst., 2019

Overlapping community detection for count-value networks.
Hum. centric Comput. Inf. Sci., 2019

Subspace segmentation via self-regularized latent <i>K</i>-means.
Expert Syst. Appl., 2019

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
CoRR, 2019

LISA: a MATLAB package for Longitudinal Image Sequence Analysis.
CoRR, 2019

A Broadband Wide-Angle Synthetical Absorber Designed by Topology Optimization of Resistance Surface and Metal Wires.
IEEE Access, 2019

Selective Multi-Scale Feature Learning by Discriminative Local Representation.
IEEE Access, 2019

Effects of Consumers' Strategic Behavior and Psychological Satisfaction on the Retailer's Pricing and Inventory Decisions.
IEEE Access, 2019

Quantity Commitment Strategy and Effectiveness Analysis With Disappointment Aversion Strategic Consumers.
IEEE Access, 2019

An Adaptive Energy Management Strategy to Extend Battery Lifetime of Solar Powered Wireless Sensor Nodes.
IEEE Access, 2019

Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019

Design and Implementation of Medical Dispute Governance Based on Blockchain.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Study and Implementation of Minority Mobile Application Recommendation Software.
Proceedings of the Simulation Tools and Techniques - 11th International Conference, 2019

Empirical Study of Hybrid Optimization Strategy for Evolutionary Testing.
Proceedings of the Data Science, 2019

The Rise of Software Startup Research: An Insider's View.
Proceedings of the Software Business - 10th International Conference, 2019

Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Assessing depression risk in Chinese microblogs: a corpus and machine learning methods.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

Yun: A High-Performance Container Management Service Based on OpenStack.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-Stage Mixed Attribute Outlier Detection Algorithm Based on Neighborhood Density Difference.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Finite Element Analyses on the Soft Projectile Impact Testing of a Wall-floor-wall Reinforced Concrete Structure.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
RSimplex: A Robust Control Architecture for Cyber And Physical Failures.
ACM Trans. Cyber Phys. Syst., 2018

Local Importance Representation Convolutional Neural Network for Fine-Grained Image Classification.
Symmetry, 2018

Testing the Efficiency of Using High-Resolution Data From GF-1 in Land Cover Classifications.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2018

Heuristic routing algorithm toward scalable distributed generalized assignment problem.
Soft Comput., 2018

The Effect of Zeolite Composition and Grain Size on Gas Sensing Properties of SnO<sub>2</sub>/Zeolite Sensor.
Sensors, 2018

Distribution-aware cache replication for cooperative road side units in VANETs.
Peer Peer Netw. Appl., 2018

Robust Subspace Segmentation by Self-Representation Constrained Low-Rank Representation.
Neural Process. Lett., 2018

Super-resolution image reconstruction using surface fitting with hierarchical structure.
J. Vis. Commun. Image Represent., 2018

An Ostrowski-type method with memory using a novel self-accelerating parameter.
J. Comput. Appl. Math., 2018

A new accelerating technique applied to a variant of Cordero-Torregrosa method.
J. Comput. Appl. Math., 2018

A Combined Back and Foreground-Based Stereo Matching Algorithm Using Belief Propagation and Self-Adapting Dissimilarity Measure.
Int. J. Pattern Recognit. Artif. Intell., 2018

A cloud-based experimental platform for networked industrial control systems.
Int. J. Model. Simul. Sci. Comput., 2018

A family of Newton-type iterative methods using some special self-accelerating parameters.
Int. J. Comput. Math., 2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Learning Optimal Seeds for Ranking Saliency.
Cogn. Comput., 2018

Automatically discovering clusters of algorithm and problem instance behaviors as well as their causes from experimental data, algorithm setups, and instance features.
Appl. Soft Comput., 2018

A Dependability Modeling and Analysis Approach for an IoP-Based Service System.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Representation Method and Optimization of Network Flow Based on Coalgebra.
Proceedings of the 2018 IEEE SmartWorld, 2018

Selective Ensemble Learning based Human Action Recognition Using Fusing Visual Features.
Proceedings of the 24th International Conference on Automation and Computing, 2018

A Bucket-Tree Based Algorithm for Automated Reasoning.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Regularized Super-Resolution Reconstruction Based on Edge Prior.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Image Classification Based on Improved Spatial Pyramid Matching Model.
Proceedings of the Intelligent Computing Theories and Application, 2018

Detection and Resolving WSN Issues with the use of Data Mining & Intelligent Algorithms.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Integration of Speech/ Music Discrimination and Mood Classification with Audio Feature Extraction.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

A Fast and Layered Real Rendering Method for Human Face Model - D-BRDF.
Proceedings of the E-Learning and Games - 12th International Conference, 2018

A Combined Deep Learning and Semi-supervised Classification Algorithm for LS Area.
Proceedings of the E-Learning and Games - 12th International Conference, 2018

Improved Collaborative Filtering Algorithm Based on Multifactor Fusion and User Features Clustering.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Optimizing Filter Size in Convolutional Neural Networks for Facial Action Unit Recognition.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Research on High-Fidelity Router Emulation Technologies Based on Cloud Platform.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

Asynchronous Lebesgue Approximation Model for Distributed Continuous-Time Nonlinear Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Research on Defect Detection of Castings Based on Deep Residual Network.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

Classification of Fabric Patterns Image Based on Improved Log-AlexNet.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

Lebesgue-Approximation-Based Model Predictive Control for Nonlinear Sampled-Data Systems with Measurement Noises.
Proceedings of the 2018 Annual American Control Conference, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

Reversible data hiding in encrypted image with separable data extraction from image decryption.
Multim. Tools Appl., 2017

Maintaining the accuracy of focusing topology area in network simulation.
J. Simulation, 2017

GB(2D)2 PCA-based convolutional network for face recognition.
J. Electronic Imaging, 2017

Domain Adaptation Image Classification Based on Multi-sparse Representation.
KSII Trans. Internet Inf. Syst., 2017

Self-regularized fixed-rank representation for subspace segmentation.
Inf. Sci., 2017

Optimizing Filter Size in Convolutional Neural Networks for Facial Action Unit Recognition.
CoRR, 2017

Automatic liver segmentation from abdominal CT volumes using graph cuts and border marching.
Comput. Methods Programs Biomed., 2017

Monocular Vision Based Object Recognition and Tracking for Intelligent Robot.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2017

Human action recognition using transfer learning with deep representations.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Two Stages Empty Containers Repositioning of Asia-Europe Shipping Routes Under Revenue Maximization.
Proceedings of the Intelligence Science I, 2017

Improved CNN Based on Super-Pixel Segmentation.
Proceedings of the Intelligence Science I, 2017

A Coding Efficiency Improvement Algorithm for Future Video Coding.
Proceedings of the Intelligence Science I, 2017

Seat Belt Detection Using Convolutional Neural Network BN-AlexNet.
Proceedings of the Intelligent Computing Theories and Application, 2017

Flexible Analysis of Cross-Organizational Process Modeling Based on π Calculus.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Gender and Age Classification of Human Faces for Automatic Detection of Anomalous Human Behaviour.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Moving target detection based on improved three frame difference and visual background extractor.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Sporadic model predictive control using Lebesgue approximation.
Proceedings of the 2017 American Control Conference, 2017

2016
A Self-Powered Insole for Human Motion Recognition.
Sensors, 2016

Spectral clustering steered low-rank representation for subspace segmentation.
J. Vis. Commun. Image Represent., 2016

并联两用户干扰信道(IC)在发射端网间认知下的自由度研究 (Research on Degrees of Freedom of Interference Channel (IC) of Two Parallel Users in Cognition between Transmitting End Nets).
计算机科学, 2016

Power-Aware Classifier Selection in Wireless Sensor Networks.
J. Inf. Sci. Eng., 2016

A kind of Lagrange dynamic simplified modeling method for multi-DOF robot.
J. Intell. Fuzzy Syst., 2016

Extraction and Classification of the Cultural Relic Model Based on Local Geometric Features.
J. Adv. Comput. Intell. Intell. Informatics, 2016

Data-driven model-free adaptive sliding mode control for the multi degree-of-freedom robotic exoskeleton.
Inf. Sci., 2016

Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks.
Int. J. Pattern Recognit. Artif. Intell., 2016

Source camera identification from image texture features.
Neurocomputing, 2016

Research of the delaying crack propagation on an aero-engine rotor.
Int. J. Mechatronics Autom., 2016

Hamilton Circuits and Essential Girth of Claw Free Graphs.
Graphs Comb., 2016

An overview of 3GPP enhancements on machine to machine communications.
IEEE Commun. Mag., 2016

Integration of Learning Activity and Process-Oriented Assessment to Promote the Self-Directed e-Learning.
Proceedings of the Intelligent Environments 2016, 2016

Multiple Health Phases Based Remaining Useful Lifetime Prediction on Bearings.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2016

Intrusion detection of specific area based on video.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

An improved feature fusion algorithm for image retrieval.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

LS-SLAM: SLAM with Lebesgue sampling.
Proceedings of the 2016 American Control Conference, 2016

2015
Cloud-Assisted Live Streaming for Crowdsourced Multimedia Content.
IEEE Trans. Multimedia, 2015

A Visual Model-Based Perceptual Image Hash for Content Authentication.
IEEE Trans. Inf. Forensics Secur., 2015

Real-Time L<sub>1</sub> Adaptive Control for Uncertain Networked Control Systems.
IEEE Trans. Autom. Control., 2015

A robust approach to detect digital forgeries by exploring correlation patterns.
Pattern Anal. Appl., 2015

规则实例集上警示传播算法的收敛性 (Convergence of Warning Propagation Algorithm for Regular Structure Instances).
计算机科学, 2015

一种采用纹理分布特征的标定方法 (Calibration Method of Using Texture Distribution Features).
计算机科学, 2015

Steganography forensics method for detecting least significant bit replacement attack.
J. Electronic Imaging, 2015

Unique Fulkerson coloring of Petersen minor-free cubic graphs.
Eur. J. Comb., 2015

UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

Nonlinear iterative learning control of 5 DOF upper-limb rehabilitation robot.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

A Mixed Weisfeiler-Lehman Graph Kernel.
Proceedings of the Graph-Based Representations in Pattern Recognition, 2015

Collective Traces modeling in Collaborative Working Environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

CapSeat: capacitive proximity sensing for automotive activity recognition.
Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2015

Consensus-based simultaneous arrival of multiple UAVs with constrained velocity.
Proceedings of the American Control Conference, 2015

Decentralized event-triggered consensus of Linear Multi-agent Systems under Directed Graphs.
Proceedings of the American Control Conference, 2015

2014
Networked Strong Tracking Filtering with Multiple Packet Dropouts: Algorithms and Applications.
IEEE Trans. Ind. Electron., 2014

On the Degrees of Freedom for Multi-Hop Wireless Networks under Layered TDD Constraint.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

A comparison of contrast measurements in passive autofocus systems for low contrast images.
Multim. Tools Appl., 2014

Network simulation task partition method in heterogeneous computing environment.
Int. J. Model. Simul. Sci. Comput., 2014

Traditional Classroom vs E-learning in Higher Education: Difference between Students' Behavioral Engagement.
iJET, 2014

Double shielded Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2014

Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups.
IACR Cryptol. ePrint Arch., 2014

Packing resonant hexagons in fullerenes.
Discret. Optim., 2014

Stabilizing bit-rates in networked control systems with decentralized event-triggered communication.
Discret. Event Dyn. Syst., 2014

A statistical feature based approach to distinguish PRCG from photographs.
Comput. Vis. Image Underst., 2014

Parts-based face super-resolution via non-negative matrix factorization.
Comput. Electr. Eng., 2014

The Theory and Practice of Randori Coding Dojos.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2014

A concept acquisition method based on visual perception.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

Cognitive memory systems in consciousness and memory model.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

A Fuzzy Control Theory and Neural Network Based Sensor Network Control System.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Automatic Ontology Construction Method Based on Web Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Fibonacci sequence and cascaded directed relay networks with time-division-duplex constraint.
Proceedings of the IEEE International Conference on Communications, 2014

Readability to Financial Report: A Comparative Study of Chinese and Foreign Countries.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

Adaptive model predictive control of uncertain constrained systems.
Proceedings of the American Control Conference, 2014

2013
An ICA Mixture Hidden Conditional Random Field Model for Video Event Classification.
IEEE Trans. Circuits Syst. Video Technol., 2013

Distributed Control of Uncertain Networked Systems: A Decoupled Design.
IEEE Trans. Autom. Control., 2013

Research Dojo: applying agile principles to agile research - workshop summary from XP2013.
ACM SIGSOFT Softw. Eng. Notes, 2013

Semantic trajectory-based event detection and event pattern mining.
Knowl. Inf. Syst., 2013

Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System.
J. Networks, 2013

A PSO-Optimized Minimum Spanning Tree-Based Topology Control Scheme for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Calculation and control of flow path length in superelevation sections.
Intell. Autom. Soft Comput., 2013

Discovering semantic associations between web services based on the electrostatic force theory.
Comput. Syst. Sci. Eng., 2013

Transform coefficient coding design for AVS2 video coding standard.
Proceedings of the 2013 Visual Communications and Image Processing, 2013

A Contourlet-Domain Image Signature for Content Authentication.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Harmony Search method-based multi-modal optimal design of a wind generator.
Proceedings of the IECON 2013, 2013

A New Key Exchange Protocol on Thompson Groups.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

L1Simplex: fault-tolerant control of cyber-physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

L1 adaptive control of uncertain networked control systems.
Proceedings of the American Control Conference, 2013

2012
Carriage Error Identification Based on Cross-Correlation Analysis and Wavelet Transformation.
Sensors, 2012

The spatio-temporal modeling for criminal incidents.
Secur. Informatics, 2012

Asynchronous task execution in networked control systems using decentralized event-triggering.
Syst. Control. Lett., 2012

L<sub>1</sub> adaptive controller for nonlinear time-varying reference systems.
Syst. Control. Lett., 2012

Ice hockey shooting event modeling with mixture hidden Markov model.
Multim. Tools Appl., 2012

Image forensic signature for content authenticity analysis.
J. Vis. Commun. Image Represent., 2012

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Image Signature Method for Content Authentication.
Comput. J., 2012

A bee foraging-based memetic Harmony Search method.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A novel Harmony Search method with dual memory.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Automatic Crime Prediction Using Events Extracted from Twitter Posts.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

An Architecture Description Language Based on Dynamic Description Logics.
Proceedings of the Intelligent Information Processing VI, 2012

A Niching Harmony Search Method for Multi-modal Optimization.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

A Modified PSO Method Based on Cultural Algorithm and Quantum Computing.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

A decoupled design in distributed control of uncertain networked control systems.
Proceedings of the American Control Conference, 2012

2011
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection.
Signal Process. Image Commun., 2011

An Identity-Based Mediated Signature Scheme Without Trusted PKG.
Informatica (Slovenia), 2011

Optimal design of reverse logistics network on e-waste in Shanghai.
Int. J. Netw. Virtual Organisations, 2011

Cognitive Cycle in Mind Model CAM.
Int. J. Intell. Sci., 2011

An approach for adaptive associative classification.
Expert Syst. Appl., 2011

Ring signature scheme based on multivariate public key cryptosystems.
Comput. Math. Appl., 2011

(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Passive Forensics Method to Detect Tampering for Double JPEG Compression Image.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

The spatio-temporal generalized additive model for criminal incidents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

A Negative Selection Algorithm-based motor fault detection scheme.
Proceedings of the Seventh International Conference on Natural Computation, 2011

A family of three-step eighth-order iterative methods for solving nonlinear equations.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

A Robust Approach to Detect Tampering by Exploring Correlation Patterns.
Proceedings of the Computer Analysis of Images and Patterns, 2011

Recursive particle swarm optimization applications in radial basis function networks modeling system.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

Outlier-Tolerant Fitting and Online Diagnosis of Outliers in Dynamic Process Sampling Data Series.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.
Proceedings of the Agents and Data Mining Interaction, 2011

2010
Hash key-based video encryption scheme for H.264/AVC.
Signal Process. Image Commun., 2010

An efficient local Chan-Vese model for image segmentation.
Pattern Recognit., 2010

Mining hidden connections among biomedical concepts from disjoint biomedical literature sets through semantic-based association rule.
Int. J. Intell. Syst., 2010

Exploratory analysis of protein translation regulatory networks using hierarchical random graphs.
BMC Bioinform., 2010

Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Automatically face detection based on BP neural network and Bayesian decision.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Research on Collaborative Development Technology System Evolvement Mechanism Based on Brusselator Model.
Proceedings of the International Conference on E-Business and E-Government, 2010

A new Laplacian mixture conditional random field model for image labeling.
Proceedings of the IEEE International Conference on Acoustics, 2010

Context-Based Semantic Approach to Ontology Creation of Maritime Information in Chinese.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Relaxing the consistency condition in distributed event-triggered networked control systems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Performance prediction in uncertain networked control systems using ℒ1-adaptation-based distributed event-triggering.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

A mind model for brain-like computer.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
A Novel Density-Based Clustering Framework by Using Level Set Method.
IEEE Trans. Knowl. Data Eng., 2009

Nowhere-zero 4-flow in almost Petersen-minor free graphs.
Discret. Math., 2009

A note on Berge-Fulkerson coloring.
Discret. Math., 2009

A compact alternate direct implicit difference method for solving parabolic equation of multi-dimension.
Appl. Math. Comput., 2009

Ice hockey shot event modeling with mixture hidden Markov model.
Proceedings of the 1st ACM international workshop on Events in multimedia, 2009

A new localized superpixel Markov random field for image segmentation.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

ICA mixture hidden conditional random field model for sports event classification.
Proceedings of the 12th IEEE International Conference on Computer Vision Workshops, 2009

A Novel Data Purification Algorithm Based on Outlier Mining.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Maritime information engine.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

A Hase-based SAKA Protocol Algorithm.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Improved layered space time architecture over quasi-static fading channels with unequal power allocation and multistage decoding.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

Automatically Organize Web Text Resources with Frequent Term Tree.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion.
IEEE Trans. Circuits Syst. Video Technol., 2008

A Novel Multi-Layer Level Set Method for Image Segmentation.
J. Univers. Comput. Sci., 2008

Multilayered linear dispersion codes for flat fading multiple-input multiple-output channels.
IET Commun., 2008

Modeling language and tools for the semantic link network.
Concurr. Comput. Pract. Exp., 2008

Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Sci. China Ser. F Inf. Sci., 2008

Classification of plant leaf images with complicated background.
Appl. Math. Comput., 2008

An Improved ID-based Restrictive Partially Blind Signature Scheme.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Security Architecture for Grid-Based Distributed Simulation Platform.
Proceedings of the PACIIA 2008, 2008

Message Substitute Attack on Concurrent Signatures Protocol and its Improvement.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

The Design of Rural Power Network Powerquality Monitoring and Analysis Platform Onlabview.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Numerical Simulation of Natural Ventilation Intypical Piggery of South-East China.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Automated Segmentation Using a Fast Implementation of the Chan-Vese Models.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008

Recognition of Plant Leaves Using Support Vector Machine.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

Multiple Classification of Plant Leaves Based on Gabor Transform and LBP Operator.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2008

A new implementation of trellis coded quantization based data hiding.
Proceedings of the IEEE International Conference on Acoustics, 2008

Pattern Recognition Method based on the Attribute Computing Network.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Granular Computing-based Qualitative Criterion Cluster and the License Plate Characters' Recognition.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Error Performance of Linear Dispersion Codes.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ID-Based Convertible Limited (Multi-)Verifier Signature Scheme.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A new room decoration assistance system based on 3D reconstruction and integrated service.
Proceedings of the 7th ACM International Conference on Image and Video Retrieval, 2008

Research on the Video Segmentation Method with Integrated Multi-features Based on GMM.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
A new approach to diversity and multiplexing gains for wideband MIMO channels.
IEEE Trans. Wirel. Commun., 2007

Semidefinite programming relaxation approach for multiuser detection of QAM signals.
IEEE Trans. Wirel. Commun., 2007

Shape recognition based on neural networks trained by differential evolution algorithm.
Neurocomputing, 2007

New concatenated coding and space-time modulation scheme for MIMO wireless communications.
IET Commun., 2007

Leaf shape based plant species recognition.
Appl. Math. Comput., 2007

A New Turbo Multi-User Receiver With Recursive SIC-MMSE Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Granular Ranking Algorithm Based on Rough Sets.
Proceedings of the Fuzzy Information and Engineering, 2007

Generalized Trellis Coded Quantization for Data Hiding.
Proceedings of the IEEE International Conference on Acoustics, 2007

QAM-MIMO Signal Detection Using Semidefinite Programming Relaxation.
Proceedings of the Global Communications Conference, 2007

A Granular Ranking Algorithm for Mining Market Values.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A New Topic Influence Model Research in Online Community.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Context Modeling to Enforce Interoperability in Web Service Definition.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Flexible call admission control for multiclass services in wireless LANs.
Int. J. Wirel. Mob. Comput., 2006

A new symbol-alphabet-aware multi-user detection scheme.
IEEE Commun. Lett., 2006

A landau-lifshitz-type equation in studying thin film micromagnetics.
Comput. Math. Appl., 2006

Abox Inference for Large Scale OWL-Lite Data.
Proceedings of the 2006 International Conference on Semantics, 2006

Asymmetrical SSL Tunnel Based VPN.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Minimum Distortion Look-Up Table Based Data Hiding.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

A New VPN Solution Based on Asymmetrical SSL Tunnels.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Preliminary results on state-trigered scheduling of stabilizing control tasks.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006

Improved Layered Space Time Architecture Through Unequal Power Allocation and Multistage Decoding.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
A Novel Call Admission Control in Multi-Service Wireless LANs.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Performance Analysis of UMTS Handover with the Help of WLAN.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Shape Recognition Based on Radial Basis Probabilistic Neural Network and Application to Plant Species Identification.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Phase-Shift-Based Layered Linear Space-Time Codes.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Recognition of Leaf Images Based on Shape Features Using a Hypersphere Classifier.
Proceedings of the Advances in Intelligent Computing, 2005

Leaf Recognition Based on the Combination of Wavelet Transform and Gaussian Interpolation.
Proceedings of the Advances in Intelligent Computing, 2005

Shape Matching and Recognition Base on Genetic Algorithm and Application to Plant Species Identification.
Proceedings of the Advances in Intelligent Computing, 2005

2004
On the code and interleaver design of broadband OFDM systems.
IEEE Commun. Lett., 2004

Performance Analysis of Multi-pattern Frequency Hopping Wireless LANs.
Proceedings of the Telecommunications and Networking, 2004

A robust offset cancellation scheme for analog multipliers [utilises digital integrator].
Proceedings of the 2004 11th IEEE International Conference on Electronics, 2004

2003
A new diversity scheme for frequency selective MIMO channels.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2002
Unique Normal Forms for Nilpotent Planar Vector Fields.
Int. J. Bifurc. Chaos, 2002

Reinforcement Learning to Play an Optimal Nash Equilibrium in Team Markov Games.
Proceedings of the Advances in Neural Information Processing Systems 15 [Neural Information Processing Systems, 2002

Constructing of a Large-Scale Chinese-English Parallel Corpus.
Proceedings of the 3rd Workshop on Asian Language Resources and International Standardization, 2002

2001
An overlapping window decorrelating multiuser detector for DS-CDMA radio channels.
IEEE Trans. Commun., 2001

2000
Universal learning network and its application to chaos control.
Neural Networks, 2000

Agent-Based Risk Learning for Computing Systems.
Proceedings of the 4th International Conference on Multi-Agent Systems, 2000

1999
Constrained minimum-BER multiuser detection.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Chaos control using maximum Lyapunov number of universal learning network.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

Two-tiered architecture of IS in WWW environment.
Proceedings of the Information Systems in the WWW Environment, 1998

Efficient implementation of linear multiuser detectors.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998


  Loading...