Xiaoyong Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Application of Residual Structure Time Convolutional Network Based on Attention Mechanism in Remaining Useful Life Interval Prediction of Bearings.
Sensors, July, 2024

Tripartite evolutionary game in the process of network attack and defense.
Telecommun. Syst., June, 2024

EM-IFCM: Fuzzy c-means clustering algorithm based on edge modification for imbalanced data.
Inf. Sci., February, 2024

An Overview of Behavioral Recognition.
Inf. Technol. Control., 2024

An adaptive highly improving the accuracy of clustering algorithm based on kernel density estimation.
Inf. Sci., 2024

RCDM: Enabling Robustness for Conditional Diffusion Model.
CoRR, 2024

The LPST-Net: A new deep interval health monitoring and prediction framework for bearing-rotor systems under complex operating conditions.
Adv. Eng. Informatics, 2024

FashionGPT: A Large Vision-Language Model for Enhancing Fashion Understanding.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

2023
Hypergraph Transformer Neural Networks.
ACM Trans. Knowl. Discov. Data, June, 2023

A novel pedal musculoskeletal response based on differential spatio-temporal LSTM for human activity recognition.
Knowl. Based Syst., 2023

Inferring student social link from spatiotemporal behavior data via entropy-based analyzing model.
Intell. Data Anal., 2023

DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Passive robust control for uncertain Hamiltonian systems by using operator theory.
CAAI Trans. Intell. Technol., December, 2022

High-Resolution ISAR Imaging Based on Plug-and-Play 2D ADMM-Net.
Remote. Sens., 2022

Student Group Division Algorithm based on Multi-view Attribute Heterogeneous Information Network.
KSII Trans. Internet Inf. Syst., 2022

Optimization of Complex Function Expansions for Gauss-Krüger Projections.
ISPRS Int. J. Geo Inf., 2022

Multi-view hypergraph neural networks for student academic performance prediction.
Eng. Appl. Artif. Intell., 2022

An Adversarial Approach for Unsupervised Syntax-Guided Paraphrase Generation.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

SECT: A Successively Conditional Transformer for Controllable Paraphrase Generation.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
High-Resolution ISAR Imaging and Autofocusing via 2D-ADMM-Net.
Remote. Sens., 2021

Retrieval of rapeseed leaf area index using the PROSAIL model with canopy coverage derived from UAV images as a correction parameter.
Int. J. Appl. Earth Obs. Geoinformation, 2021

Global-Similarity Local-Salience Network for Traffic Weather Recognition.
IEEE Access, 2021

An Unsupervised Ensemble Clustering Approach for the Analysis of Student Behavioral Patterns.
IEEE Access, 2021

Speaker Verification with Disentangled Self-attention.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Improving the Generalization Ability of Deepfake Detection via Disentangled Representation Learning.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
Identification of Prognostic Biomarkers of Cutaneous Melanoma Based on Analysis of Tumor Mutation Burden.
Comput. Math. Methods Medicine, 2020

Spiral toolpath generation method for pocket machining.
Comput. Ind. Eng., 2020

2019
Employ Multimodal Machine Learning for Content quality analysis.
CoRR, 2019

A Risk Assessment Method based on Software Behavior.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Model knowledge matching algorithm for steelmaking casting scheduling.
Int. J. Wirel. Mob. Comput., 2018

2015
A multi-bit FIR filtering technique for two-point modulators with dedicated digital high-pass modulation path.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

A 14b 1GS/s DAC with SFDR > 80 dBc across the whole nyquist band by mixed total 3-dimesional sort-and-combine and dynamic element matching.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2012
Modeling and Predicting Mixed Errors of Shipboard Measurement Equipments.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2010
A trusted computing environment model in cloud architecture.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

High performance network virtualization with SR-IOV.
Proceedings of the 16th International Conference on High-Performance Computer Architecture (HPCA-16 2010), 2010

Quantitative visualization of ChIP-chip data by using linked views.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010

2009
The Simulation of Heavy Metal's Transporting in Soil.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
The Optimization of Xen Network Virtualization.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
FATTY: A Reliable FAT File System.
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007

2006
Large-Scale Turnover of Functional Transcription Factor Binding Sites in <i>Drosophila</i>.
PLoS Comput. Biol., 2006

An Efficient Attestation for Trustworthiness of Computing Platform.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Software Complexity Based Remote Attestation.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2003
Fast Decision Tree Learning Algorithms for Microarray Data Collections.
Proceedings of the 2003 International Conference on Machine Learning and Applications, 2003

2002
An Attack-Finding Algorithm for Security Protocols.
J. Comput. Sci. Technol., 2002

2001
An Intelligent Intruder Model for Security Protocol Analysis.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...