Xun Gong

According to our database1, Xun Gong authored at least 75 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning.
Int. J. Comput. Intell. Syst., 2020

2019
Molecular Evolution Based Dynamic Reconfiguration of Distribution Networks With DGs Considering Three-Phase Balance and Switching Times.
IEEE Trans. Industrial Informatics, 2019

HAWS: Accelerating GPU Wavefront Execution through Selective Out-of-order Execution.
TACO, 2019

An ammonia coverage ratio observing and tracking controller: stability analysis and simulation evaluation.
SCIENCE CHINA Information Sciences, 2019

Modeling and Optimization Control for an Engine Electrified Cooling System to Minimize Fuel Consumption.
IEEE Access, 2019

Double Closed-Loop Controller Design for Boost Pressure Control of Turbocharged Gasoline Engines.
IEEE Access, 2019

3D Face Recognition Based on Hybrid Data.
Proceedings of the Rough Sets - International Joint Conference, 2019

An LSTM based Encoder-Decoder Model for MultiStep Traffic Flow Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2019

Integrated optimization of Power Split, Engine Thermal Management, and Cabin Heating for Hybrid Electric Vehicles.
Proceedings of the 2019 IEEE Conference on Control Technology and Applications, 2019

Sequential Optimization of Speed, Thermal Load, and Power Split in Connected HEVs.
Proceedings of the 2019 American Control Conference, 2019

2018
A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning.
CoRR, 2018

Constrained control of free piston engine generator based on implicit reference governor.
SCIENCE CHINA Information Sciences, 2018

Evaluation of the Energy Efficiency in a Mixed Traffic with Automated Vehicles and Human Controlled Vehicles.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

2017
Laser-Based Layer-by-Layer Polymer Stereolithography for High-Frequency Applications.
Proceedings of the IEEE, 2017

Three-Stream Convolutional Networks for Video-based Person Re-Identification.
CoRR, 2017

Color-luminance adjustment for image cloning based on mean-value coordinates.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

iPDO: An Effective Feature Depth Estimation Method for 3D Face Reconstruction.
Proceedings of the Rough Sets - International Joint Conference, 2017

Multi2Sim Kepler: A detailed architectural GPU simulator.
Proceedings of the 2017 IEEE International Symposium on Performance Analysis of Systems and Software, 2017

Traffic flow forecasting based on hybrid deep learning framework.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Moka: Model-based concurrent kernel analysis.
Proceedings of the 2017 IEEE International Symposium on Workload Characterization, 2017

2016
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers.
IEEE/ACM Trans. Netw., 2016

Fast Nonlinear Model Predictive Control on FPGA Using Particle Swarm Optimization.
IEEE Trans. Industrial Electronics, 2016

Cutter-workpiece engagement determination for general milling using triangle mesh modeling.
J. Comput. Des. Eng., 2016

A Novel Role-based Access Control Model in Cloud Environments.
Int. J. Comput. Intell. Syst., 2016

Sneak-Peek: High speed covert channels in data center networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Capacity limit of queueing timing channel in shared FCFS schedulers.
Proceedings of the IEEE International Symposium on Information Theory, 2015

A two-stage estimation method for depth estimation of facial landmarks.
Proceedings of the IEEE International Conference on Identity, 2015

Modeling and predictive control of Free Piston Engine Generator.
Proceedings of the American Control Conference, 2015

2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wireless Personal Communications, 2014

Investigation of Conducted EMI in SiC JFET Inverters Using Separated Heat Sinks.
IEEE Trans. Industrial Electronics, 2014

Timing Side Channels in Shared Queues.
CoRR, 2014

Development of an Automatic System for Persistent Collection of Physiological Information - Toward Long-Term Application in Biorhythm Monitoring and Healthcare.
Proceedings of the BIODEVICES 2014, 2014

A new procedure to design nonlinear controller for rail pressure control of GDI engines.
Proceedings of the American Control Conference, 2014

2013
Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors.
IEEE Trans. Information Forensics and Security, 2013

Using Sorted Switching Median Filter to remove high-density impulse noises.
J. Visual Communication and Image Representation, 2013

An Information Theoretic Study of Timing Side Channels in Two-user Schedulers.
CoRR, 2013

Dependency of Ka-band reflectarray unit cell reflection properties on the spacing between antenna elements.
Proceedings of the 2013 IEEE Radio and Wireless Symposium, 2013

Timing side channels for traffic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2013

PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Shape Constraint and Multi-feature Fusion Particle Filter for Facial Feature Point Tracking.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

Normalization for Unconstrained Pose-Invariant 3D Face Recognition.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

Active disturbance rejection control of common rail pressure for Gasoline Direct Injection engine.
Proceedings of the American Control Conference, 2013

2012
Designing Router Scheduling Policies: A Privacy Perspective.
IEEE Trans. Signal Processing, 2012

A robust framework for face contour detection from clutter background.
Int. J. Machine Learning & Cybernetics, 2012

Backstepping sliding mode tracking control of quad-rotor under input saturation.
Int. J. Intelligent Computing and Cybernetics, 2012

CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012

Tunable reflectarray unit cell element using BST technology.
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012

Electrically-Steerable Parasitic Array Radiator (ESPAR) antenna design for arrays with two and three parasitically-coupled elements.
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012

Effects of inter-element spacing on mutual coupling and resonant properties in reflectarray unit cell design.
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012

Website Detection Using Remote Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Invisible flow watermarks for channels with dependent substitution and deletion errors.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Trajectory tacking control of a quad-rotor based on active disturbance rejection control.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Idle speed controller design for SI engine based on ADRC.
Proceedings of the IEEE International Conference on Control Applications, 2012

2011
Expression Detection Based on a Novel Emotion Recognition Method.
Int. J. Comput. Intell. Syst., 2011

Information theoretic analysis of side channel information leakage in FCFS schedulers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Designing privacy preserving router scheduling policies.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Automatic 3D Face Correspondence Based on Feature Extraction in 2D Space.
Proceedings of the Rough Set and Knowledge Technology - 5th International Conference, 2010

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks.
Proceedings of IEEE International Conference on Communications, 2010

Fingerprinting websites using remote traffic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Single 2D Image-based 3D Face Reconstruction and Its Application in Pose Estimation.
Fundam. Inform., 2009

Robust Perceptual Image Hashing Based Temporal Synchronization for Watermarked H.264 Frames.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A Novel Deformation Framework for Face Modeling from a Few Control Points.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

Towards Fast and Robust Watermarking Scheme for H.264 Video.
Proceedings of the Tenth IEEE International Symposium on Multimedia (ISM2008), 2008

2007
A Dynamic Component Deforming Model for Face Shape Reconstruction.
Proceedings of the Advances in Visual Computing, Third International Symposium, 2007

2006
Immune-Based Dynamic Intrusion Response Model.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Immune Multi-agent Active Defense Model for Network Intrusion.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

An Immune Mobile Agent Based Grid Intrusion Detection Model.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Parameter Evolution for Quality of Service in Multimedia Networking.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Immunity and Mobile Agent Based Intrusion Detection for Grid.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Family Gene Based Grid Trust Model.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Grid Intrusion Detection Based on Immune Agent.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

An Immunity-Based Dynamic Multilayer Intrusion Detection System.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

NASC: A Novel Approach for Spam Classification.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

Immunity and Mobile Agent Based Grid Intrusion Detection.
Proceedings of the Computational Intelligence and Bioinformatics, 2006


  Loading...