Yong Guan

According to our database1, Yong Guan authored at least 223 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems.
J. Syst. Archit., 2020

Correction to: Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2020

Limited Angle Tomography for Transmission X-Ray Microscopy Using Deep Learning.
CoRR, 2020

Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

Formal verification of discrete event model.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

A Frame-based Sentence Representation for Machine Reading Comprehension.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
A Dynamic Neural Network Approach for Efficient Control of Manipulators.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
TCPS, 2019

An Efficient LSM-Tree-Based SQLite-Like Database Engine for Mobile Devices.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2019

Checkpointing-Aware Loop Tiling for Energy Harvesting Powered Nonvolatile Processors.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2019

DCR: Deterministic Crash Recovery for NAND Flash Storage Systems.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2019

HiNextApp: A context-aware and adaptive framework for app prediction in mobile systems.
Sustain. Comput. Informatics Syst., 2019

A Formal Model-Based Design Method for Robotic Systems.
IEEE Systems Journal, 2019

SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
Security and Communication Networks, 2019

Formalization of functional variation in HOL Light.
J. Log. Algebraic Methods Program., 2019

Formalization of Geometric Algebra in HOL Light.
J. Autom. Reasoning, 2019

A Hybrid Framework for High-Performance Modeling of Three-Dimensional Pipe Networks.
ISPRS Int. J. Geo-Information, 2019

A High-performance Cross-platform Map Rendering Engine for Mobile Geographic Information System (GIS).
ISPRS Int. J. Geo-Information, 2019

Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
IACR Cryptol. ePrint Arch., 2019

Bidirectional Potential Guided RRT* for Motion Planning.
IEEE Access, 2019

Deep Reinforcement Learning With Optimized Reward Functions for Robotic Trajectory Planning.
IEEE Access, 2019

Manifold Regularization Graph Structure Auto-Encoder to Detect Loop Closure for Visual SLAM.
IEEE Access, 2019

Wide-View Sidewalk Dataset Based Pedestrian Safety Application.
IEEE Access, 2019

Research on Degradation Modeling and Life Prediction Method of Lithium-Ion Battery in Dynamic Environment.
IEEE Access, 2019

A Virtual Sample Generation Method Based on Differential Evolution Algorithm for Overall Trend of Small Sample Data: Used for Lithium-ion Battery Capacity Degradation Data.
IEEE Access, 2019

MicroTEE: Designing TEE OS Based on the Microkernel Architecture.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A HOL Theory of the Differential for Matrix Functions.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Algorithm Mismatch in Spatial Steganalysis.
Proceedings of the Media Watermarking, 2019

StegoAppDB: a Steganography Apps Forensics Image Database.
Proceedings of the Media Watermarking, 2019

Model Checking for the Goal-Feedback-Result Pattern in ROS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Inverse Dynamics Modeling of Robotic Manipulator with Hierarchical Recurrent Network.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

P-Minder: A CNN Based Sidewalk Segmentation Approach for Phubber Safety Applications.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Towards Verifying Ethereum Smart Contracts at Intermediate Language Level.
Proceedings of the Formal Methods and Software Engineering, 2019

HECTor: Homomorphic Encryption Enabled Onion Routing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Formal Modelling and Verification of Spinlocks at Instruction Level.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Using Local Clocks to Reproduce Concurrency Bugs.
IEEE Trans. Software Eng., 2018

Safety-Assured Model-Driven Design of the Multifunction Vehicle Bus Controller.
IEEE Trans. Intell. Transp. Syst., 2018

From Offline Towards Real-Time Verification for Robot Systems.
IEEE Trans. Ind. Informatics, 2018

Naive Bayes Bearing Fault Diagnosis Based on Enhanced Independence of Data.
Sensors, 2018

Bayesian Test for Detecting False Data Injection in Wireless Relay Networks.
IEEE Communications Letters, 2018

Sensor attack detection using history based pairwise inconsistency.
Future Gener. Comput. Syst., 2018

Formal analysis of the kinematic Jacobian in screw theory.
Formal Asp. Comput., 2018

Bearing Remaining Useful Life Prediction Based on Naive Bayes and Weibull Distributions.
Entropy, 2018

A Fast Unsupervised Approach for Multi-Modality Surgical Trajectory Segmentation.
IEEE Access, 2018

An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Executable Micro-Architecture Modeling and Automatic Verification of EtherCAT.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Dynamic Taint Analysis Tool for Android App Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Inverse Kinematics of 6-DOF Robot Manipulator via Analytic Solution with Conformal Geometric Algebra.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Formal Analysis and Verification of DDS in ROS2.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Domain Adaptation in Steganalysis for the Spatial Domain.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Unsupervised Trajectory Segmentation and Promoting of Multi-Modal Surgical Demonstrations.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Forensic Analysis of Android Steganography Apps.
Proceedings of the Advances in Digital Forensics XIV, 2018

Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

The Impact of Exposure Settings in Digital Image Forensics.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Formalization of Symplectic Geometry in HOL-Light.
Proceedings of the Formal Methods and Software Engineering, 2018

Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Runtime Verification of Robots Collision Avoidance Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Enhanced resilient sensor attack detection using fusion interval and measurement history.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The Cell Dependency Analysis on Learning SRAM Power-Up States.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Delegation of Computation with Verification Outsourcing: Curious Verifiers.
IEEE Trans. Parallel Distrib. Syst., 2017

vFlash: Virtualized Flash for Optimizing the I/O Performance in Mobile Devices.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

A Block-Level Log-Block Management Scheme for MLC NAND Flash Memory Storage Systems.
IEEE Trans. Computers, 2017

Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017

Virtual duplication and mapping prefetching for emerging storage primitives in NAND flash memory storage systems.
Microprocess. Microsystems, 2017

A workload-aware flash translation layer enhancing performance and lifespan of TLC/SLC dual-mode flash memory in embedded systems.
Microprocess. Microsystems, 2017

An energy-efficient encryption mechanism for NVM-based main memory in mobile systems.
J. Syst. Archit., 2017

A centroidal Voronoi tessellation based intelligent control algorithm for the self-assembly path planning of swarm robots.
Expert Syst. Appl., 2017

Transfer Learning With Neural Networks for Bearing Fault Diagnosis in Changing Working Conditions.
IEEE Access, 2017

Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017

Robust Principal Component Analysis via Symmetric Alternating Direction for Moving Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Formalization and analysis of jacobian matrix in screw theory and its application in kinematic singularity.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

A fast search algorithm based on image pyramid for robotic grasping.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

Formal Modeling and Automatic Code Synthesis for Robot System.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

The impact of discharge inversion effect on learning SRAM power-up statistics.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Image-Content-Aware I/O Optimization for Mobile Virtualization.
ACM Trans. Embedded Comput. Syst., 2016

Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements.
IEEE Trans. Dependable Secur. Comput., 2016

NVMRA: utilizing NVM to improve the random write operations for NAND-flash-based mobile devices.
Softw. Pract. Exp., 2016

A dynamics based two-stage path model for the docking navigation of a self-assembly modular robot (Sambot).
Robotica, 2016

函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus).
计算机科学, 2016

分数阶微积分定义的一致性在HOL4中的验证 (Formalization of Consistency of Fractional Calculus in HOL4).
计算机科学, 2016

基于xMAS模型的SpaceWire信誉逻辑的形式化验证 (xMAS-based Formal Verification of SpaceWire Credit Logic).
计算机科学, 2016

RT-ROS: A real-time ROS architecture on multi-core processors.
Future Gener. Comput. Syst., 2016

Energy-aware assignment and scheduling for hybrid main memory in embedded systems.
Comput., 2016

Chinese Word Similarity Computing Based on Combination Strategy.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

A Confidence Weighted Real-Time Depth Filter for 3D Reconstruction.
Proceedings of the Intelligent Information Processing VIII, 2016

Voice Pattern Hiding for VoIP Communications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Formal Modelling and Analysis of TCP for Nodes Communication with ROS.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Crytpo-Based Methods and Fingerprints.
Proceedings of the Digital Fingerprinting, 2016

Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016

Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

2015
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems.
IEEE Trans. Computers, 2015

Wearable Ego-Motion Tracking for Blind Navigation in Indoor Environments.
IEEE Trans Autom. Sci. Eng., 2015

Online Sensor Fault Detection Based on an Improved Strong Tracking Filter.
Sensors, 2015

连续傅里叶变换基础理论的高阶逻辑形式化 (Higher-order Logic Formalization of Basic Theory of Continuous Fourier Transform).
计算机科学, 2015

HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Distinct element counting in distributed dynamic data streams.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Graph-Based Investigation of Bitcoin Transactions.
Proceedings of the Advances in Digital Forensics XI, 2015

ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Embedded System Design with Reliability-Centric Optimization.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015

Unified non-volatile memory and NAND flash memory architecture in smartphones.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Loop Transforming for Reducing Data Alignment on Multi-Core SIMD Processors.
J. Signal Process. Syst., 2014

On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2014

Memory-Aware Task Scheduling with Communication Overhead Minimization for Streaming Applications on Bus-Based Multiprocessor System-on-Chips.
IEEE Trans. Parallel Distrib. Syst., 2014

A Non-Intrusive Method for Monitoring the Degradation of MOSFETs.
Sensors, 2014

Formalization of Function Matrix Theory in HOL.
J. Appl. Math., 2014

Query dependent multiview features fusion for effective medical image retrieval.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization.
Proceedings of the IEEE Non-Volatile Memory Systems and Applications Symposium, 2014

Localization of concurrency bugs using shared memory access pairs.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.
Proceedings of the Intelligent Information Processing VII, 2014

RGMP-ROS: A real-time ROS architecture of hybrid RTOS and GPOS on multi-core processor.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Timed automata based motion planning for a self-assembly robot system.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Geometry constrained sparse embedding for multi-dimensional transfer function design in direct volume rendering.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

A framework of model checking guided test vector generation for the 6DOF manipulator.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Formal verification of a collision-free algorithm of dual-arm robot in HOL4.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Delegation of Computation with Verification Outsourcing Using GENI Infrastructure.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

Verifiable Computation with Reduced Informational Costs and Computational Costs.
Proceedings of the Computer Security - ESORICS 2014, 2014

Identifying global hot items in distributed dynamic data streams.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distrib. Syst., 2013

Lightweight Location Verification Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Formalization of Linear Space Theory in the Higher-Order Logic Proving System.
J. Appl. Math., 2013

Component-Based Formal Modeling of PLC Systems.
J. Appl. Math., 2013

The Gauge Integral Theory in HOL4.
J. Appl. Math., 2013

The Supercapacitor Degradation State Diagnostic System Based on LabVIEW.
Int. J. Online Eng., 2013

FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

<i>BLog</i>: block-level <i>log</i>-block management for NAND flash memorystorage systems.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2013

Near-optimal approximate membership query over time-decaying windows.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cardinality change-based early detection of large-scale cyber-attacks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An introduction to the variable neighborhood and the related adaptive determination algorithm.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

A cross-layer routing protocol (CLRP) for cognitive radio network.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Formal Modelling of PLC Systems by BIP Components.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Model Checking for SpaceWire Link Interface Design Using Uppaal.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A lightweight argument system with efficient verifier.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A Space Reuse Strategy for Flash Translation Layers in SLC NAND Flash Memory Storage Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Spectrum decision for efficient routing in cognitive radio network.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Monitoring Traffic Activity Graphs with low-rank matrix approximation.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A fast sketch for aggregate queries over high-speed network traffic.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Evidence Collection in Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Pecan: A circuit-less P2P design for anonymity.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Approximate membership query over time-decaying windows for event stream processing.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

Detecting hidden communities in online auction networks.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Leakage-Aware Modulo Scheduling for Embedded VLIW Processors.
J. Comput. Sci. Technol., 2011

Design of Panoramic Mosaic Camera Based on FPGA Using Optimal Mosaic Algorithm.
JCP, 2011

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Kinship verification from facial images under uncontrolled conditions.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Efficient Spectrum Searching and Monitoring in Cognitive Radio Network.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

MNFTL: an efficient flash translation layer for MLC NAND flash memory storage systems.
Proceedings of the 48th Design Automation Conference, 2011

The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
A dynamic en-route filtering scheme for data reporting in wireless sensor networks.
IEEE/ACM Trans. Netw., 2010

Thousands of Voices for HMM-Based Speech Synthesis-Analysis and Application of TTS Systems Built on Various ASR Corpora.
IEEE Trans. Speech Audio Process., 2010

Gather/scatter hardware support for accelerating Fast Fourier Transform.
J. Syst. Archit., 2010

Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter.
Graph. Model., 2010

Monaural speech separation based on MAXVQ and CASA for robust speech recognition.
Comput. Speech Lang., 2010

Scattered Points Denoising of TC-Bezier Surface Fitting.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Speaker adaptation and the evaluation of speaker similarity in the EMIME speech-to-speech translation project.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

An unified and automatic approach of Mandarin HTS system.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

RNFTL: a reuse-aware NAND flash translation layer for flash memory.
Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, 2010

Lightweight Mutual Authentication and Ownership Transfer for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Secure online banking on untrusted computers.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The axial position sensing and signal processing in maglev artificial heart pump.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010


2009
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distrib. Syst., 2009

A distributed data streaming algorithm for network-wide traffic anomaly detection.
SIGMETRICS Perform. Evaluation Rev., 2009

A Statistical Indoor Localization Method for Supporting Location-based Access Control.
MONET, 2009

A Novel Architecture for Secure and Scalable Multicast over IP Network.
Proceedings of the Security and Privacy in Communication Networks, 2009

Research and Design of On-board Dynamic Reconfigurable Router.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Thousands of voices for HMM-based speech synthesis.
Proceedings of the INTERSPEECH 2009, 2009

Trigonometric polynomial uniform B-spline surface with shape parameter.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Detecting Fraud in Internet Auction Systems.
Proceedings of the Advances in Digital Forensics V, 2009

Lightweight Secure Search Protocols for Low-cost RFID Systems.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

An Effective Method for Combating Malicious Scripts Clickbots.
Proceedings of the Computer Security, 2009

Application in Market Basket Research Based on FP-Growth Algorithm.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2008

Research and Design of Digital Synthesizer Based on MATLAB.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

A Two-Stage Algorithm for Multi-Speaker Identification System.
Proceedings of the 6th International Symposium on Chinese Spoken Language Processing, 2008

Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Vehicle Multi-sensor Information Optimization Based on Federal Fusion Valuation.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Hardware Design and Implementation of Intelligent Teaching Aid Based on FDD Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Frequency Estimation over Sliding Windows.
Proceedings of the 24th International Conference on Data Engineering, 2008

Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Embedded Sensor of Forecast Conveyer Belt Breaks.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Novel Course System and Engineering Practice Design for Embed System Education.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications.
IJICS, 2007

Variance estimation over sliding windows.
Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2007

Wireless and Sensor Networks Security (WSNS) A Retrospection.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Location Verification Algorithms forWireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

TOPO: A Topology-aware Single Packet Attack Traceback Scheme.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Detection of stepping stone attack under delay and chaff perturbations.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Collusion Detection Using Multimedia Fingerprints.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs.
Comput. Commun., 2005

A robust group-based key management scheme for wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A dynamic en-route scheme for filtering false data injection in wireless sensor networks.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Customizing a Geographical Routing Protocol for Wireless Sensor Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A key pre-distribution scheme using deployment knowledge for wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.
Proceedings of the Advances in Digital Forensics, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004

Customizing GPSR for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Improving performance of text-independent speaker identification by utilizing contextual principal curves filtering.
Proceedings of the INTERSPEECH 2004, 2004

An efficient data dissemination method in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Dependable Handling of Uncertainty.
Reliab. Comput., 2003

A lightweight authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2003

2002
An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001


  Loading...