Yong Guan

Orcid: 0000-0002-9044-2595

According to our database1, Yong Guan authored at least 293 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comprehensive Overview of CFN From a Commonsense Perspective.
Mach. Intell. Res., April, 2024

rOOM: A Rust-Based Linux Out of Memory Kernel Component.
IEICE Trans. Inf. Syst., 2024

Improving behavior based authentication against adversarial attack using XAI.
CoRR, 2024

Refinement Verification of OS Services based on a Verified Preemptive Microkernel.
Proceedings of the Fundamental Approaches to Software Engineering, 2024

Knowledge-Aware Neuron Interpretation for Scene Classification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
MuLHiTA: A Novel Multiclass Classification Framework With Multibranch LSTM and Hierarchical Temporal Attention for Early Detection of Mental Stress.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur., November, 2023

Formalization of the inverse kinematics of three-fingered dexterous hand.
J. Log. Algebraic Methods Program., June, 2023

A unified proof technique for verifying program correctness with big-step semantics.
J. Syst. Archit., March, 2023

ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications.
IEEE Trans. Dependable Secur. Comput., 2023

On Account Association With Assistance From Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Prescribed Performance Bipartite Consensus Control for Stochastic Nonlinear Multiagent Systems Under Event-Triggered Strategy.
IEEE Trans. Cybern., 2023

Formalization of Robot Collision Detection Method based on Conformal Geometric Algebra.
CoRR, 2023

MAVEN-Arg: Completing the Puzzle of All-in-One Event Understanding Dataset with Event Argument Annotation.
CoRR, 2023

A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR).
CoRR, 2023

KoLA: Carefully Benchmarking World Knowledge of Large Language Models.
CoRR, 2023

Real-Time Multispectral Pedestrian Detection with Weakly Aligned Cross-Modal Learning.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2023

ARA PAWR: Wireless Living Lab for Smart and Connected Rural Communities.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Forensic Analysis of Android Cryptocurrency Wallet Applications.
Proceedings of the Advances in Digital Forensics XIX, 2023

An Anti-Fuzzing Approach for Android Apps.
Proceedings of the Advances in Digital Forensics XIX, 2023

6D Object Pose Estimation with Attention Aware Bi-gated Fusion.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Multi-granularity Contrastive Siamese Networks for Abstractive Text Summarization.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Parallelizable Simple Recurrent Units with Hierarchical Memory.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Region-based Flash Caching with Joint Latency and Lifetime Optimization in Hybrid SMR Storage Systems.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

AgBIS: A Blockchain-enabled Crop Insurance Platform Against Adverse Selection, Moral Hazard, and Insurance Frauds.
Proceedings of the IEEE International Conference on Blockchain, 2023

Formal Verification of Interrupt Isolation for the TrustZone-based TEE.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Trigger-Argument based Explanation for Event Detection.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Development and Preliminary Operation of <sup>87</sup>Rb Continuously Running Atomic Fountain Clock at NTSC.
IEEE Trans. Instrum. Meas., 2022

LibDroid: Summarizing information flow of android native libraries via static analysis.
Digit. Investig., 2022

Design and Implementation of OOM Module based on Rust.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Wireless guard for trustworthy spectrum management.
Proceedings of the 16th ACM Workshop on Wireless Network Testbeds, 2022

Cross-Guided Feature Fusion with Intra-Modality Reweighting for Multi-Spectral Pedestrian Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Dominating Set-Based Sleep Scheduling in Energy Harvesting WBANs.
IEEE Trans. Veh. Technol., 2021

Towards Smartphone Operating System Identification.
IEEE Trans. Dependable Secur. Comput., 2021

EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network.
IEEE Trans. Comput. Soc. Syst., 2021

Tiler: An Autonomous Region-Based Scheme for SMR Storage.
IEEE Trans. Computers, 2021

Frame-based Neural Network for Machine Reading Comprehension.
Knowl. Based Syst., 2021

Frame-based Multi-level Semantics Representation for text matching.
Knowl. Based Syst., 2021

Frame Semantics guided network for Abstractive Sentence Summarization.
Knowl. Based Syst., 2021

Feature Extraction with Apparent to Semantic Channels for Object Detection.
J. Softw., 2021

Formalization of Euler-Lagrange Equation Set Based on Variational Calculus in HOL Light.
J. Autom. Reason., 2021

Modeling and Analysis of Data Flow-Oriented ROS2 Data Distribution Service.
Int. J. Softw. Informatics, 2021

LogExtractor: Extracting digital evidence from android log messages via string and taint analysis.
Digit. Investig., 2021

Forensic Analysis on Joker Family Android Malware.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

Semi-Supervised Domain Adaption Classifier via Broad Learning System.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

ARA: A Wireless Living Lab Vision for Smart and Connected Rural Communities.
Proceedings of the WiNTECH'21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, 2021

Fast and Unsupervised Non-Local Feature Learning for Direct Volume Rendering of 3D Medical Images.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism.
Proceedings of the ICC 2021, 2021

Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
Proceedings of the ICC 2021, 2021

RUDBA: Reusable User-Device Biometric Authentication Scheme for Multi-service Systems.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

Integrating Semantic Scenario and Word Relations for Abstractive Sentence Summarization.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Frame Semantic-Enhanced Sentence Modeling for Sentence-level Extractive Text Summarization.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Application of Artificial Intelligence Technology in Social Training.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems.
J. Syst. Archit., 2020

Correction to: Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2020

Formalization of Camera Pose Estimation Algorithm based on Rodrigues Formula.
Formal Aspects Comput., 2020

Limited Angle Tomography for Transmission X-Ray Microscopy Using Deep Learning.
CoRR, 2020

MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

Formal Verification of CAN Bus in Cyber Physical System.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Deep Visible and Thermal Image Fusion with Cross-Modality Feature Selection for Pedestrian Detection.
Proceedings of the Network and Parallel Computing, 2020

Score-based likelihood ratios for camera device identification.
Proceedings of the Media Watermarking, 2020

Formal verification of discrete event model.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Batch Normalization Masked Sparse Autoencoder for Robotic Grasping Detection.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

Formalizing the Transaction Flow Process of Hyperledger Fabric.
Proceedings of the Formal Methods and Software Engineering, 2020

Formal Modeling and Verification of EDCA Based on Probabilistic Model Checking.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Incorporating Syntax and Frame Semantics in Neural Network for Machine Reading Comprehension.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

What Linguistic Information Does Reading Comprehension Require?
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020

Formal Verification of Atomicity Requirements for Smart Contracts.
Proceedings of the Programming Languages and Systems - 18th Asian Symposium, 2020

A Frame-based Sentence Representation for Machine Reading Comprehension.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
A Dynamic Neural Network Approach for Efficient Control of Manipulators.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
ACM Trans. Cyber Phys. Syst., 2019

An Efficient LSM-Tree-Based SQLite-Like Database Engine for Mobile Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

Checkpointing-Aware Loop Tiling for Energy Harvesting Powered Nonvolatile Processors.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

DCR: Deterministic Crash Recovery for NAND Flash Storage Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

HiNextApp: A context-aware and adaptive framework for app prediction in mobile systems.
Sustain. Comput. Informatics Syst., 2019

A Formal Model-Based Design Method for Robotic Systems.
IEEE Syst. J., 2019

SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
Secur. Commun. Networks, 2019

Formalization of functional variation in HOL Light.
J. Log. Algebraic Methods Program., 2019

Formalization of Geometric Algebra in HOL Light.
J. Autom. Reason., 2019

A Hybrid Framework for High-Performance Modeling of Three-Dimensional Pipe Networks.
ISPRS Int. J. Geo Inf., 2019

A High-performance Cross-platform Map Rendering Engine for Mobile Geographic Information System (GIS).
ISPRS Int. J. Geo Inf., 2019

Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
CoRR, 2019

Bidirectional Potential Guided RRT* for Motion Planning.
IEEE Access, 2019

Deep Reinforcement Learning With Optimized Reward Functions for Robotic Trajectory Planning.
IEEE Access, 2019

Manifold Regularization Graph Structure Auto-Encoder to Detect Loop Closure for Visual SLAM.
IEEE Access, 2019

Wide-View Sidewalk Dataset Based Pedestrian Safety Application.
IEEE Access, 2019

Research on Degradation Modeling and Life Prediction Method of Lithium-Ion Battery in Dynamic Environment.
IEEE Access, 2019

A Virtual Sample Generation Method Based on Differential Evolution Algorithm for Overall Trend of Small Sample Data: Used for Lithium-ion Battery Capacity Degradation Data.
IEEE Access, 2019

MicroTEE: Designing TEE OS Based on the Microkernel Architecture.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A HOL Theory of the Differential for Matrix Functions.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Algorithm Mismatch in Spatial Steganalysis.
Proceedings of the Media Watermarking, 2019

StegoAppDB: a Steganography Apps Forensics Image Database.
Proceedings of the Media Watermarking, 2019

Model Checking for the Goal-Feedback-Result Pattern in ROS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Inverse Dynamics Modeling of Robotic Manipulator with Hierarchical Recurrent Network.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

P-Minder: A CNN Based Sidewalk Segmentation Approach for Phubber Safety Applications.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Towards Verifying Ethereum Smart Contracts at Intermediate Language Level.
Proceedings of the Formal Methods and Software Engineering, 2019

HECTor: Homomorphic Encryption Enabled Onion Routing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Formal Modelling and Verification of Spinlocks at Instruction Level.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Using Local Clocks to Reproduce Concurrency Bugs.
IEEE Trans. Software Eng., 2018

Safety-Assured Model-Driven Design of the Multifunction Vehicle Bus Controller.
IEEE Trans. Intell. Transp. Syst., 2018

From Offline Towards Real-Time Verification for Robot Systems.
IEEE Trans. Ind. Informatics, 2018

Naive Bayes Bearing Fault Diagnosis Based on Enhanced Independence of Data.
Sensors, 2018

Bayesian Test for Detecting False Data Injection in Wireless Relay Networks.
IEEE Commun. Lett., 2018

Sensor attack detection using history based pairwise inconsistency.
Future Gener. Comput. Syst., 2018

Formal analysis of the kinematic Jacobian in screw theory.
Formal Aspects Comput., 2018

Bearing Remaining Useful Life Prediction Based on Naive Bayes and Weibull Distributions.
Entropy, 2018

A Fast Unsupervised Approach for Multi-Modality Surgical Trajectory Segmentation.
IEEE Access, 2018

An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Executable Micro-Architecture Modeling and Automatic Verification of EtherCAT.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Dynamic Taint Analysis Tool for Android App Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Inverse Kinematics of 6-DOF Robot Manipulator via Analytic Solution with Conformal Geometric Algebra.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Formal Analysis and Verification of DDS in ROS2.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Domain Adaptation in Steganalysis for the Spatial Domain.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Unsupervised Trajectory Segmentation and Promoting of Multi-Modal Surgical Demonstrations.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Forensic Analysis of Android Steganography Apps.
Proceedings of the Advances in Digital Forensics XIV, 2018

Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

The Impact of Exposure Settings in Digital Image Forensics.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Formalization of Symplectic Geometry in HOL-Light.
Proceedings of the Formal Methods and Software Engineering, 2018

Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Runtime Verification of Robots Collision Avoidance Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Enhanced resilient sensor attack detection using fusion interval and measurement history.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The Cell Dependency Analysis on Learning SRAM Power-Up States.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Delegation of Computation with Verification Outsourcing: Curious Verifiers.
IEEE Trans. Parallel Distributed Syst., 2017

vFlash: Virtualized Flash for Optimizing the I/O Performance in Mobile Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

A Block-Level Log-Block Management Scheme for MLC NAND Flash Memory Storage Systems.
IEEE Trans. Computers, 2017

Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017

Virtual duplication and mapping prefetching for emerging storage primitives in NAND flash memory storage systems.
Microprocess. Microsystems, 2017

A workload-aware flash translation layer enhancing performance and lifespan of TLC/SLC dual-mode flash memory in embedded systems.
Microprocess. Microsystems, 2017

An energy-efficient encryption mechanism for NVM-based main memory in mobile systems.
J. Syst. Archit., 2017

A centroidal Voronoi tessellation based intelligent control algorithm for the self-assembly path planning of swarm robots.
Expert Syst. Appl., 2017

Transfer Learning With Neural Networks for Bearing Fault Diagnosis in Changing Working Conditions.
IEEE Access, 2017

Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017

Robust Principal Component Analysis via Symmetric Alternating Direction for Moving Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Formalization and analysis of jacobian matrix in screw theory and its application in kinematic singularity.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

A fast search algorithm based on image pyramid for robotic grasping.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

Formal Modeling and Automatic Code Synthesis for Robot System.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

The impact of discharge inversion effect on learning SRAM power-up statistics.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Image-Content-Aware I/O Optimization for Mobile Virtualization.
ACM Trans. Embed. Comput. Syst., 2016

Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements.
IEEE Trans. Dependable Secur. Comput., 2016

NVMRA: utilizing NVM to improve the random write operations for NAND-flash-based mobile devices.
Softw. Pract. Exp., 2016

A dynamics based two-stage path model for the docking navigation of a self-assembly modular robot (Sambot).
Robotica, 2016

函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus).
计算机科学, 2016

分数阶微积分定义的一致性在HOL4中的验证 (Formalization of Consistency of Fractional Calculus in HOL4).
计算机科学, 2016

基于xMAS模型的SpaceWire信誉逻辑的形式化验证 (xMAS-based Formal Verification of SpaceWire Credit Logic).
计算机科学, 2016

RT-ROS: A real-time ROS architecture on multi-core processors.
Future Gener. Comput. Syst., 2016

Energy-aware assignment and scheduling for hybrid main memory in embedded systems.
Computing, 2016

Chinese Word Similarity Computing Based on Combination Strategy.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

Thermal-mechanical reliability analysis of connection structure between redistribution layer and TSV for MEMS packaging.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

Fabrication and characterization of fine pitch TSV integration with self-aligned backside insulation layer opening.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

A Confidence Weighted Real-Time Depth Filter for 3D Reconstruction.
Proceedings of the Intelligent Information Processing VIII, 2016

Voice Pattern Hiding for VoIP Communications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Formal Modelling and Analysis of TCP for Nodes Communication with ROS.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Crytpo-Based Methods and Fingerprints.
Proceedings of the Digital Fingerprinting, 2016

Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016

Conclusion.
Proceedings of the Digital Fingerprinting, 2016

Introduction.
Proceedings of the Digital Fingerprinting, 2016

2015
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems.
IEEE Trans. Computers, 2015

Wearable Ego-Motion Tracking for Blind Navigation in Indoor Environments.
IEEE Trans Autom. Sci. Eng., 2015

Online Sensor Fault Detection Based on an Improved Strong Tracking Filter.
Sensors, 2015

连续傅里叶变换基础理论的高阶逻辑形式化 (Higher-order Logic Formalization of Basic Theory of Continuous Fourier Transform).
计算机科学, 2015

HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Distinct element counting in distributed dynamic data streams.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Graph-Based Investigation of Bitcoin Transactions.
Proceedings of the Advances in Digital Forensics XI, 2015

ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Embedded System Design with Reliability-Centric Optimization.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015

Unified non-volatile memory and NAND flash memory architecture in smartphones.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Loop Transforming for Reducing Data Alignment on Multi-Core SIMD Processors.
J. Signal Process. Syst., 2014

On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Memory-Aware Task Scheduling with Communication Overhead Minimization for Streaming Applications on Bus-Based Multiprocessor System-on-Chips.
IEEE Trans. Parallel Distributed Syst., 2014

A Non-Intrusive Method for Monitoring the Degradation of MOSFETs.
Sensors, 2014

Formalization of Function Matrix Theory in HOL.
J. Appl. Math., 2014

Query dependent multiview features fusion for effective medical image retrieval.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization.
Proceedings of the IEEE Non-Volatile Memory Systems and Applications Symposium, 2014

Localization of concurrency bugs using shared memory access pairs.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.
Proceedings of the Intelligent Information Processing VII, 2014

RGMP-ROS: A real-time ROS architecture of hybrid RTOS and GPOS on multi-core processor.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Timed automata based motion planning for a self-assembly robot system.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Geometry constrained sparse embedding for multi-dimensional transfer function design in direct volume rendering.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

A framework of model checking guided test vector generation for the 6DOF manipulator.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Formal verification of a collision-free algorithm of dual-arm robot in HOL4.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Delegation of Computation with Verification Outsourcing Using GENI Infrastructure.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

Verifiable Computation with Reduced Informational Costs and Computational Costs.
Proceedings of the Computer Security - ESORICS 2014, 2014

Identifying global hot items in distributed dynamic data streams.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013

Lightweight Location Verification Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Formalization of Linear Space Theory in the Higher-Order Logic Proving System.
J. Appl. Math., 2013

Component-Based Formal Modeling of PLC Systems.
J. Appl. Math., 2013

The Gauge Integral Theory in HOL4.
J. Appl. Math., 2013

The Supercapacitor Degradation State Diagnostic System Based on LabVIEW.
Int. J. Online Eng., 2013

FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

<i>BLog</i>: block-level <i>log</i>-block management for NAND flash memorystorage systems.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2013

Near-optimal approximate membership query over time-decaying windows.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cardinality change-based early detection of large-scale cyber-attacks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An introduction to the variable neighborhood and the related adaptive determination algorithm.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

A cross-layer routing protocol (CLRP) for cognitive radio network.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Formal Modelling of PLC Systems by BIP Components.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Model Checking for SpaceWire Link Interface Design Using Uppaal.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A lightweight argument system with efficient verifier.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A Space Reuse Strategy for Flash Translation Layers in SLC NAND Flash Memory Storage Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Spectrum decision for efficient routing in cognitive radio network.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Monitoring Traffic Activity Graphs with low-rank matrix approximation.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A fast sketch for aggregate queries over high-speed network traffic.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Evidence Collection in Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Pecan: A circuit-less P2P design for anonymity.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Approximate membership query over time-decaying windows for event stream processing.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

Detecting hidden communities in online auction networks.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Leakage-Aware Modulo Scheduling for Embedded VLIW Processors.
J. Comput. Sci. Technol., 2011

Design of Panoramic Mosaic Camera Based on FPGA Using Optimal Mosaic Algorithm.
J. Comput., 2011

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Kinship verification from facial images under uncontrolled conditions.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Efficient Spectrum Searching and Monitoring in Cognitive Radio Network.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

MNFTL: an efficient flash translation layer for MLC NAND flash memory storage systems.
Proceedings of the 48th Design Automation Conference, 2011

The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
A dynamic en-route filtering scheme for data reporting in wireless sensor networks.
IEEE/ACM Trans. Netw., 2010

Thousands of Voices for HMM-Based Speech Synthesis-Analysis and Application of TTS Systems Built on Various ASR Corpora.
IEEE Trans. Speech Audio Process., 2010

Gather/scatter hardware support for accelerating Fast Fourier Transform.
J. Syst. Archit., 2010

Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter.
Graph. Model., 2010

Monaural speech separation based on MAXVQ and CASA for robust speech recognition.
Comput. Speech Lang., 2010

Scattered Points Denoising of TC-Bezier Surface Fitting.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Speaker adaptation and the evaluation of speaker similarity in the EMIME speech-to-speech translation project.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

An unified and automatic approach of Mandarin HTS system.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010

RNFTL: a reuse-aware NAND flash translation layer for flash memory.
Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, 2010

Lightweight Mutual Authentication and Ownership Transfer for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Secure online banking on untrusted computers.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The axial position sensing and signal processing in maglev artificial heart pump.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010


2009
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2009

A distributed data streaming algorithm for network-wide traffic anomaly detection.
SIGMETRICS Perform. Evaluation Rev., 2009

A Statistical Indoor Localization Method for Supporting Location-based Access Control.
Mob. Networks Appl., 2009

A Novel Architecture for Secure and Scalable Multicast over IP Network.
Proceedings of the Security and Privacy in Communication Networks, 2009

Research and Design of On-board Dynamic Reconfigurable Router.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Thousands of voices for HMM-based speech synthesis.
Proceedings of the INTERSPEECH 2009, 2009

Trigonometric polynomial uniform B-spline surface with shape parameter.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Detecting Fraud in Internet Auction Systems.
Proceedings of the Advances in Digital Forensics V, 2009

Lightweight Secure Search Protocols for Low-cost RFID Systems.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

An Effective Method for Combating Malicious Scripts Clickbots.
Proceedings of the Computer Security, 2009

Application in Market Basket Research Based on FP-Growth Algorithm.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2008

Research and Design of Digital Synthesizer Based on MATLAB.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

A Two-Stage Algorithm for Multi-Speaker Identification System.
Proceedings of the 6th International Symposium on Chinese Spoken Language Processing, 2008

Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Vehicle Multi-sensor Information Optimization Based on Federal Fusion Valuation.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Hardware Design and Implementation of Intelligent Teaching Aid Based on FDD Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Frequency Estimation over Sliding Windows.
Proceedings of the 24th International Conference on Data Engineering, 2008

Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Embedded Sensor of Forecast Conveyer Belt Breaks.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Novel Course System and Engineering Practice Design for Embed System Education.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications.
Int. J. Inf. Comput. Secur., 2007

Variance estimation over sliding windows.
Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2007

Wireless and Sensor Networks Security (WSNS) A Retrospection.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Location Verification Algorithms forWireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

TOPO: A Topology-aware Single Packet Attack Traceback Scheme.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Detection of stepping stone attack under delay and chaff perturbations.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Collusion Detection Using Multimedia Fingerprints.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs.
Comput. Commun., 2005

A robust group-based key management scheme for wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A dynamic en-route scheme for filtering false data injection in wireless sensor networks.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Customizing a Geographical Routing Protocol for Wireless Sensor Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A key pre-distribution scheme using deployment knowledge for wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.
Proceedings of the Advances in Digital Forensics, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004

Customizing GPSR for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Improving performance of text-independent speaker identification by utilizing contextual principal curves filtering.
Proceedings of the INTERSPEECH 2004, 2004

An efficient data dissemination method in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Dependable Handling of Uncertainty.
Reliab. Comput., 2003

A lightweight authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2003

2002
An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001


  Loading...