2025
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework.
IEEE Trans. Inf. Forensics Secur., 2025
MMD-ERE: Multi-Agent Multi-Sided Debate for Event Relation Extraction.
Proceedings of the 31st International Conference on Computational Linguistics, 2025
2024
When Noise Can Help: Anonymous Group Writing in RFID-Enabled Backscatter Networks.
IEEE Trans. Mob. Comput., December, 2024
Adaptive Impulsive Consensus of Nonlinear Multiagent Systems With Limited Bandwidth Under Uncertain Deception Attacks.
IEEE Trans. Syst. Man Cybern. Syst., August, 2024
A Robust Monocular and Binocular Visual Ranging Fusion Method Based on an Adaptive UKF.
Sensors, July, 2024
Research on Genetic Algorithm Optimization with Fusion Tabu Search Strategy and Its Application in Solving Three-Dimensional Packing Problems.
Symmetry, April, 2024
A Comprehensive Overview of CFN From a Commonsense Perspective.
Mach. Intell. Res., April, 2024
A comprehensive and reliable feature attribution method: Double-sided remove and reconstruct (DoRaR).
Neural Networks, 2024
rOOM: A Rust-Based Linux Out of Memory Kernel Component.
IEICE Trans. Inf. Syst., 2024
Sum-throughput maximization for UAV-aided energy-harvesting WBANs: Hovering altitude design, power control and time allocation.
Digit. Commun. Networks, 2024
OpenEP: Open-Ended Future Event Prediction.
CoRR, 2024
Design and Implementation of ARA Wireless Living Lab for Rural Broadband and Applications.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Wireless Spectrum in Rural Farmlands: Status, Challenges and Opportunities.
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Improving behavior based authentication against adversarial attack using XAI.
CoRR, 2024
Event GDR: Event-Centric Generative Document Retrieval.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps.
Proceedings of the Advances in Digital Forensics XX, 2024
Weakly Aligned Multi-spectral Pedestrian Detection via Cross-Modality Differential Enhancement and Multi-scale Spatial Alignment.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
KoLA: Carefully Benchmarking World Knowledge of Large Language Models.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Twelfth International Conference on Learning Representations, 2024
An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
Refinement Verification of OS Services based on a Verified Preemptive Microkernel.
Proceedings of the Fundamental Approaches to Software Engineering, 2024
SQLPass: A Semantic Effective Fuzzing Method for DBMS.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
TacoERE: Cluster-aware Compression for Event Relation Extraction.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
MAVEN-ARG: Completing the Puzzle of All-in-One Event Understanding Dataset with Event Argument Annotation.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
Knowledge-Aware Neuron Interpretation for Scene Classification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
MuLHiTA: A Novel Multiclass Classification Framework With Multibranch LSTM and Hierarchical Temporal Attention for Early Detection of Mental Stress.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Neural Networks Learn. Syst., December, 2023
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur., November, 2023
Formalization of the inverse kinematics of three-fingered dexterous hand.
J. Log. Algebraic Methods Program., June, 2023
A unified proof technique for verifying program correctness with big-step semantics.
J. Syst. Archit., March, 2023
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications.
IEEE Trans. Dependable Secur. Comput., 2023
On Account Association With Assistance From Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023
Prescribed Performance Bipartite Consensus Control for Stochastic Nonlinear Multiagent Systems Under Event-Triggered Strategy.
IEEE Trans. Cybern., 2023
Formalization of Robot Collision Detection Method based on Conformal Geometric Algebra.
CoRR, 2023
Real-Time Multispectral Pedestrian Detection with Weakly Aligned Cross-Modal Learning.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2023
ARA PAWR: Wireless Living Lab for Smart and Connected Rural Communities.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Forensic Analysis of Android Cryptocurrency Wallet Applications.
Proceedings of the Advances in Digital Forensics XIX, 2023
An Anti-Fuzzing Approach for Android Apps.
Proceedings of the Advances in Digital Forensics XIX, 2023
Knowledge Graph Construction for Healthcare Services in Traditional Chinese Medicine.
Proceedings of the Service Science - CCF 16th International Conference, 2023
6D Object Pose Estimation with Attention Aware Bi-gated Fusion.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Multi-granularity Contrastive Siamese Networks for Abstractive Text Summarization.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Parallelizable Simple Recurrent Units with Hierarchical Memory.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Region-based Flash Caching with Joint Latency and Lifetime Optimization in Hybrid SMR Storage Systems.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
AgBIS: A Blockchain-enabled Crop Insurance Platform Against Adverse Selection, Moral Hazard, and Insurance Frauds.
Proceedings of the IEEE International Conference on Blockchain, 2023
Formal Verification of Interrupt Isolation for the TrustZone-based TEE.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Trigger-Argument based Explanation for Event Detection.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
Development and Preliminary Operation of <sup>87</sup>Rb Continuously Running Atomic Fountain Clock at NTSC.
IEEE Trans. Instrum. Meas., 2022
LibDroid: Summarizing information flow of android native libraries via static analysis.
Digit. Investig., 2022
Design and Implementation of OOM Module based on Rust.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Wireless guard for trustworthy spectrum management.
Proceedings of the 16th ACM Workshop on Wireless Network Testbeds, 2022
Cross-Guided Feature Fusion with Intra-Modality Reweighting for Multi-Spectral Pedestrian Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
A Dominating Set-Based Sleep Scheduling in Energy Harvesting WBANs.
IEEE Trans. Veh. Technol., 2021
Towards Smartphone Operating System Identification.
IEEE Trans. Dependable Secur. Comput., 2021
EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network.
IEEE Trans. Comput. Soc. Syst., 2021
Tiler: An Autonomous Region-Based Scheme for SMR Storage.
IEEE Trans. Computers, 2021
Frame-based Neural Network for Machine Reading Comprehension.
Knowl. Based Syst., 2021
Frame-based Multi-level Semantics Representation for text matching.
Knowl. Based Syst., 2021
Frame Semantics guided network for Abstractive Sentence Summarization.
Knowl. Based Syst., 2021
Feature Extraction with Apparent to Semantic Channels for Object Detection.
J. Softw., 2021
Formalization of Euler-Lagrange Equation Set Based on Variational Calculus in HOL Light.
J. Autom. Reason., 2021
Modeling and Analysis of Data Flow-Oriented ROS2 Data Distribution Service.
Int. J. Softw. Informatics, 2021
LogExtractor: Extracting digital evidence from android log messages via string and taint analysis.
Digit. Investig., 2021
Forensic Analysis on Joker Family Android Malware.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021
Semi-Supervised Domain Adaption Classifier via Broad Learning System.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021
ARA: A Wireless Living Lab Vision for Smart and Connected Rural Communities.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the WiNTECH'21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, 2021
Fast and Unsupervised Non-Local Feature Learning for Direct Volume Rendering of 3D Medical Images.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021
Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism.
Proceedings of the ICC 2021, 2021
Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
Proceedings of the ICC 2021, 2021
RUDBA: Reusable User-Device Biometric Authentication Scheme for Multi-service Systems.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Integrating Semantic Scenario and Word Relations for Abstractive Sentence Summarization.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Frame Semantic-Enhanced Sentence Modeling for Sentence-level Extractive Text Summarization.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Application of Artificial Intelligence Technology in Social Training.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021
2020
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems.
J. Syst. Archit., 2020
Correction to: Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2020
Formalization of Camera Pose Estimation Algorithm based on Rodrigues Formula.
Formal Aspects Comput., 2020
Limited Angle Tomography for Transmission X-Ray Microscopy Using Deep Learning.
CoRR, 2020
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
Formal Verification of CAN Bus in Cyber Physical System.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Deep Visible and Thermal Image Fusion with Cross-Modality Feature Selection for Pedestrian Detection.
Proceedings of the Network and Parallel Computing, 2020
Score-based likelihood ratios for camera device identification.
Proceedings of the Media Watermarking, 2020
Formal verification of discrete event model.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Batch Normalization Masked Sparse Autoencoder for Robotic Grasping Detection.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020
Formalizing the Transaction Flow Process of Hyperledger Fabric.
Proceedings of the Formal Methods and Software Engineering, 2020
Formal Modeling and Verification of EDCA Based on Probabilistic Model Checking.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Incorporating Syntax and Frame Semantics in Neural Network for Machine Reading Comprehension.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
What Linguistic Information Does Reading Comprehension Require?
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020
Formal Verification of Atomicity Requirements for Smart Contracts.
Proceedings of the Programming Languages and Systems - 18th Asian Symposium, 2020
A Frame-based Sentence Representation for Machine Reading Comprehension.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
A Dynamic Neural Network Approach for Efficient Control of Manipulators.
IEEE Trans. Syst. Man Cybern. Syst., 2019
Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
ACM Trans. Cyber Phys. Syst., 2019
An Efficient LSM-Tree-Based SQLite-Like Database Engine for Mobile Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
Checkpointing-Aware Loop Tiling for Energy Harvesting Powered Nonvolatile Processors.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
DCR: Deterministic Crash Recovery for NAND Flash Storage Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
HiNextApp: A context-aware and adaptive framework for app prediction in mobile systems.
Sustain. Comput. Informatics Syst., 2019
A Formal Model-Based Design Method for Robotic Systems.
IEEE Syst. J., 2019
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
Secur. Commun. Networks, 2019
Formalization of functional variation in HOL Light.
J. Log. Algebraic Methods Program., 2019
Formalization of Geometric Algebra in HOL Light.
J. Autom. Reason., 2019
A Hybrid Framework for High-Performance Modeling of Three-Dimensional Pipe Networks.
ISPRS Int. J. Geo Inf., 2019
A High-performance Cross-platform Map Rendering Engine for Mobile Geographic Information System (GIS).
ISPRS Int. J. Geo Inf., 2019
Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions.
Int. J. Fuzzy Syst., 2019
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
CoRR, 2019
Bidirectional Potential Guided RRT* for Motion Planning.
IEEE Access, 2019
Deep Reinforcement Learning With Optimized Reward Functions for Robotic Trajectory Planning.
IEEE Access, 2019
Manifold Regularization Graph Structure Auto-Encoder to Detect Loop Closure for Visual SLAM.
IEEE Access, 2019
Wide-View Sidewalk Dataset Based Pedestrian Safety Application.
IEEE Access, 2019
Research on Degradation Modeling and Life Prediction Method of Lithium-Ion Battery in Dynamic Environment.
IEEE Access, 2019
A Virtual Sample Generation Method Based on Differential Evolution Algorithm for Overall Trend of Small Sample Data: Used for Lithium-ion Battery Capacity Degradation Data.
IEEE Access, 2019
MicroTEE: Designing TEE OS Based on the Microkernel Architecture.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A HOL Theory of the Differential for Matrix Functions.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019
Algorithm Mismatch in Spatial Steganalysis.
Proceedings of the Media Watermarking, 2019
StegoAppDB: a Steganography Apps Forensics Image Database.
Proceedings of the Media Watermarking, 2019
Model Checking for the Goal-Feedback-Result Pattern in ROS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Inverse Dynamics Modeling of Robotic Manipulator with Hierarchical Recurrent Network.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019
P-Minder: A CNN Based Sidewalk Segmentation Approach for Phubber Safety Applications.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Towards Verifying Ethereum Smart Contracts at Intermediate Language Level.
Proceedings of the Formal Methods and Software Engineering, 2019
HECTor: Homomorphic Encryption Enabled Onion Routing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Formal Modelling and Verification of Spinlocks at Instruction Level.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019
2018
Using Local Clocks to Reproduce Concurrency Bugs.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Software Eng., 2018
Safety-Assured Model-Driven Design of the Multifunction Vehicle Bus Controller.
IEEE Trans. Intell. Transp. Syst., 2018
From Offline Towards Real-Time Verification for Robot Systems.
IEEE Trans. Ind. Informatics, 2018
Naive Bayes Bearing Fault Diagnosis Based on Enhanced Independence of Data.
Sensors, 2018
Bayesian Test for Detecting False Data Injection in Wireless Relay Networks.
IEEE Commun. Lett., 2018
Sensor attack detection using history based pairwise inconsistency.
Future Gener. Comput. Syst., 2018
Formal analysis of the kinematic Jacobian in screw theory.
Formal Aspects Comput., 2018
Bearing Remaining Useful Life Prediction Based on Naive Bayes and Weibull Distributions.
Entropy, 2018
A Fast Unsupervised Approach for Multi-Modality Surgical Trajectory Segmentation.
IEEE Access, 2018
An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Executable Micro-Architecture Modeling and Automatic Verification of EtherCAT.
Proceedings of the 2018 IEEE SmartWorld, 2018
A Dynamic Taint Analysis Tool for Android App Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Inverse Kinematics of 6-DOF Robot Manipulator via Analytic Solution with Conformal Geometric Algebra.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018
Formal Analysis and Verification of DDS in ROS2.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018
Domain Adaptation in Steganalysis for the Spatial Domain.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Unsupervised Trajectory Segmentation and Promoting of Multi-Modal Surgical Demonstrations.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018
Forensic Analysis of Android Steganography Apps.
Proceedings of the Advances in Digital Forensics XIV, 2018
Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018
The Impact of Exposure Settings in Digital Image Forensics.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Formalization of Symplectic Geometry in HOL-Light.
Proceedings of the Formal Methods and Software Engineering, 2018
Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Runtime Verification of Robots Collision Avoidance Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Enhanced resilient sensor attack detection using fusion interval and measurement history.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018
EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
The Cell Dependency Analysis on Learning SRAM Power-Up States.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018
2017
Delegation of Computation with Verification Outsourcing: Curious Verifiers.
IEEE Trans. Parallel Distributed Syst., 2017
vFlash: Virtualized Flash for Optimizing the I/O Performance in Mobile Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
A Block-Level Log-Block Management Scheme for MLC NAND Flash Memory Storage Systems.
IEEE Trans. Computers, 2017
Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017
Virtual duplication and mapping prefetching for emerging storage primitives in NAND flash memory storage systems.
Microprocess. Microsystems, 2017
A workload-aware flash translation layer enhancing performance and lifespan of TLC/SLC dual-mode flash memory in embedded systems.
Microprocess. Microsystems, 2017
An energy-efficient encryption mechanism for NVM-based main memory in mobile systems.
J. Syst. Archit., 2017
A centroidal Voronoi tessellation based intelligent control algorithm for the self-assembly path planning of swarm robots.
Expert Syst. Appl., 2017
Transfer Learning With Neural Networks for Bearing Fault Diagnosis in Changing Working Conditions.
IEEE Access, 2017
Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017
Robust Principal Component Analysis via Symmetric Alternating Direction for Moving Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Formalization and analysis of jacobian matrix in screw theory and its application in kinematic singularity.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017
A fast search algorithm based on image pyramid for robotic grasping.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017
Formal Modeling and Automatic Code Synthesis for Robot System.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017
The impact of discharge inversion effect on learning SRAM power-up statistics.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
Image-Content-Aware I/O Optimization for Mobile Virtualization.
ACM Trans. Embed. Comput. Syst., 2016
Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements.
IEEE Trans. Dependable Secur. Comput., 2016
NVMRA: utilizing NVM to improve the random write operations for NAND-flash-based mobile devices.
Softw. Pract. Exp., 2016
A dynamics based two-stage path model for the docking navigation of a self-assembly modular robot (Sambot).
Robotica, 2016
函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus).
计算机科学, 2016
分数阶微积分定义的一致性在HOL4中的验证 (Formalization of Consistency of Fractional Calculus in HOL4).
计算机科学, 2016
基于xMAS模型的SpaceWire信誉逻辑的形式化验证 (xMAS-based Formal Verification of SpaceWire Credit Logic).
计算机科学, 2016
RT-ROS: A real-time ROS architecture on multi-core processors.
Future Gener. Comput. Syst., 2016
Energy-aware assignment and scheduling for hybrid main memory in embedded systems.
Computing, 2016
Chinese Word Similarity Computing Based on Combination Strategy.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016
Thermal-mechanical reliability analysis of connection structure between redistribution layer and TSV for MEMS packaging.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016
Fabrication and characterization of fine pitch TSV integration with self-aligned backside insulation layer opening.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016
A Confidence Weighted Real-Time Depth Filter for 3D Reconstruction.
Proceedings of the Intelligent Information Processing VIII, 2016
Voice Pattern Hiding for VoIP Communications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Formal Modelling and Analysis of TCP for Nodes Communication with ROS.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Crytpo-Based Methods and Fingerprints.
Proceedings of the Digital Fingerprinting, 2016
Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016
Proceedings of the Digital Fingerprinting, 2016
Proceedings of the Digital Fingerprinting, 2016
2015
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems.
IEEE Trans. Computers, 2015
Wearable Ego-Motion Tracking for Blind Navigation in Indoor Environments.
IEEE Trans Autom. Sci. Eng., 2015
Online Sensor Fault Detection Based on an Improved Strong Tracking Filter.
Sensors, 2015
连续傅里叶变换基础理论的高阶逻辑形式化 (Higher-order Logic Formalization of Basic Theory of Continuous Fourier Transform).
计算机科学, 2015
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
Distinct element counting in distributed dynamic data streams.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
A Graph-Based Investigation of Bitcoin Transactions.
Proceedings of the Advances in Digital Forensics XI, 2015
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Formal Modeling and Verification of the Safety Critical Fire-Fighting Control System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Embedded System Design with Reliability-Centric Optimization.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015
Unified non-volatile memory and NAND flash memory architecture in smartphones.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Loop Transforming for Reducing Data Alignment on Multi-Core SIMD Processors.
J. Signal Process. Syst., 2014
On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014
Memory-Aware Task Scheduling with Communication Overhead Minimization for Streaming Applications on Bus-Based Multiprocessor System-on-Chips.
IEEE Trans. Parallel Distributed Syst., 2014
A Non-Intrusive Method for Monitoring the Degradation of MOSFETs.
Sensors, 2014
Formalization of Function Matrix Theory in HOL.
J. Appl. Math., 2014
Query dependent multiview features fusion for effective medical image retrieval.
Proceedings of the Proceedings IEEE International Conference on Security, 2014
Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization.
Proceedings of the IEEE Non-Volatile Memory Systems and Applications Symposium, 2014
Localization of concurrency bugs using shared memory access pairs.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014
Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.
Proceedings of the Intelligent Information Processing VII, 2014
RGMP-ROS: A real-time ROS architecture of hybrid RTOS and GPOS on multi-core processor.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Timed automata based motion planning for a self-assembly robot system.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Geometry constrained sparse embedding for multi-dimensional transfer function design in direct volume rendering.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
A framework of model checking guided test vector generation for the 6DOF manipulator.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Formal verification of a collision-free algorithm of dual-arm robot in HOL4.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Delegation of Computation with Verification Outsourcing Using GENI Infrastructure.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014
Verifiable Computation with Reduced Informational Costs and Computational Costs.
Proceedings of the Computer Security - ESORICS 2014, 2014
Identifying global hot items in distributed dynamic data streams.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013
Lightweight Location Verification Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013
Formalization of Linear Space Theory in the Higher-Order Logic Proving System.
J. Appl. Math., 2013
Component-Based Formal Modeling of PLC Systems.
J. Appl. Math., 2013
The Gauge Integral Theory in HOL4.
J. Appl. Math., 2013
The Supercapacitor Degradation State Diagnostic System Based on LabVIEW.
Int. J. Online Eng., 2013
FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
<i>BLog</i>: block-level <i>log</i>-block management for NAND flash memorystorage systems.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2013
Near-optimal approximate membership query over time-decaying windows.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Cardinality change-based early detection of large-scale cyber-attacks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
An introduction to the variable neighborhood and the related adaptive determination algorithm.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013
A cross-layer routing protocol (CLRP) for cognitive radio network.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Formal Modelling of PLC Systems by BIP Components.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Model Checking for SpaceWire Link Interface Design Using Uppaal.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
A lightweight argument system with efficient verifier.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
A Space Reuse Strategy for Flash Translation Layers in SLC NAND Flash Memory Storage Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2012
Spectrum decision for efficient routing in cognitive radio network.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Monitoring Traffic Activity Graphs with low-rank matrix approximation.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
A fast sketch for aggregate queries over high-speed network traffic.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Evidence Collection in Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012
Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Pecan: A circuit-less P2P design for anonymity.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Approximate membership query over time-decaying windows for event stream processing.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012
Detecting hidden communities in online auction networks.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012
2011
Leakage-Aware Modulo Scheduling for Embedded VLIW Processors.
J. Comput. Sci. Technol., 2011
Design of Panoramic Mosaic Camera Based on FPGA Using Optimal Mosaic Algorithm.
J. Comput., 2011
Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Kinship verification from facial images under uncontrolled conditions.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
Efficient Spectrum Searching and Monitoring in Cognitive Radio Network.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
MNFTL: an efficient flash translation layer for MLC NAND flash memory storage systems.
Proceedings of the 48th Design Automation Conference, 2011
The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2010
A dynamic en-route filtering scheme for data reporting in wireless sensor networks.
IEEE/ACM Trans. Netw., 2010
Thousands of Voices for HMM-Based Speech Synthesis-Analysis and Application of TTS Systems Built on Various ASR Corpora.
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Speech Audio Process., 2010
Gather/scatter hardware support for accelerating Fast Fourier Transform.
J. Syst. Archit., 2010
Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter.
Graph. Model., 2010
Monaural speech separation based on MAXVQ and CASA for robust speech recognition.
Comput. Speech Lang., 2010
Scattered Points Denoising of TC-Bezier Surface Fitting.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010
Speaker adaptation and the evaluation of speaker similarity in the EMIME speech-to-speech translation project.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010
An unified and automatic approach of Mandarin HTS system.
Proceedings of the Seventh ISCA Tutorial and Research Workshop on Speech Synthesis, 2010
RNFTL: a reuse-aware NAND flash translation layer for flash memory.
Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, 2010
Lightweight Mutual Authentication and Ownership Transfer for RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Secure online banking on untrusted computers.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Multilingual TTS System of Nokia Entry for Blizzard 2010.
Proceedings of the Blizzard Challenge 2010, Kansai Science City, Japan, September 25, 2010, 2010
The axial position sensing and signal processing in maglev artificial heart pump.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010
Personalising Speech-To-Speech Translation in the EMIME Project.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the ACL 2010, 2010
2009
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2009
A distributed data streaming algorithm for network-wide traffic anomaly detection.
SIGMETRICS Perform. Evaluation Rev., 2009
A Statistical Indoor Localization Method for Supporting Location-based Access Control.
Mob. Networks Appl., 2009
A Novel Architecture for Secure and Scalable Multicast over IP Network.
Proceedings of the Security and Privacy in Communication Networks, 2009
Research and Design of On-board Dynamic Reconfigurable Router.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Thousands of voices for HMM-based speech synthesis.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 10th Annual Conference of the International Speech Communication Association, 2009
Trigonometric polynomial uniform B-spline surface with shape parameter.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Detecting Fraud in Internet Auction Systems.
Proceedings of the Advances in Digital Forensics V, 2009
Lightweight Secure Search Protocols for Low-cost RFID Systems.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
An Effective Method for Combating Malicious Scripts Clickbots.
Proceedings of the Computer Security, 2009
Application in Market Basket Research Based on FP-Growth Algorithm.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Analysis of Unsupervised and Noise-Robust Speaker-Adaptive HMM-Based Speech Synthesis Systems toward a Unified ASR and TTS Framework.
Proceedings of the Blizzard Challenge 2009, Edinburgh, Scotland, UK, September 4, 2009, 2009
2008
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2008
Research and Design of Digital Synthesizer Based on MATLAB.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
A Two-Stage Algorithm for Multi-Speaker Identification System.
Proceedings of the 6th International Symposium on Chinese Spoken Language Processing, 2008
Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Pre-Processing of X-Ray Medical Image Based on Improved Temporal Recursive Self-Adaptive Filter.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Vehicle Multi-sensor Information Optimization Based on Federal Fusion Valuation.
Proceedings of the Fourth International Conference on Natural Computation, 2008
Hardware Design and Implementation of Intelligent Teaching Aid Based on FDD Theory.
Proceedings of the Fourth International Conference on Natural Computation, 2008
Frequency Estimation over Sliding Windows.
Proceedings of the 24th International Conference on Data Engineering, 2008
Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Embedded Sensor of Forecast Conveyer Belt Breaks.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
A Novel Course System and Engineering Practice Design for Embed System Education.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications.
Int. J. Inf. Comput. Secur., 2007
Variance estimation over sliding windows.
Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2007
Wireless and Sensor Networks Security (WSNS) A Retrospection.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Location Verification Algorithms forWireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007
2006
Monaural Speech Separation Based on Computational Auditory Scene Analysis and Objective Quality Assessment of Speech.
IEEE Trans. Speech Audio Process., 2006
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006
TOPO: A Topology-aware Single Packet Attack Traceback Scheme.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Multi-Pitch Detection for Co-Channel Speech Utilizing Frequency Channel Piecewise Integration and Morphological Feedback Verification Tracking.
Proceedings of the 5th International Symposium on Chinese Spoken Language Processing, 2006
Detection of stepping stone attack under delay and chaff perturbations.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Collusion Detection Using Multimedia Fingerprints.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006
2005
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs.
Comput. Commun., 2005
A robust group-based key management scheme for wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Customizing a Geographical Routing Protocol for Wireless Sensor Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
A key pre-distribution scheme using deployment knowledge for wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.
Proceedings of the Advances in Digital Forensics, 2005
2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004
Customizing GPSR for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004
Improving performance of text-independent speaker identification by utilizing contextual principal curves filtering.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004
An efficient data dissemination method in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Dependable Handling of Uncertainty.
Reliab. Comput., 2003
A lightweight authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2003
2002
An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001