Cheng Cao

Orcid: 0000-0003-0591-6803

According to our database1, Cheng Cao authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Knowledge-Aided Automated Synthesis for Broadband Power Amplifier With Transformer-Coupled Resonators.
IEEE Trans. Circuits Syst. I Regul. Pap., October, 2024

DBU-PG: energy-efficient noc design using dual-buffering power gating.
J. Supercomput., July, 2024

Time and Risk Optimal Path Planning for Surface Vehicle via Level Set in Dynamic Environment.
IEEE Trans. Ind. Informatics, June, 2024

Applying SMART-Based Power Gating Approach in NoC System.
J. Circuits Syst. Comput., 2024

MCPNET: Development of an interpretable deep learning model based on multiple conformations of the compound for predicting developmental toxicity.
Comput. Biol. Medicine, 2024

The Identification and Classification of Abnormal Collocations in Network Micro-language.
Proceedings of the International Conference on Asian Language Processing, 2024

Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
HTEC: Human Transcription Error Correction.
CoRR, 2023

Human Transcription Quality Improvement.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023


2022
A low-power amplitude shift keying modulator based on adaptive body-biased injection-locked current-reuse voltage controlled oscillator for high data rate radio frequency identification applications.
Int. J. Circuit Theory Appl., 2022

Low power ASK modulator based on direct injection-locked current reuse VCO in 130-nm CMOS technology for high data rate RFID applications.
Int. J. Circuit Theory Appl., 2022

CMOS X-band pole-converging triple-cascode LNA with low-noise and wideband performance.
IET Circuits Devices Syst., 2022

An Applied Research of Big Data in the Work of Higher Education Students: Taking the Analysis of Finding Loneliness and Their Characteristics as an Example.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
Credit Risk Evaluation of Quantum Communications Listed Companies in China Based on Fermatean Fuzzy TOPSIS.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

2020
Preconditioned gridless methods for solving three-dimensional Euler equations at low Mach numbers.
Int. J. Model. Simul. Sci. Comput., 2020

Risk Analysis of ERP in FY Coal-fired Power Enterprises.
Proceedings of the ICMSS 2020: 2020 4th International Conference on Management Engineering, 2020

2019
A multi-layered point reordering study of GPU-based meshless method for compressible flow simulations.
J. Comput. Sci., 2019

2018
A GPU-accelerated implicit meshless method for compressible flows.
J. Comput. Phys., 2018

Collaborative Alert Ranking for Anomaly Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

2017
Two-Level Community-Based Routing in Delay Tolerant Networks.
Wirel. Pers. Commun., 2017

Noninvasive Online Condition Monitoring of Output Capacitor's ESR and C for a Flyback Converter.
IEEE Trans. Instrum. Meas., 2017

ABE with improved auxiliary input for big data security.
J. Comput. Syst. Sci., 2017

A Bridged Contactless Measurement Technique for LC Tank Based Voltage-Controlled Oscillator.
J. Electron. Test., 2017

What Are You Known For?: Learning User Topical Profiles with Implicit and Explicit Footprints.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Revealing and Detecting Malicious Retweeter Groups.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Morse Things: A Design Inquiry into the Gap Between Things and Us.
Proceedings of the 2017 Conference on Designing Interactive Systems, 2017

2015
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media.
Proceedings of the Advances in Information Retrieval, 2015

Detecting Spam URLs in Social Media via Behavioral Analysis.
Proceedings of the Advances in Information Retrieval, 2015

Organic or Organized?: Exploring URL Sharing Behavior.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Behavioral detection of spam URL sharing: Posting patterns versus click patterns.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2012
A physiologically motivated sparse, compact, and smooth (SCS) approach to EEG source localization.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2009
Research on Obstacle-Avoidance Control Algorithm of Lower Limbs Rehabilitation Robot Based on Fuzzy Control.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...