Kefeng Fan
According to our database1,
Kefeng Fan
authored at least 46 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Research on application of knowledge graph in industrial control system security situation awareness and decision-making: A survey.
Neurocomputing, 2025
2024
2023
Neurocomputing, August, 2023
IEEE Trans. Circuits Syst. Video Technol., May, 2023
Correction to: Federated learning: a deep learning model based on resnet18 dual path for lung nodule detection.
Multim. Tools Appl., May, 2023
Federated learning: a deep learning model based on resnet18 dual path for lung nodule detection.
Multim. Tools Appl., May, 2023
Neurocomputing, March, 2023
Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.
IEEE Trans. Dependable Secur. Comput., 2023
Teacher-Student Mutual Learning for efficient source-free unsupervised domain adaptation.
Knowl. Based Syst., 2023
2022
Neurocomputing, 2022
Proceedings of the 6th International Symposium on Computer Science and Intelligent Control, 2022
2021
Wirel. Pers. Commun., 2021
Multim. Tools Appl., 2021
No-reference stereoscopic image quality assessment based on global and local content characteristics.
Neurocomputing, 2021
2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
2018
TrustCF: A Hybrid Collaborative Filtering Recommendation Model with Trust Information.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
A divide-and-conquer hole-filling method for handling disocclusion in single-view rendering.
Multim. Tools Appl., 2017
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017
2016
EURASIP J. Inf. Secur., 2016
A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network.
Proceedings of the International Conference on Networking and Network Applications, 2016
2015
Comput. J., 2015
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015
BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Non-negative Matrix Factorization.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
A novel method on quality analysis of satellite navigation signal and efficient initial positioning.
Proceedings of the 23rd International Conference on Geoinformatics, 2015
2014
A Wireless MEMS Inertial Switch for Measuring Both Threshold Triggering Acceleration and Response Time.
IEEE Trans. Instrum. Meas., 2014
Novel Universal Multistable Mechanism Based on Magnetic-Mechanical-Inertial Coupling Effects.
IEEE Trans. Ind. Electron., 2014
BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014
2013
Proceedings of The Twenty-Second Text REtrieval Conference, 2013
Proceedings of The Twenty-Second Text REtrieval Conference, 2013
2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006