Kefeng Fan

According to our database1, Kefeng Fan authored at least 46 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Research on application of knowledge graph in industrial control system security situation awareness and decision-making: A survey.
Neurocomputing, 2025

2024
FPWT: Filter pruning via wavelet transform for CNNs.
Neural Networks, 2024

2023
Filter pruning by quantifying feature similarity and entropy of feature maps.
Neurocomputing, August, 2023

Embedding Global Contrastive and Local Location in Self-Supervised Learning.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

Correction to: Federated learning: a deep learning model based on resnet18 dual path for lung nodule detection.
Multim. Tools Appl., May, 2023

Federated learning: a deep learning model based on resnet18 dual path for lung nodule detection.
Multim. Tools Appl., May, 2023

EACP: An effective automatic channel pruning for neural networks.
Neurocomputing, March, 2023

Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.
IEEE Trans. Dependable Secur. Comput., 2023

Teacher-Student Mutual Learning for efficient source-free unsupervised domain adaptation.
Knowl. Based Syst., 2023

2022
Discriminative distribution alignment for domain adaptive object detection.
Neurocomputing, 2022

Benchmark Research on Computing Performance of Domestic General-purpose Processors.
Proceedings of the 6th International Symposium on Computer Science and Intelligent Control, 2022

2021
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments.
Wirel. Pers. Commun., 2021

Domain compensatory adversarial networks for partial domain adaptation.
Multim. Tools Appl., 2021

No-reference stereoscopic image quality assessment based on global and local content characteristics.
Neurocomputing, 2021

2020
Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

A Cache Allocation Scheme in 5G-Enabled Inhomogeneous ICVs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019

Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
TrustCF: A Hybrid Collaborative Filtering Recommendation Model with Trust Information.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A divide-and-conquer hole-filling method for handling disocclusion in single-view rendering.
Multim. Tools Appl., 2017

Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol.
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017

2016
A new usage control protocol for data protection of cloud environment.
EURASIP J. Inf. Secur., 2016

A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Sensational Headline Identification By Normalized Cross Entropy-Based Metric.
Comput. J., 2015

BJUT at TREC 2015 Temporal Summarization Track.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Non-negative Matrix Factorization.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Overview of cyber-security of industrial control system.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

A novel method on quality analysis of satellite navigation signal and efficient initial positioning.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
A Wireless MEMS Inertial Switch for Measuring Both Threshold Triggering Acceleration and Response Time.
IEEE Trans. Instrum. Meas., 2014

Novel Universal Multistable Mechanism Based on Magnetic-Mechanical-Inertial Coupling Effects.
IEEE Trans. Ind. Electron., 2014

BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014

2013
BJUT at TREC 2013 Microblog Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

BJUT at TREC 2013 Temporal Summarization Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

2012
Stereo Matching with Semi-limited Belief Propagation.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A System Architecture of Widget-Based Digital TV Interactive Platform.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A Testing Method for the Image Crosstalk of Stereoscopic Television.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
A risk assessment model for the operating system of the DTV.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

One pixel arrangement method on multi-view optical-plate stereo mobile phone.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

2009
Implementation and Evaluation of a Novel Audio Watermarking Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Trusted Computing Based Mobile DRM Authentication Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Content Protection Scheme for H.264-based Video Sequence.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Novel Digital Content Protection System Based on Iris Biometric.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...