Shen Fu

Orcid: 0000-0002-3067-2196

According to our database1, Shen Fu authored at least 15 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A comprehensive and reliable feature attribution method: Double-sided remove and reconstruct (DoRaR).
Neural Networks, 2024

CKMImageNet: A Comprehensive Dataset to Enable Channel Knowledge Map Construction via Computer Vision.
CoRR, 2024

2023
Power Minimization for Double Cooperative-RIS-Assisted Uplink NOMA System.
IEEE Wirel. Commun. Lett., November, 2023

On STAR-RIS-Aided NOMA With Multi-Group Detection.
IEEE Wirel. Commun. Lett., November, 2023

2022
On Intelligent Reflecting Surface-Assisted NOMA Uplinks With Imperfect SIC.
IEEE Wirel. Commun. Lett., 2022

GSIC for Uplink NOMA With Multiple Intelligent Reflecting Surfaces.
IEEE Wirel. Commun. Lett., 2022

Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Experimental Study of Lifecycle Management Protocols for Batteryless Intermittent Communication.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

2020
Optimization of Lennard-Jones clusters by particle swarm optimization with quasi-physical strategy.
Swarm Evol. Comput., 2020

MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW.
Proceedings of the 19th IEEE International Conference on Trust, 2020

RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A Novel Software System Protection Scheme Based on Behavior and Context Monitoring.
Int. J. Syst. Softw. Secur. Prot., 2019

Continuous User Authentication Based on Context-Emphasized Behavior Profiling.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm.
Multim. Tools Appl., 2018

2017
A Constraint Partitioning Method Based on Minimax Strategy for Constrained Multiobjective Optimization Problems.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017


  Loading...