Xiaopeng Ji

Orcid: 0000-0003-3920-8362

According to our database1, Xiaopeng Ji authored at least 46 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An automatic method using MFCC features for sleep stage classification.
Brain Informatics, December, 2024

Robust Proximal Adversarial Reinforcement Learning Under Model Mismatch.
IEEE Robotics Autom. Lett., November, 2024

UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information.
IEEE Trans. Wirel. Commun., July, 2024

Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024

Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems.
Sensors, February, 2024

Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping.
Entropy, January, 2024

Enhancing Covert Communication in OOK Schemes by Phase Deflection.
IEEE Trans. Inf. Forensics Secur., 2024

MixSleepNet: A Multi-Type Convolution Combined Sleep Stage Classification Model.
Comput. Methods Programs Biomed., 2024

2023
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks.
Sensors, December, 2023

Strategic UAV-Assisted Game Model for Detection in Covert Communication.
IEEE Trans. Veh. Technol., June, 2023

2022
Robust Adaptive Ensemble Adversary Reinforcement Learning.
IEEE Robotics Autom. Lett., 2022

GSC Loss: A Gaussian Score Calibrating Loss for Deep Learning.
CoRR, 2022

Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks.
Concurr. Comput. Pract. Exp., 2022

Reconstructing Hand-Held Objects from Monocular Video.
Proceedings of the SIGGRAPH Asia 2022 Conference Papers, 2022

QuickPose: Real-time Multi-view Multi-person Pose Estimation in Crowded Scenes.
Proceedings of the SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference, Vancouver, BC, Canada, August 7, 2022

2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021

A Novel and Efficient Feature Extraction Method for Deep Learning Based Continuous Estimation.
IEEE Robotics Autom. Lett., 2021

Exploiting spatio-temporal representation for 3D human action recognition from depth map sequences.
Knowl. Based Syst., 2021

Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021

Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code.
Int. J. Digit. Crime Forensics, 2021

Differentially Private Linear Regression Analysis via Truncating Technique.
Proceedings of the Web Information Systems and Applications, 2021

2020
A survey on monocular 3D human pose estimation.
Virtual Real. Intell. Hardw., 2020

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

An end-to-end generative network for environmental sound-based covert communication.
Multim. Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
KSII Trans. Internet Inf. Syst., 2019

View Invariant Human Action Recognition Using 3D Geometric Features.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

A Novel Deep Hashing Method with Top Similarity for Image Retrieval.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Skeleton embedded motion body partition for human action recognition using depth sequences.
Signal Process., 2018

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Secur. Commun. Networks, 2018

A novel fault-tolerant control for battery-energy-storage system based on cascaded multilevel converter with battery/BMS failure.
Microelectron. Reliab., 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

CAS-YNU Multi-modal Cross-view Human Action Dataset.
Proceedings of the IEEE International Conference on Information and Automation, 2018

2017
The spatial Laplacian and temporal energy pyramid representation for human action recognition using depth sequences.
Knowl. Based Syst., 2017

Real-time action recognition by feature-level fusion of depth and inertial sensor.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

A Robust RGB-D Image-Based SLAM System.
Proceedings of the Computer Vision Systems - 11th International Conference, 2017

2016
Human contour extraction from RGBD camera for action recognition.
Proceedings of the IEEE International Conference on Information and Automation, 2016

Spatio-temporal cuboid pyramid for action recognition using depth motion sequences.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

Violation vehicle automated snap and road congestion detection.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Local mean spatio-temporal feature for depth image-based speed-up action recognition.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2008
Wire-Sizing for Interconnect Performance Optimization Considering High Inductance Effects.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission delays.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Output Feedback Satisfactory Fault-Tolerant Control of Uncertain Linear Discrete-Time Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2006
Effective vehicle detection technique for traffic surveillance systems.
J. Vis. Commun. Image Represent., 2006


  Loading...