Xiaoyu Zhou

Orcid: 0009-0003-8504-4618

According to our database1, Xiaoyu Zhou authored at least 78 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Defense Embedded Waveform Design for Reliable Communication in the Physical Layer.
IEEE Internet Things J., May, 2024

GAN-Based Siamese Neuron Network for Modulation Classification Against White-Box Adversarial Attacks.
IEEE Trans. Cogn. Commun. Netw., February, 2024

A high sensitivity biosensor based on fin-type electron-hole bilayer TFET.
Microelectron. J., 2024

An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing.
J. Inf. Secur. Appl., 2024

Flexible ground constrained LiDAR SLAM with a novel plane detection.
Comput. Electr. Eng., 2024

GALA3D: Towards Text-to-3D Complex Scene Generation via Layout-guided Generative Gaussian Splatting.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

DrivingGaussian: Composite Gaussian Splatting for Surrounding Dynamic Autonomous Driving Scenes.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
OFDM sensing based on deep learning.
Phys. Commun., December, 2023

An unsolvable pixel reduced authentication method for color images with grayscale invariance.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Collaborative and Incremental Learning for Modulation Classification With Heterogeneous Local Dataset in Cognitive IoT.
IEEE Trans. Green Commun. Netw., June, 2023

Toward Next-Generation Signal Intelligence: A Hybrid Knowledge and Data-Driven Deep Learning Framework for Radio Signal Classification.
IEEE Trans. Cogn. Commun. Netw., June, 2023

Data Augmentation of SSVEPs Using Source Aliasing Matrix Estimation for Brain-Computer Interfaces.
IEEE Trans. Biomed. Eng., June, 2023

Replenishment Policy with Limited Price Information.
Asia Pac. J. Oper. Res., June, 2023

An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique.
Multim. Tools Appl., April, 2023

Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques.
J. Inf. Secur. Appl., March, 2023

FedBKD: Heterogenous Federated Learning via Bidirectional Knowledge Distillation for Modulation Classification in IoT-Edge System.
IEEE J. Sel. Top. Signal Process., January, 2023

AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
IEEE Trans. Inf. Forensics Secur., 2023

Magnetic Coupling Resonant-Based Air-Isolated Module for High Voltage Pulse Generators.
IEEE Trans. Ind. Electron., 2023

Analysis of Electromagnetic Radiation of Mobile Base Stations Co-located with High-Voltage Transmission Towers.
Symmetry, 2023

Modeling and modal analysis of the structure of long-span transmission tower.
J. Comput. Methods Sci. Eng., 2023

PET Tracer Conversion among Brain PET via Variable Augmented Invertible Network.
CoRR, 2023

A Data Hiding Scheme for JPEG Images Based on EMD with Coefficient Selection Strategy.
Proceedings of the 2023 8th International Conference on Multimedia Systems and Signal Processing, 2023

Can A Gaming Experience Like This Continue the Enthusiasmor Online Participation in Environmental Conservation Projects for Good?
Proceedings of the 2023 9th International Conference on Industrial and Business Engineering, 2023

Research on Innovation Drive and High-Quality Development of Henan Province Based on Coupling Coordination Model.
Proceedings of the 14th International Conference on E-business, Management and Economics, 2023

SAMPLING: Scene-adaptive Hierarchical Multiplane Images Representation for Novel View Synthesis from a Single Image.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Prior-weighted support matrix machine for mine gearbox fault diagnosis under mislabeled data.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
Mutant Reduction Evaluation: What is There and What is Missing?
ACM Trans. Softw. Eng. Methodol., 2022

Detection of Direct Sequence Spread Spectrum Signals Based on Deep Learning.
IEEE Trans. Cogn. Commun. Netw., 2022

Electromagnetic Spectrum Allocation Method for Multi-Service Irregular Frequency-Using Devices in the Space-Air-Ground Integrated Network.
Sensors, 2022

Frequency Offset Estimation Algorithm of High-Order M-APSK Modulation Signal Based on DFT.
Mob. Networks Appl., 2022

Structural Synthesis of PLC Program for Real-Time Specification Patterns.
Int. J. Found. Comput. Sci., 2022

MAVT-FG: Multimodal Audio-Visual Transformer for Weakly-supervised Fine-Grained Recognition.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Characterizing urban expansion pattern to understand urban form dynamics based on Google Earth Engine platform.
Proceedings of the 29th International Conference on Geoinformatics, 2022

Deep Neural Network Based on Convolution Factor Decomposition for Wireless Signal Modulation Recognition.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Interspaces Between Nature and the City.
Proceedings of the Tenth International Symposium of Chinese CHI, 2022

2021
Automatic Modulation Classification Based on Deep Residual Networks With Multimodal Information.
IEEE Trans. Cogn. Commun. Netw., 2021

SVG-Loop: Semantic-Visual-Geometric Information-Based Loop Closure Detection.
Remote. Sens., 2021

Structure aware 3D single object tracking of point cloud.
J. Electronic Imaging, 2021

Mutant reduction evaluation: what is there and what is missing?
CoRR, 2021

An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match.
IEEE Access, 2021

Capability Analysis Method for Electromagnetic Spectrum.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Implementation Method and Accuracy Analysis of Variable Baseline Binocular Camera Based on Multiple Micro-satellites.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

Search-based Kinodynamic Motion Planning for Omnidirectional Quadruped Robots.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2021

2020
An efficient reversible authentication scheme for demosaiced images with improved detectability.
Signal Process. Image Commun., 2020

Reversible and recoverable authentication method for demosaiced images using adaptive coding technique.
J. Inf. Secur. Appl., 2020

A Resource-saving Method for Implementation of High-Performance Time-to-Digital Converters in FPGA.
Proceedings of the 2020 IEEE International Instrumentation and Measurement Technology Conference, 2020

2019
On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism.
Int. J. Netw. Secur., 2019

Pulse strategy for suppressing spreading on networks.
CoRR, 2019

NeLSTM: A New Model for Temporal Link Prediction in Social Networks.
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019

An FPGA-based Time Sampling Charge Measurement Method for TOF-PET Detectors.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

Effects of stimulus position on the classification of miniature asymmetric VEPs for brain-computer interfaces.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

2018
Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images.
Symmetry, 2018

Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images.
Symmetry, 2018

Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques.
Inf. Sci., 2018

Understanding metric-based detectable smells in Python software: A comparative study.
Inf. Softw. Technol., 2018

A Lightweight Approach to Detect Memory Leaks in JavaScript (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure.
Proceedings of the Data Science, 2018

Prototype design of a time-of-flight camera based on Xilinx Zynq7000 SoC platform.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
An Approximate BER Analysis for Ambient Backscatter Communication Systems With Tag Selection.
IEEE Access, 2017

Topic Model Based Text Similarity Measure for Chinese Judgment Document.
Proceedings of the Data Science, 2017

Build Evidence Chain Relational Model Based on Chinese Judgment Documents.
Proceedings of the Data Science, 2017

Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2017

Information Extraction from Chinese Judgment Documents.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

A Method of the Association Statistics between the Cause of Action and the Statutes.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A Specification-Based Approach to the Testing of Java Memory Bloat.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

2015
Link prediction in social networks: the state-of-the-art.
Sci. China Inf. Sci., 2015

Are Anti-patterns Coupled? An Empirical Study.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Revisiting Single Image Super-Resolution Under Internet Environment: Blur Kernels and Reconstruction Algorithms.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

2014
Source code size estimation approaches for object-oriented systems from UML class diagrams: A comparative study.
Inf. Softw. Technol., 2014

2012
A New Approach of Partial Order Reduction Technique for Parallel Timed Automata Model Checking.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Identification of Design Patterns Using Dependence Analysis.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Side-effect analysis with fast escape filter.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

An Overtime-Detection Model-Checking Technique for Interrupt Processing Systems.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Inferring weak references for fixing Java memory leaks.
Proceedings of the 28th IEEE International Conference on Software Maintenance, 2012

2010
Slicing Concurrent Programs Based on Program Reachability Graphs.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
A Constraint Based Bug Checking Approach for Python.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009


  Loading...