Xueyang Wang

Orcid: 0000-0002-9797-9491

According to our database1, Xueyang Wang authored at least 38 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Toward Grouping in Large Scenes With Occlusion-Aware Spatio-Temporal Transformers.
IEEE Trans. Circuits Syst. Video Technol., May, 2024

Identification and Positioning of Abnormal Maritime Targets Based on AIS and Remote-Sensing Image Fusion.
Sensors, April, 2024

The interaction design of 3D virtual humans: A survey.
Comput. Sci. Rev., 2024

Exploring Interactive Gestures with Voice Assistant on HMDs in Social Situations.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

The Synergy of Dialogue and Art: Exploring the Potential of Multimodal AI Chatbots in Emotional Support.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

2023
Repeatability of Inertial Measurement Units for Measuring Pelvic Mobility in Patients Undergoing Total Hip Arthroplasty.
Sensors, 2023

Towards Grouping in Large Scenes with Occlusion-aware Spatio-temporal Transformers.
CoRR, 2023

Examining the Fine Motor Control Ability of Linear Hand Movement in Virtual Reality.
Proceedings of the IEEE Conference Virtual Reality and 3D User Interfaces, 2023

Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Genomic Shift in Population Dynamics of <i>mcr</i>-<i>1</i>-positive <i>Escherichia coli</i> in Human Carriage.
Genom. Proteom. Bioinform., December, 2022

Joint Bayesian Channel Estimation and Data Detection for OTFS Systems in LEO Satellite Communications.
IEEE Trans. Commun., 2022

Towards real-time object detection in GigaPixel-level video.
Neurocomputing, 2022

HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research.
IEEE Des. Test, 2022

Adversarial examples generated from sample subspace.
Comput. Stand. Interfaces, 2022

Ship Fusion Recognition Based on AIS Data and Remote Sensing Image.
Proceedings of the 6th International Conference on Computer Science and Artificial Intelligence, 2022

2021
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021

Methodology of Assessing Information Leakage through Software-Accessible Telemetries.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
A Sensor-Based Screening Tool for Identifying High Pelvic Mobility in Patients Due to Undergo Total Hip Arthroplasty.
Sensors, 2020

PANDA: A Gigapixel-Level Human-Centric Video Dataset.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2018
Prism, a Game to Promote Autism Acceptance Among Elementary School Students.
Proceedings of the Serious Games - 4th Joint International Conference, 2018

Score-Aligned Polyphonic Microtiming Estimation.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory.
Comput. Phys. Commun., 2017

Angle Jungle: An Educational Game about Angles.
Proceedings of the Extended Abstracts Publication of the Annual Symposium on Computer-Human Interaction in Play, 2017

2016
Malicious Firmware Detection with Hardware Performance Counters.
IEEE Trans. Multi Scale Comput. Syst., 2016

Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2016

Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing.
ACM Trans. Archit. Code Optim., 2016

The Cybersecurity Landscape in Industrial Control Systems.
Proc. IEEE, 2016

SIGDROP: Signature-based ROP Detection using Hardware Performance Counters.
CoRR, 2016

BRAIN: BehavioR Based Adaptive Intrusion Detection in Networks: Using Hardware Performance Counters to Detect DDoS Attacks.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016

2015
MAGIC: Malicious Aging in Circuits/Cores.
ACM Trans. Archit. Code Optim., 2015

ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

2014
Detecting Kernel Control-Flow Modifying Rootkits.
Proceedings of the Network Science and Cybersecurity, 2014

Application of ant colony optimized routing algorithm based on evolving graph model in VANETs.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Weak GNSS signal acquisition based on wavelet de-noising through lifting scheme and heuristic threshold optimization.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Smartphone-based indoor position and orientation tracking fusing inertial and magnetic sensing.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

A Novel Routing Algorithm Design of Time Evolving Graph Based on Pairing Heap for MEO Satellite Network.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Indoor positioning system based on improved PDR and magnetic calibration using smartphone.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

2013
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013


  Loading...