Publications

867 result(s)
Reducing Flow Completion Time with Replaceable Redundant Packets in Data Center Networks
Sen Liu, Jiawei Huang, Wenchao Jiang, Jianxin Wang, and Tian He, 2019, Proceedings of the 2019 IEEE International Conference on Distributed Computing Systems (ICDCS’19)
RetroFlow: maintaining control resiliency and flow programmability for software-defined WANs
Zehua Guo, Wendi Feng, Sen Liu, Wenchao Jiang, Yang Xu, and Zhi-li Zhang, 2019, Proceedings of the International Symposium on Quality of Service (IWQoS ’19)
Safe Path Planning with Gaussian Process Regulated Risk Map
H. Guo, , Z. Meng, Z. Huang, W. Leong, Z. Chen, M. Meghjani, M. H Ang Jr, D. Rus, 2019, IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
SCADAWall: A CPI-Enabled Firewall Model for SCADA Security
Dong Li, Huaqun Guo, Jianying Zhou, Luying Zhou, and Jun-Wen Wong, 2019, Computers & Security
ScaRR: Scalable Runtime Remote Attestation for Complex Systems
Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, and Mauro Conti, 2019, 2019 International Symposium on Research in Attacks, Intrusions and Defenses (RAID’19)
SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences
H Le, TT Do, T Hoang, NM Cheung, 2019, Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR-19) (Oral), https://www.dropbox.com/s/11safpflogyoi84/Huu-cvpr_2019.pdf?dl=0
Secret Group-Key Generation at Physical Layer for Multi- Antenna Mesh Topology
T. Chan, J. Lee, J. Prakash, and T. Q. S. Quek, 2019, IEEE Trans. Information Forensics, and Security, vol. 14, no. 1, 18–33
Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning
TT Do, K Le, T Hoang, H Le, TV Nguyen, NM Cheung, 2019, IEEE Transactions on Image Processing 2019
Skeleton-Based Online Action Prediction Using Scale Selection Network
Jun Liu, Amir Shahroudy, Gang Wang, Ling-Yu Duan, Alex C. Kot, 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)
SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications
Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou, 2019, 2019 IFIP International Information Security and Privacy Conference (SEC’19)