default search action
Mengting Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Zhongnian Li, Mengting Xu, Xinzheng Xu, Daoqiang Zhang:
Complementary Labels Learning with Augmented Classes. Knowl. Based Syst. 290: 111570 (2024) - [j8]Chau-Wai Wong, Chang-Hong Fu, Mengting Xu, Guan-Ming Su:
Analysis of Coding Gain Due to In-Loop Reshaping. IEEE Trans. Image Process. 33: 3765-3777 (2024) - [j7]Mengting Xu, Tao Zhang, Zhongnian Li, Daoqiang Zhang:
InfoAT: Improving Adversarial Training Using the Information Bottleneck Principle. IEEE Trans. Neural Networks Learn. Syst. 35(1): 1255-1264 (2024) - 2023
- [j6]Hui Li, Mengting Xu, Sourav S. Bhowmick, Shafiq Rayhan Joty, Changsheng Sun, Jiangtao Cui:
PIANO: Influence Maximization Meets Deep Reinforcement Learning. IEEE Trans. Comput. Soc. Syst. 10(3): 1288-1300 (2023) - [i9]Hui Li, Susu Yang, Mengting Xu, Sourav S. Bhowmick, Jiangtao Cui:
Influence Maximization in Social Networks: A Survey. CoRR abs/2309.04668 (2023) - [i8]Chau-Wai Wong, Chang-Hong Fu, Mengting Xu, Guan-Ming Su:
Analysis of Coding Gain Due to In-Loop Reshaping. CoRR abs/2312.04022 (2023) - 2022
- [j5]Yu He, Guangjie Han, Mengting Xu, Miguel Martínez-García:
A Pseudopacket Scheduling Algorithm for Protecting Source Location Privacy in the Internet of Things. IEEE Internet Things J. 9(12): 9999-10009 (2022) - [j4]Mengting Xu, Tao Zhang, Daoqiang Zhang:
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial Attack. IEEE Trans. Medical Imaging 41(8): 2130-2143 (2022) - [c9]Ao Shen, Liang Sun, Mengting Xu, Daoqiang Zhang:
Region-Based Dense Adversarial Generation for Medical Image Segmentation. CICAI (3) 2022: 107-118 - [c8]Mengting Xu, Mengyin Wang, Yanjun Wang, Daniel Delahaye:
Robust estimation of airport declared capacity. ITSC 2022: 3807-3812 - [i7]Mengting Xu, Tao Zhang, Zhongnian Li, Daoqiang Zhang:
Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses. CoRR abs/2201.12527 (2022) - [i6]Mengting Xu, Tao Zhang, Zhongnian Li, Daoqiang Zhang:
InfoAT: Improving Adversarial Training Using the Information Bottleneck Principle. CoRR abs/2206.12292 (2022) - [i5]Zhongnian Li, Jian Zhang, Mengting Xu, Xinzheng Xu, Daoqiang Zhang:
Complementary Labels Learning with Augmented Classes. CoRR abs/2211.10701 (2022) - 2021
- [j3]Mengting Xu, Tao Zhang, Zhongnian Li, Mingxia Liu, Daoqiang Zhang:
Towards evaluating the robustness of deep diagnostic models by adversarial attack. Medical Image Anal. 69: 101977 (2021) - [j2]Chang-Hong Fu, Yui-Lam Chan, Hongbin Zhang, Sik-Ho Tsang, Mengting Xu:
Efficient Depth Intra Frame Coding in 3D-HEVC by Corner Points. IEEE Trans. Image Process. 30: 1608-1622 (2021) - [c7]Mengting Xu, Tao Zhang, Zhongnian Li, Daoqiang Zhang:
A Consistency Regularization for Certified Robust Neural Networks. CICAI (2) 2021: 27-38 - [i4]Mengting Xu, Tao Zhang, Zhongnian Li, Mingxia Liu, Daoqiang Zhang:
Towards Evaluating the Robustness of Deep Diagnostic Models by Adversarial Attack. CoRR abs/2103.03438 (2021) - [i3]Mengting Xu, Tao Zhang, Daoqiang Zhang:
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial Attack. CoRR abs/2111.14564 (2021) - 2020
- [i2]Mengting Xu, Tao Zhang, Zhongnian Li, Wei Shao, Daoqiang Zhang:
Improving the Certified Robustness of Neural Networks via Consistency Regularization. CoRR abs/2012.13103 (2020)
2010 – 2019
- 2019
- [j1]Guangjie Han, Mengting Xu, Yu He, Jinfang Jiang, James Adu Ansere, Wenbo Zhang:
A dynamic ring-based routing scheme for source location privacy in wireless sensor networks. Inf. Sci. 504: 308-323 (2019) - [c6]Mengting Xu, Yanrong Cao, Guozi Sun, Huakang Li:
CRQA: Credibility Retrieval for Medical Question Answer Service. RCAR 2019: 347-350 - [c5]Yongchao Wang, Mengting Xu, Lei Wang, Huakang Li, Guozi Sun:
JEDoDF: Judicial Event Discrimination Based on Deep Forest. SKG 2019: 36-43 - [i1]Hui Li, Mengting Xu, Sourav S. Bhowmick, Changsheng Sun, Zhongyuan Jiang, Jiangtao Cui:
DISCO: Influence Maximization Meets Network Embedding and Deep Learning. CoRR abs/1906.07378 (2019) - 2016
- [c4]Mengting Xu, Min Guo, Lin Shang, Xiuyi Jia:
Multi-value image segmentation based on FCM algorithm and Graph Cut Theory. FUZZ-IEEE 2016: 1333-1340 - [c3]Ping Li, Mengting Xu, Jianyang Wu, Lin Shang:
Using Canonical Correlation Analysis for Parallelized Attribute Reduction. PRICAI 2016: 433-445 - [c2]Junxin Tan, Mengting Xu, Lin Shang, Xiuyi Jia:
Sentiment Analysis for Images on Microblogging by Integrating Textual Information with Multiple Kernel Learning. PRICAI 2016: 496-506 - 2015
- [c1]Weibin Zhao, Mengting Xu, Xiuyi Jia, Lin Shang:
A Classification Method for Imbalanced Data Based on SMOTE and Fuzzy Rough Nearest Neighbor Algorithm. RSFDGrC 2015: 340-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-30 20:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint