default search action
Bing Bu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Bing Bu:
Evaluation on Numerical Method of Differential Formula Based on Optimal Control of Space Robot's Attitude and Motion. Informatica (Slovenia) 48(13) (2024) - 2023
- [c30]Liang Tao, Maoshen Jia, Bing Bu, Dingding Yao:
Single Source Zone Detection in the Spherical Harmonic Domain for Multisource Localization. APSIPA ASC 2023: 996-1001 - [c29]Xiaochen Zhang, Bing Bu, Junyi Zhao:
A Novel Routing Method Based on Train Status for The Wireless Ad Hoc Network of TACS. ITSC 2023: 2549-2554 - [c28]Yanqi Zhang, Bing Bu, Ying Fan:
An Optimized Method Based on Two-Layer PSO Algorithm for the Node Placement of the Wireless Ad Hoc Network in Train Autonomous Circumambulate System. ITSC 2023: 3010-3015 - [c27]Wanqi Tian, Bing Bu, Jidong Lv, Tao Tang, Kaicheng Li:
Trajectory Prediction of High-Speed Train Based on GMM-LSTM. ITSC 2023: 3539-3544 - [c26]Yi Shi, Bing Bu, Qichang Li:
An Optimized Resource Allocation Method Based on Deep Reinforcement Learning for the Ad Hoc Network of TACS. ITSC 2023: 5536-5541 - 2022
- [j14]Bing Bu:
Multi-task equilibrium scheduling of Internet of Things: A rough set genetic algorithm. Comput. Commun. 184: 42-55 (2022) - [j13]Bing Bu:
Network coding data distribution technology between streams of emergency system based-wireless multi-hop network. Comput. Commun. 186: 22-32 (2022) - [j12]Bing Gao, Bing Bu, Wei Zhang, Xiang Li:
An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems. IEEE Trans. Intell. Transp. Syst. 23(7): 6608-6620 (2022) - [j11]Bing Gao, Bing Bu, Xiaoxuan Wang:
A Comprehensive Resilient Control Strategy for CBTC Systems Through Train-to-Train Communications Under Malicious Attacks. IEEE Trans. Intell. Transp. Syst. 23(11): 21015-21033 (2022) - [c25]Binyu Yin, Bing Bu, Bing Gao, Qichang Li:
A Hybrid Intrusion Detection Method using Improved Stacking Ensemble Algorithm and False Positive Elimination Strategy for CBTC. ITSC 2022: 4253-4258 - [c24]Ligang Huo, Bing Bu, Qichang Li, Bing Gao:
A Clustered ZC in Cloud Computing Empowered by Blockchain. ITSC 2022: 4272-4277 - [c23]Yumeng Kang, Bing Bu, Bing Gao:
Safety Analysis of Rail Transit Redundant Structure in Cloud Computing Environment Based on Graph and Bayesian Theory. ITSC 2022: 4284-4289 - 2021
- [j10]Bing Bu, Lei Wang, Zhenyang Pi, Weiguo Fang:
An Extensive Evolutionary Mental Game Model for the Mandatory Evacuation of Protesters by Police. IEEE Access 9: 64468-64486 (2021) - [j9]Qichang Li, Bing Bu, Junyi Zhao:
A Novel Hierarchical Situation Awareness Model for CBTC Using SVD Entropy and GRU With PRD Algorithms. IEEE Access 9: 132290-132300 (2021) - [c22]Junyi Zhao, Tao Tang, Bing Bu, Qichang Li:
A Three-dimension Resilience State Space-based Approach to Resilience Assessment of CBTC system. ITSC 2021: 3673-3678 - [c21]Bing Gao, Bing Bu:
Deep Reinforcement Learning-based Resilient Control Method for CBTC Systems through Train-to-Train Communications under Adversarial Attacks. ITSC 2021: 3679-3684 - [c20]Liru Hu, Bing Bu:
Intrusion Detection Methods in Communication-Based Train Control Systems Based on Relative Entropy and Trust Evaluation. ITSC 2021: 3939-3944 - 2020
- [c19]Shuomei Ma, Bing Bu, Hongwei Wang:
A Virtual Coupling Approach Based on Event-triggering Control for CBTC Systems under Jamming Attacks. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j8]Bing Gao, Bing Bu:
A Novel Intrusion Detection Method in Train-Ground Communication System. IEEE Access 7: 178726-178743 (2019) - [c18]Wei Zhang, Bing Bu, Hongwei Wang:
An Intrusion Detection Method of Data Tampering Attack in Communication-Based Train Control System. ITSC 2019: 345-350 - [c17]Wenhao Wu, Bing Bu, Wei Zhang:
Attacks and Counter Defense Mechanisms for CBTC Systems: System Modeling and Availability Analysis. ITSC 2019: 2521-2526 - 2018
- [j7]Bing Bu, Changchun Bao, Mao-shen Jia:
Design of a Planar First-Order Loudspeaker Array for Global Active Noise Control. IEEE ACM Trans. Audio Speech Lang. Process. 26(11): 2240-2250 (2018) - 2017
- [j6]Bing Bu, Changchun Bao, Mao-shen Jia:
Simulating the Three-Dimensional Room Transfer Function for a Rotatable Complex Source. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2487-2492 (2017) - 2016
- [j5]Wenzhe Sun, Fei Richard Yu, Tao Tang, Bing Bu:
Energy-Efficient Communication-Based Train Control Systems With Packet Delay and Loss. IEEE Trans. Intell. Transp. Syst. 17(2): 452-468 (2016) - [c16]Jian-Hong Pan, Changchun Bao, Bing Bu, Mao-shen Jia:
Measurement of the acoustic transfer function using compressed sensing techniques. APSIPA 2016: 1-4 - 2015
- [c15]Bing Bu, Changchun Bao, Mao-shen Jia, Meng-fang Zha:
Conversion of multichannel sound signals based on spherical harmonics with L1-norm constraint. ChinaSIP 2015: 79-83 - [c14]Meng-fang Zha, Changchun Bao, Mao-shen Jia, Bing Bu:
3D multizone soundfield reproduction using spherical harmonic analysis. ChinaSIP 2015: 625-629 - [c13]Yukun Chen, Bing Bu, Wenzhe Sun:
A Game-Theoretic Control Approach to Communication-Based Train Control (CBTC) Systems with Packet Drops. ITSC 2015: 1075-1080 - [c12]Erchao Chen, Bing Bu, Wenzhe Sun:
An Energy-Efficient Operation Approach Based on the Utilization of Regenerative Braking Energy Among Trains. ITSC 2015: 2606-2611 - 2014
- [j4]Jiuchang Wei, Bing Bu, Xiumei Guo, Margaret Gollagher:
The process of crisis information dissemination: impacts of the strength of ties in social networks. Kybernetes 43(2): 178-191 (2014) - [j3]Bing Bu, Fei Richard Yu, Tao Tang:
Performance Improved Methods for Communication-Based Train Control Systems With Random Packet Drops. IEEE Trans. Intell. Transp. Syst. 15(3): 1179-1192 (2014) - [j2]Bing Bu, F. Richard Yu, Tao Tang, Chunhai Gao:
Performance improvements of communication-based train control (CBTC) systems with unreliable wireless networks. Wirel. Networks 20(1): 53-71 (2014) - [c11]Ling-song Zhou, Changchun Bao, Mao-shen Jia, Bing Bu:
Range extrapolation of Head-Related Transfer Function using improved Higher Order Ambisonics. APSIPA 2014: 1-4 - [c10]Rong Zhu, Changchun Bao, Mao-shen Jia, Bing Bu, Ling-song Zhou:
The design of HOA irregular decoders based on the optimal symmetrical virtual microphone response. APSIPA 2014: 1-4 - [c9]Ling-song Zhou, Mao-shen Jia, Changchun Bao, Bing Bu:
Multi-source sound field reproduction using cylindrical harmonic analysis. ChinaSIP 2014: 129-132 - [c8]Wenzhe Sun, F. Richard Yu, Tao Tang, Bing Bu:
Energy-efficient communication-based train control (CBTC) systems with random delay and packet drop. GLOBECOM 2014: 1353-1357 - [c7]Zheng-yang Sun, Changchun Bao, Mao-shen Jia, Bing Bu:
Relative distance estimation in multi-channel spatial audio signal. ICAILP 2014: 35-38 - [c6]Rong Zhu, Changchun Bao, Mao-shen Jia, Bing Bu:
The design of ambisonics decoders for irregular speaker array conforming to subjective perception. ICAILP 2014: 721-725 - [c5]Bing Bu, Changchun Bao, Mao-shen Jia, Rong Zhu:
The design of Ambisonic reproduction system based on dynamic gain parameters. ICASSP 2014: 4453-4457 - [c4]Bing Bu, Fei Richard Yu, Tao Tang:
Method to improve the performance of communication-based train control (CBTC) systems with transmission delays and packet drops. ITSC 2014: 762-767 - 2013
- [c3]Bing Bu, F. Richard Yu, Tao Tang, Chunhai Gao:
An energy-efficient control scheme for communication-based train control (CBTC) systems with random packet drops. ICC 2013: 4143-4147 - [c2]Bing Bu, F. Richard Yu, Tao Tang, Chunhai Gao:
A delay tolerant control scheme for communication-based train control (CBTC) systems with unreliable wireless networks. ICC 2013: 5173-5177 - 2012
- [j1]Jiuchang Wei, Bing Bu, Liang Liang:
Estimating the diffusion models of crisis information in micro blog. J. Informetrics 6(4): 600-610 (2012) - 2011
- [c1]Xin Liu, Changchun Bao, Liyan Zhang, Xingtao Zhang, Feng Bao, Bing Bu:
Nonlinear bandwidth extension of audio signals based on hidden Markov model. ISSPIT 2011: 144-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint