default search action
Kun Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Bitao Yao, Xinyu Li, Zhenrui Ji, Kun Xiao, Wenjun Xu:
Task reallocation of human-robot collaborative production workshop based on a dynamic human fatigue model. Comput. Ind. Eng. 189: 109855 (2024) - [j11]Kun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Yintao Wang:
Research and Implementation of Indoor Positioning Algorithm Based on Bluetooth 5.1 AOA and AOD. Sensors 24(14): 4579 (2024) - [c27]Jianghong Nie, Ling Gan, Jing Wang, Kun Xiao, Haoran Zhu:
Optimal settlement strategy for the thermal power in the electricity market with highly penetration of renewable energy. DSAI 2024: 399-403 - [c26]Nobuhiro Kuga, Iori Serizawa, Kun Xiao:
Passive Broadband Harmonic Sensor-Tag using Circular Disk Dipole Antenna. WiSNeT 2024: 69-72 - 2023
- [j10]Chang Liu, Zhenjie Yao, Pengfei Liu, Yanhui Tu, Hu Chen, Haibo Cheng, Lixin Xie, Kun Xiao:
Early prediction of MODS interventions in the intensive care unit using machine learning. J. Big Data 10(1): 55 (2023) - [j9]Kaikai Wang, Baoliang Feng, Dazheng Zhao, Kun Xiao, Gang Wu, Binjun Shi, Rong Wang, Jing Chen, Ke Li, Luping Li, Guokun Zuo, Changcheng Shi:
Noncontact in Bed Measurements of Electrocardiogram Using a Capacitively Coupled Electrode Array Based on Flexible Circuit Board. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - [c25]Xiansen Chen, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks. DSC 2023: 237-244 - [c24]Kun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Haiyan Zhi, Yintao Wang:
Research and Implementation of Bluetooth AOA Indoor Positioning System. DSC 2023: 345-353 - [c23]Pengyu Zhang, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation. DSC 2023: 375-382 - 2022
- [j8]Junpeng He, Lei Luo, Kun Xiao, Xiyu Fang, Yun Li:
Generate qualified adversarial attacks and foster enhanced models based on generative adversarial networks. Intell. Data Anal. 26(5): 1359-1377 (2022) - [j7]Yidan Wang, Xuewen Zhou, Zurui Ao, Kun Xiao, Chenxi Yan, Qinchuan Xin:
Gap-Filling and Missing Information Recovery for Time Series of MODIS Data Using Deep Learning-Based Methods. Remote. Sens. 14(19): 4692 (2022) - [c22]Jiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo, Rui Xu:
Capability-based Component Security Mechanism for Microkernel OS. DSC 2022: 32-39 - [c21]Kun Xiao, Guohui Wang, Yi Chen, Yongfeng Xie, Hong Li, Sen Li:
Research on Event Accumulator Settings for Event-Based SLAM. ICRCA 2022: 50-56 - [i8]Kun Xiao, Guohui Wang, Yi Chen, Jinghong Nan, Yongfeng Xie:
Event-Based Dense Reconstruction Pipeline. CoRR abs/2203.12270 (2022) - [i7]Kun Xiao, Pengju Li, Guohui Wang, Zhi Li, Yi Chen, Yongfeng Xie, Yuqiang Fang:
A Preliminary Research on Space Situational Awareness Based on Event Cameras. CoRR abs/2203.13093 (2022) - 2021
- [j6]Wei Wu, Ying Sun, Kun Xiao, Qinchuan Xin:
Development of a global annual land surface phenology dataset for 1982-2018 from the AVHRR data by implementing multiple phenology retrieving methods. Int. J. Appl. Earth Obs. Geoinformation 103: 102487 (2021) - [c20]De Jian Li, Hui Wang, Xiao Ke Tang, Li Xin Yang, Chong Fei Shen, Kun Xiao:
Secure Trusted Operating System Based on Microkernel Architecture. ICICT (3) 2021: 173-188 - [i6]Kun Xiao, Guohui Wang, Yi Chen, Yongfeng Xie, Hong Li:
Research on Event Accumulator Settings for Event-Based SLAM. CoRR abs/2112.00427 (2021) - 2020
- [j5]Bo Hu, Xin Liu, Jinghong Zhao, Siya Xu, Zhenjiang Lei, Kun Xiao, Dong Liu, Zhao Li:
A Packet Scheduling Method Based on Dynamic Adjustment of Service Priority for Electric Power Wireless Communication Network. Wirel. Commun. Mob. Comput. 2020: 8869898:1-8869898:13 (2020) - [c19]Jiannan Liu, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection. QRS 2020: 122-129 - [i5]Kun Xiao, Shaochang Tan, Guohui Wang, Xueyan An, Xiang Wang, Xiangke Wang:
XTDrone: A Customizable Multi-Rotor UAVs Simulation Platform. CoRR abs/2003.09700 (2020) - [i4]Kun Xiao, Lan Ma, Shaochang Tan, Yirui Cong, Xiangke Wang:
Implementation of UAV Coordination Based on a Hierarchical Multi-UAV Simulation Platform. CoRR abs/2005.01125 (2020) - [i3]Kun Xiao, Yao Meng, Xunhua Dai, Haotian Zhang, Quan Quan:
A Lifting Wing Fixed on Multirotor UAVs for Long Flight Ranges. CoRR abs/2006.15579 (2020) - [i2]Kun Xiao, Yuxin Chen, Wuyao Jiang, Chenyao Wang, Longfei Zhao:
Modeling, Simulation and Implementation of a Bird-Inspired Morphing Wing Aircraft. CoRR abs/2007.03352 (2020) - [i1]Kun Xiao, Junqi Lu, Ying Nie, Lan Ma, Xiangke Wang, Guohui Wang:
A Benchmark for Multi-UAV Task Assignment of an Extended Team Orienteering Problem. CoRR abs/2009.00363 (2020)
2010 – 2019
- 2019
- [j4]Xin Xue, Shixin Ruan, Angxi Li, Hongbai Bai, Kun Xiao:
Nonlinear Dynamic Modelling of Two-Point and Symmetrically Supported Pipeline Brackets with Elastic-Porous Metal Rubber Damper. Symmetry 11(12): 1479 (2019) - [c18]Kun Xiao, Siya Xu, Shaoyong Guo, Xuesong Qiu, Peng Yu, Xingyu Chen, Wei Deng, Kunya Guo:
A Clustering Algorithm Based on Communication Overhead and Link Stability for Cloud-assisted Mobile Adhoc Networks. IWCMC 2019: 278-283 - 2018
- [j3]Kun Xiao, Jie He, Zhongyao Zhou:
Fairness-adjustable opportunistic relay selection in the power-constrained cooperative networks with adaptive transmission. IET Commun. 12(4): 449-457 (2018) - [c17]Xin Zhang, Ge Yu, Manguo Liu, Ying Pan, Kun Xiao:
Adaptive Non-singular Terminal Sliding-mode Pitch Control for an Underwater Vehicle. ICARM 2018: 451-455 - [c16]Yangyang Zhao, Di Han, Gen Wang, Kun Xiao:
A Guidance Method Adapted to the Full Strap-Down Laser Homing System. ICCAIS 2018: 275-278 - [c15]Shih-Hsi Hsu, Shao-Hung Chan, Ping-Tsang Wu, Kun Xiao, Li-Chen Fu:
Distributed Deep Reinforcement Learning based Indoor Visual Navigation. IROS 2018: 2532-2537 - 2017
- [j2]Jie He, Kun Xiao:
Performance Analysis of Distributed OSTBC-MIMO Systems Using Adaptive M-QAM Transmission over i.n.i.d. Generalized-K Fading Channels. IEICE Trans. Commun. 100-B(5): 843-851 (2017) - [c14]Chao Gui, Baolin Sun, Ying Song, Kun Xiao, Chengli Huang:
Variable Length Sliding Window-based Network Coding Algorithm in MANETs. MobiQuitous 2017: 488-493 - 2016
- [c13]Longxin Lin, Kun Xiao, Wenjie Liu:
Utilizing SSD to Alleviate Chunk Fragmentation in De-Duplicated Backup Systems. ICPADS 2016: 616-624 - [c12]Ying Ying Xu, Kun Xiao:
Outage performance of secure cooperative systems over correlated Rayleigh fading channels. WOCC 2016: 1-5 - 2015
- [j1]Kun Xiao, Cailing Qin, Chen Tan, Lili Liao, Chong Dang:
A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks. J. Networks 10(5): 302-310 (2015) - 2013
- [c11]Kun Xiao, Lei Luo:
A Novel Mobile Device NFC Stack Architecture. DASC 2013: 169-173 - [c10]Yi Zhang, Kun Xiao:
Load balancing relay selection of the two-hop cooperative networks. ICCT 2013: 201-205 - [c9]Kun Xiao, Yi Zhang, Xiansong Lu:
Equivalent fading statistics in the K fading channels. WOCC 2013: 209-213 - 2010
- [c8]Biao Pan, Kun Xiao, Lei Luo:
Component-based Mobile Web Application of Cross-platform. CIT 2010: 2072-2077
2000 – 2009
- 2009
- [c7]Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu:
On Non-representable Secret Sharing Matroids. ISPEC 2009: 124-135 - 2008
- [c6]Xi Chen, Shihong Chen, Kun Xiao:
K-Similar Conditional Random Fields for Semi-supervised Sequence Labeling. ALPIT 2008: 21-26 - [c5]Kun Xiao, Shangping Ren, Kevin A. Kwiat:
Retrofitting Cyber Physical Systems for Survivability through External Coordination. HICSS 2008: 465 - [c4]Kun Xiao, Shihong Chen, Xi Chen:
Course Material Research Based on Perti Net. ICWL 2008: 79-86 - 2007
- [c3]Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, Kevin A. Kwiat, Michael Macalik:
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. SESS@ICSE 2007: 4 - 2005
- [c2]Xin Wang, Ji Zheng, Kun Xiao, Xiangyang Xue, Chai-Keong Toh:
A Mobile Agent-based P2P Model for Autonomous Security Hole Discovery. CIT 2005: 723-727 - [c1]Kun Xiao, Ji Zheng, Xin Wang, Xiangyang Xue:
A Novel Peer-to-Peer Intrusion Detection System. PDCAT 2005: 441-445
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint