
Chao Feng
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j30]Hongyu Kuang
, Jian Wang, Ruilin Li
, Chao Feng
, Xing Zhang
:
Automated Data-Processing Function Identification Using Deep Neural Network. IEEE Access 8: 55411-55423 (2020) - [j29]Zhuorong Li
, Chao Feng, Jianwei Zheng
, Minghui Wu
, Hongchuan Yu:
Towards Adversarial Robustness via Feature Matching. IEEE Access 8: 88594-88603 (2020) - [j28]Qinghua Li, Zhao Zhang, Yue You, Yaqi Mu, Chao Feng:
Data Driven Models for Human Motion Prediction in Human-Robot Collaboration. IEEE Access 8: 227690-227702 (2020) - [j27]Chao Feng
, Nannan Xi
, Guijun Zhuang, Juho Hamari:
The role of interactive practice in business performance. Ind. Manag. Data Syst. 120(8): 1521-1542 (2020) - [j26]Jiachuan Wang, Peng Cheng, Libin Zheng, Chao Feng, Lei Chen, Xuemin Lin, Zheng Wang:
Demand-Aware Route Planning for Shared Mobility Services. Proc. VLDB Endow. 13(7): 979-991 (2020) - [j25]Fenglei Deng, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, Yunfei Su:
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities. Sci. Program. 2020: 8883746:1-8883746:21 (2020) - [c52]Chao Qian, Chao Bian, Chao Feng:
Subset Selection by Pareto Optimization with Recombination. AAAI 2020: 2408-2415 - [c51]Chao Bian, Chao Feng, Chao Qian, Yang Yu:
An Efficient Evolutionary Algorithm for Subset Selection with General Cost Constraints. AAAI 2020: 3267-3274 - [c50]Yingmin Zhang, Chao Feng, Lianfen Huang, Chaolin Ye, Le Weng:
Detection of Android Malicious Family Based on Manifest Information. ICCSE 2020: 202-205 - [c49]Yimin Wen, Qi Zhou, Yun Xue, Chao Feng:
Transfer Learning for Semi-supervised Classification of Non-stationary Data Streams. ICONIP (5) 2020: 468-477
2010 – 2019
- 2019
- [j24]Jiaxi Ye
, Bin Zhang, Ruilin Li, Chao Feng, Chaojing Tang:
Program State Sensitive Parallel Fuzzing for Real World Software. IEEE Access 7: 42557-42564 (2019) - [j23]Xing Zhang
, Chao Feng, Runhao Li
, Jing Lei
, Chaojing Tang:
NeuralTaint: A Key Segment Marking Tool Based on Neural Network. IEEE Access 7: 68786-68798 (2019) - [j22]Runhao Li
, Chao Feng, Xing Zhang
, Chaojing Tang:
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks. IEEE Access 7: 80079-80092 (2019) - [j21]Runhao Li
, Chen Zhang, Chao Feng, Xing Zhang
, Chaojing Tang:
Locating Vulnerability in Binaries Using Deep Neural Networks. IEEE Access 7: 134660-134676 (2019) - [j20]Xing Zhang
, Chao Feng
, Runhao Li
, Jing Lei
, Chaojing Tang
:
Marking Key Segment of Program Input via Attention Mechanism. IEEE Access 7: 183877-183891 (2019) - [j19]Lina Wang, Chao Feng, Yongjun Ren, Jinyue Xia:
Local outlier detection based on information entropy weighting. Int. J. Sens. Networks 30(4): 207-217 (2019) - [j18]Xiaojiang Chen, Lili Chen, Chao Feng, Dingyi Fang, Jie Xiong, Zheng Wang
, Yong Cui:
Sensing Our World Using Wireless Signals. IEEE Internet Comput. 23(3): 38-45 (2019) - [j17]Shengli Du
, Hamid Reza Karimi
, Junfei Qiao
, Di Wu
, Chao Feng:
Stability Analysis for a Class of Discrete-Time Switched Systems With Partial Unstable Subsystems. IEEE Trans. Circuits Syst. II Express Briefs 66-II(12): 2017-2021 (2019) - [c48]Chao Feng, Chao Qian, Ke Tang:
Unsupervised Feature Selection by Pareto Optimization. AAAI 2019: 3534-3541 - [c47]Chao Feng, Nannan Xi, Guijun Zhuang, Juho Hamari:
IT Capability and Firm Performance: The Mediating Roles of Interaction Praxis. AMCIS 2019 - [c46]Xuzhao Chai, Junming Xiao, Zhishuai Zheng, Liang Zhang, Boyang Qu, Li Yan, Sumarga Kumar Sah Tyagi, Lu Yang, Chao Feng, Hang Sun:
UAV 3D Path Planning Based on Multi-Population Ensemble Differential Evolution. BIC-TA (1) 2019: 598-610 - [c45]Miao Fan, Chao Feng, Mingming Sun, Ping Li:
Reinforced Product Metadata Selection for Helpfulness Assessment of Customer Reviews. EMNLP/IJCNLP (1) 2019: 1675-1683 - [c44]Chao Feng, Jie Xiong, Liqiong Chang, Ju Wang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang:
WiMi: Target Material Identification with Commodity Wi-Fi Devices. ICDCS 2019: 700-710 - [c43]Peng Cheng, Chao Feng, Lei Chen, Zheng Wang:
A Queueing-Theoretic Framework for Vehicle Dispatching in Dynamic Car-Hailing. ICDE 2019: 1622-1625 - [c42]Yang Liu, Zhixi Li, Chao Feng, Yiping Tse, Y. K. Ng, Zhibin Lei:
Preliminary Study on Efficient Named Entity Recognition. ICIAI 2019: 126-130 - [c41]Zhenwu Fang, Jinxiang Wang, Zhongsheng Lin, Pu Li, Chao Feng:
Driver torque steering assisting control considering the uncertainties of the driver's behavior in following large curvature path. ITSC 2019: 3533-3538 - [c40]Zhibin Lei, Chao Feng, Yang Liu, Dennis S. F. Lee, Tony Tsang, Jun Liang, Zhijun Xiong, Yuquan Liu, Gang Chen:
Next Generation Blockchain Network (NGBN). MDM 2019: 452-456 - [c39]Miao Fan, Chao Feng, Mingming Sun, Ping Li, Haifeng Wang:
Reading Customer Reviews to Answer Product-related Questions. SDM 2019: 567-575 - [c38]Miao Fan, Chao Feng, Lin Guo, Mingming Sun, Ping Li:
Product-Aware Helpfulness Prediction of Online Reviews. WWW 2019: 2715-2721 - 2018
- [j16]Hongbin Lin, Xiuping Peng, Chao Feng, Qisheng Tong, Kai Liu:
Perfect Gaussian Integer Sequence Pairs from Cyclic Difference Set Pairs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 855-858 (2018) - [j15]Bin Zhang, Chao Feng, Adrian Herrera, Vitaly Chipounov, George Candea, Chaojing Tang:
Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing. IET Softw. 12(6): 507-519 (2018) - [j14]Zhiyuan Jiang, Chao Feng
, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Secur. Commun. Networks 2018: 4610320:1-4610320:21 (2018) - [c37]Xuemei Lei, Chao Feng:
The establishment of diabetes diet classification model based on BL_WSmote. DSIT 2018: 111-115 - [c36]Taruna Seth, Chao Feng, Murali Ramanathan, Vipin Chaudhary
:
Exploring Scalable Computing Architectures for Interactions Analysis. ICCCN 2018: 1-9 - [c35]Chao Qian, Chao Feng, Ke Tang:
Sequence Selection by Pareto Optimization. IJCAI 2018: 1485-1491 - [c34]Chao Qian, Guiying Li
, Chao Feng, Ke Tang:
Distributed Pareto Optimization for Subset Selection. IJCAI 2018: 1492-1498 - [c33]Yongqiang Zhang, Hong Zhang, Cong Pan, Chao Feng:
Construction of User Concurrent Profile Based on Usage Logs. QRS Companion 2018: 301-307 - [c32]Chao Feng, Xinyi Li, Liqiong Chang, Jie Xiong, Xiaojiang Chen, Dingyi Fang, Baoying Liu, Feng Chen, Tao Zhang:
Material Identification with Commodity Wi-Fi Devices. SenSys 2018: 382-383 - 2017
- [j13]Gang Yan, Ming Yu, Shuo Shi, Chao Feng:
The recognition of traffic speed limit sign in hazy weather. J. Intell. Fuzzy Syst. 33(2): 873-883 (2017) - [j12]Xu He, Xiaoning Jing, Chao Feng, Yue Cheng:
基于种群多样性的FPSO算法在空中加油区域配置中的应用 (Diversity-guided FPSO Algorithm for Solving Air Refueling Region Deplaying Problem). 计算机科学 44(Z11): 547-551 (2017) - [c31]Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang:
Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing. CIS 2017: 543-547 - [c30]Bin Zhang, Jiaxi Ye, Chao Feng, Chaojing Tang:
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing. CIS 2017: 548-552 - [c29]Hong Li, Chao Feng, Zhichang Yang, Zhichao Yang:
An improved ferrite choke RLC model and its parameters determination method. IECON 2017: 6995-6999 - [c28]Chao Feng, Naiding Yang, Ting Lei:
Research on Method of Emergency Cases Retrieval Based on Case-Based Reasoning. ISCID (1) 2017: 83-86 - [c27]Xinyi Li, Chao Feng, Nana Ding, Ju Wang, Jie Xiong, Yuhui Ren, Xiaojiang Chen, Dingyi Fang:
Target Material Identification with Commodity RFID Devices. S3@MobiCom 2017: 25-27 - [c26]Xinyi Li, Nana Ding, Chao Feng, Ju Wang, Jie Xiong, Yuhui Ren, Xiaojiang Chen, Dingyi Fang:
Demo: Material Identification with Commodity RFID Devices. WiNTECH@MobiCom 2017: 91-92 - [c25]Yangzhen Fu, Hong Zhang, Chenchen Zeng, Chao Feng:
A Software Reliability Prediction Model: Using Improved Long Short Term Memory Network. QRS Companion 2017: 614-615 - 2016
- [j11]Chao Feng, Constantino M. Lagoa
:
Distributional Robustness Analysis for Nonlinear Uncertainty Structures. IEEE Trans. Autom. Control. 61(7): 1900-1905 (2016) - [c24]Qingkun Meng, Shameng Wen, Chao Feng, Chaojing Tang:
Predicting buffer overflow using semi-supervised learning. CISP-BMEI 2016: 1959-1963 - [c23]Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:
Testing Network Protocol Binary Software with Selective Symbolic Execution. CIS 2016: 318-322 - [c22]Zhiyuan Shi, Hanbo Li, Lianfen Huang, Chao Feng, Yifeng Zhao:
Wired/wireless integrated multi-screen display endoscopic system. ICCSE 2016: 635-638 - [c21]Degui Xiao, Chao Feng:
Detection of drivers visual attention using smartphone. ICNC-FSKD 2016: 630-635 - [c20]Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:
Analyzing network protocol binary software with joint symbolic execution. ICSAI 2016: 738-742 - [c19]Weixuan Sun, Hong Zhang, Chao Feng, Yangzhen Fu:
A Method Based on Meta-model for the Translation from UML into Event-B. QRS Companion 2016: 271-277 - [c18]Bin Zhang, Chao Feng, Bo Wu, Chaojing Tang:
Detecting integer overflow in Windows binary executables based on symbolic execution. SNPD 2016: 385-390 - 2014
- [j10]Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. J. Networks 9(6): 1464-1470 (2014) - [c17]Chao Feng, Lyn Bartram, Bernhard E. Riecke
:
Evaluating affective features of 3D motionscapes. SAP 2014: 23-30 - [c16]Chao Feng, Andrew Schultz, Vipin Chaudhary
, David A. Kofke:
Mixed-precision models for calculation of high-order virial coefficients on GPUs. HiPC 2014: 1-10 - [c15]Zhongwei Shi, Yimin Wen, Chao Feng, Hai Zhao:
Drift Detection for Multi-label Data Streams Based on Label Grouping and Entropy. ICDM Workshops 2014: 724-731 - 2013
- [c14]Chao Feng, Jinhui Wang, Wei Wu, Ligang Hou, Jianbo Kang:
CMOS 1.2V bandgap voltage reference design. ASICON 2013: 1-4 - [c13]Xuan Liu, Chao Feng, Chunsheng Yan:
Classification of tea using LED-induced fluorescence. WOCC 2013: 607-609 - 2012
- [c12]Chao Feng, Constantino M. Lagoa, Mario Sznaier:
A convex approach to generalized fixed order interpolation. ACC 2012: 5174-5181 - [c11]David Milam, Magy Seif El-Nasr, Lyn Bartram, Matt Lockyer, Chao Feng, Perry Tan:
Toolset to explore visual motion designs in a video game. CHI Extended Abstracts 2012: 1091-1094 - 2011
- [j9]Chao Feng, Fabrizio Dabbene, Constantino M. Lagoa
:
A Kinship Function Approach to Robust and Probabilistic Optimization Under Polynomial Uncertainty. IEEE Trans. Autom. Control. 56(7): 1509-1523 (2011) - 2010
- [j8]Lei Cao, Dacheng Yang, Hongwen Yang, Chao Feng, Xin Zhang:
Asymptotic performance of amplify-and-forward MIMO relaying with transmit antenna selection. Sci. China Inf. Sci. 53(12): 2631-2641 (2010) - [c10]Chao Feng, Constantino M. Lagoa, Mario Sznaier:
Hybrid system identification via sparse polynomial optimization. ACC 2010: 160-165 - [c9]Chao Feng, Constantino M. Lagoa
, Necmiye Ozay, Mario Sznaier:
Hybrid system identification: An SDP approach. CDC 2010: 1546-1552
2000 – 2009
- 2009
- [c8]Fabrizio Dabbene, Chao Feng, Constantino M. Lagoa
:
Robust and chance-constrained optimization under polynomial uncertainty. ACC 2009: 379-384 - [c7]Chao Feng, Constantino M. Lagoa
:
Distributional robustness analysis for polynomial uncertainty. CDC 2009: 1151-1156 - [c6]Chao Feng, Lei Cao, Xin Zhang, Dacheng Yang:
Diversity order analysis of a sub-optimal transmit antenna selection strategy for non-regenerative MIMO relay channel. PIMRC 2009: 978-982 - 2007
- [j7]Tong Zhou, Chao Feng:
On control system design using random samples of contractive block Toeplitz matrices. Int. J. Control 80(4): 624-635 (2007) - [c5]Fabrizio Dabbene, Chao Feng, Constantino Lagoa
:
Robust LMIs with polynomial dependence on the uncertainty. CDC 2007: 5646-5651 - 2006
- [j6]Guanglei Xiong, Chao Feng, Liang Ji:
Dynamical Gaussian mixture model for tracking elliptical living objects. Pattern Recognit. Lett. 27(7): 838-842 (2006) - [j5]Tong Zhou, Chao Feng:
Uniform Sample Generations from Contractive Block Toeplitz Matrices. IEEE Trans. Autom. Control. 51(9): 1559-1565 (2006)
1990 – 1999
- 1996
- [j4]Chao Feng, Laxmi N. Bhuyan, Fabrizio Lombardi:
Adaptive System-Level Diagnosis for Hypercube Multiprocessors. IEEE Trans. Computers 45(10): 1157-1170 (1996) - 1995
- [j3]Arkady Kanevsky, Chao Feng:
On the Embedding of Cycles in Pancake Graphs. Parallel Comput. 21(6): 923-936 (1995) - [c4]Chao Feng, Wei-Kang Huang, Fabrizio Lombardi:
A New Diagnosis Approach for Short Faults in Interconnects. FTCS 1995: 331-339 - 1994
- [c3]Chao Feng, Laxmi N. Bhuyan, Fabrizio Lombardi:
A divide-and-conquer methodology for system-level diagnosis of processor arrays. SPDP 1994: 352-359 - 1993
- [j2]Chao Feng, Jon C. Muzio, Fabrizio Lombardi:
On the testability of array structures for FFT computation. J. Electron. Test. 4(3): 215-224 (1993) - [c2]Chao Feng, Laxmi N. Bhuyan, Fabrizio Lombardi:
An Adaptive System-Level Diagnosis Approach for Mesh Connected Multiprocessors. ICPP (3) 1993: 153-157 - [c1]Chao Feng, Laxmi N. Bhuyan, Fabrizio Lombardi:
An Adaptive System-Level Diagnosis Approach for Hypercube Multiprocessors. SPDP 1993: 460-469 - 1992
- [j1]Fabrizio Lombardi, Chao Feng, Wei-Kang Huang:
Detection and Location of Multiple Faults in Baseline Interconnection Networks. IEEE Trans. Computers 41(10): 1340-1344 (1992)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-13 02:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint