2008 | ||
---|---|---|
30 | EE | Guodong Zhang, Xin Zhang, Hong Zhao, Peiyu Yan: A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet. BMEI (1) 2008: 850-854 |
29 | EE | Guodong Zhang, Peiyu Yan, Hong Zhao, Xin Zhang: A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks. BMEI (2) 2008: 823-826 |
28 | EE | Hong Zhao: A Practical Wavelet Domain LMK Algorithm for Predicting Multimedia Traffic. ICC 2008: 515-519 |
27 | EE | Xiang Zhou, Hong Zhao: Three-Dimensional Shape Measurement Using Maar Wavelet Transform. ICIRA (1) 2008: 753-760 |
26 | EE | Weiguang Zhang, Hong Zhao, Xiang Zhou: Design of Multi-resolution 3D Measurement System Using Light Sectioning Method and Multi-sensor Data Fusion Techniques. ICIRA (1) 2008: 761-770 |
25 | EE | Jinjun Li, Hong Zhao, Tao Jiang, Xiang Zhou: Development of a 3D High-Precise Positioning System Based on a Planar Target and Two CCD Cameras. ICIRA (2) 2008: 475-484 |
24 | EE | Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Maintaining software product lines - an industrial practice. ICSM 2008: 444-447 |
23 | EE | Ming Luo, Yingyou Wen, Hong Zhao: An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. ICYCS 2008: 1577-1582 |
22 | EE | Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547 |
2007 | ||
21 | EE | Nan Guo, Tian-han Gao, Bin Zhang, Hong Zhao: Distributed and Scalable Event Correlation Based on Causality Graph. APNOMS 2007: 567-570 |
20 | EE | Shuyi Chen, Yingyou Wen, Hong Zhao: Formal Analysis of Secure Bootstrap in Trusted Computing. ATC 2007: 352-360 |
19 | EE | Xuena Peng, Hong Zhao: A Framework of Attacker Centric Cyber Attack Behavior Analysis. ICC 2007: 1449-1454 |
18 | EE | Hanxun Zhou, Yingyou Wen, Hong Zhao: Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. ICN 2007: 65 |
17 | EE | Huifei Rao, Jie Chen, Changhong Yu, Woon Tiong Ang, I-Chyn Wey, An-Yeu Wu, Hong Zhao: Ensemble Dependent Matrix Methodology for Probabilistic-Based Fault-tolerant Nanoscale Circuit Design. ISCAS 2007: 1803-1806 |
16 | EE | Hanxun Zhou, Yingyou Wen, Hong Zhao: Detecting early worm propagation based on entropy. Infoscale 2007: 71 |
15 | EE | Xuezhi Wen, Wei Liu, Nan Wang, Huai Yuan, Hong Zhao: Improved Wavelet Feature Extraction Methods Based on HSV Space for Vehicle Detection. MVA 2007: 376-379 |
2006 | ||
14 | EE | Xuezhi Wen, Hong Zhao, Nan Wang, Huai Yuan: A Rear-Vehicle Detection System for Static Images Based on Monocular Vision. ICARCV 2006: 1-4 |
13 | EE | Hong Zhao, Nirwan Ansari, Yun Q. Shi: Network Traffic Prediction Using Least Mean Kurtosis. IEICE Transactions 89-B(5): 1672-1674 (2006) |
2005 | ||
12 | EE | Xiangyang Wang, Hong Zhao: A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. CIS (2) 2005: 617-622 |
11 | EE | Hong Zhao, Nirwan Ansari, Yun Q. Shi: Layered MPEG Video Transmission over IP DiffServ. ITCC (1) 2005: 63-67 |
2004 | ||
10 | EE | Tian-han Gao, Nan Guo, Hong Zhao: A Self-Adapting Mobile Ipv6 Model Based on MAP. EEE 2004: 473-476 |
9 | EE | Nan Guo, Tian-han Gao, Hong Zhao: Distributed Plug-and-Play Network Management Model Based on Mobile Agents. EEE 2004: 487-491 |
8 | EE | Hong Shao, Wen-cheng Cui, Hong Zhao: Medical image retrieval based on visual contents and text information. SMC (1) 2004: 1098-1103 |
7 | EE | Hong Shao, Wen-cheng Cui, Hong Zhao: Automatic analysis of brain pathology based on image content. SMC (5) 2004: 4480-4484 |
2003 | ||
6 | EE | Hong Zhao, Nirwan Ansari, Yun Q. Shi: Self-similar Traffic Prediction Using Least Mean Kurtosis. ITCC 2003: 352-355 |
5 | Long-Cheng Li, Hong Zhao, Hiroaki Shiina, Christopher J. Kane, Rajvir Dahiya: PGDB: a curated and integrated database of genes related to the prostate. Nucleic Acids Research 31(1): 291-293 (2003) | |
2002 | ||
4 | EE | Hong Zhao, Nirwan Ansari, Yun Q. Shi: A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. ITCC 2002: 54-58 |
1999 | ||
3 | EE | Yaodong He, Zao Jiang, Bing Liu, Hong Zhao: Content-based Index and Retrieval Method of Chinese Document Images. ICDAR 1999: 685-688 |
2 | EE | Timothy K. Tsai, Mei-Chen Hsueh, Hong Zhao, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Stress-Based and Path-Based Fault Injection. IEEE Trans. Computers 48(11): 1183-1201 (1999) |
1993 | ||
1 | Xingwei Wang, Hong Zhao, Jiakeng Zhu: GRPC: A Communication Cooperation Mechanism in Distributed Systems. Operating Systems Review 27(3): 75-86 (1993) |