Shu-tao Xia
#163,690
Most Influential Person Now
Shu-tao Xia's AcademicInfluence.com Rankings
Shu-tao Xiaengineering Degrees
Engineering
#7158
World Rank
#8521
Historical Rank
Electrical Engineering
#2211
World Rank
#2317
Historical Rank

Shu-tao Xiacomputer-science Degrees
Computer Science
#9632
World Rank
#10108
Historical Rank
Algorithms
#394
World Rank
#399
Historical Rank
Artificial Intelligence
#4623
World Rank
#4685
Historical Rank
Database
#6599
World Rank
#6834
Historical Rank

Download Badge
Engineering Computer Science
Shu-tao Xia's Degrees
- PhD Electrical Engineering University of California, Berkeley
- Masters Electrical Engineering University of California, Berkeley
- Bachelors Electrical Engineering Tsinghua University
Why Is Shu-tao Xia Influential?
(Suggest an Edit or Addition)Shu-tao Xia's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Second-Order Attention Network for Single Image Super-Resolution (2019) (836)
- Adversarial Weight Perturbation Helps Robust Generalization (2020) (346)
- Dimensionality-Driven Learning with Noisy Labels (2018) (315)
- Iterative Learning with Open-set Noisy Labels (2018) (238)
- Backdoor Learning: A Survey (2020) (220)
- Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets (2020) (171)
- Johnson type bounds on constant dimension codes (2007) (143)
- TokenPose: Learning Keypoint Tokens for Human Pose Estimation (2021) (83)
- Rethinking the Trigger of Backdoor Attack (2020) (80)
- Improving Adversarial Robustness via Channel-wise Activation Suppressing (2021) (63)
- A Novel Consistent Random Forest Framework: Bernoulli Random Forests (2018) (57)
- Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes (2016) (55)
- Targeted Attack for Deep Hashing based Retrieval (2020) (49)
- Some results on optimal locally repairable codes (2016) (47)
- Backdoor Attack Against Speaker Verification (2020) (46)
- Deterministic Constructions of Binary Measurement Matrices From Finite Geometry (2013) (45)
- Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences (2017) (45)
- Hilbert-Based Generative Defense for Adversarial Examples (2019) (41)
- Entropy-based bilateral filtering with a new range kernel (2017) (38)
- Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach (2016) (38)
- One-Shot Adversarial Attacks on Visual Tracking With Dual Attention (2020) (37)
- Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits (2021) (37)
- Constructions of Optimal Cyclic $({r},{\delta })$ Locally Repairable Codes (2016) (37)
- Design and analysis of SEIQR worm propagation model in mobile internet (2017) (35)
- Improved Analysis for Subspace Pursuit Algorithm in Terms of Restricted Isometry Constant (2013) (35)
- Backdoor Attack in the Physical World (2021) (34)
- Constructions of quasi-cyclic measurement matrices based on array codes (2013) (33)
- Fakd: Feature-Affinity Based Knowledge Distillation for Efficient Image Super-Resolution (2020) (32)
- Constructions of Optimal Binary Locally Repairable Codes With Multiple Repair Groups (2016) (32)
- On optimal ternary locally repairable codes (2017) (30)
- Improving Query Efficiency of Black-box Adversarial Attack (2020) (29)
- Binary Matrices for Compressed Sensing (2018) (27)
- A less-greedy two-term Tsallis Entropy Information Metric approach for decision tree classification (2017) (26)
- Multinomial random forest (2022) (26)
- Constructions of Optimal $(r,\delta)$ Locally Repairable Codes via Constacyclic Codes (2019) (25)
- Improved Bounds and Singleton-Optimal Constructions of Locally Repairable Codes With Minimum Distance 5 and 6 (2021) (23)
- Few-Shot Backdoor Attacks on Visual Object Tracking (2022) (22)
- Sparse Signal Recovery by ${\ell_q}$ Minimization Under Restricted Isometry Property (2013) (21)
- PMPA: A patch-based multiscale products algorithm for image denoising (2015) (21)
- Training Interpretable Convolutional Neural Networks by Differentiating Class-specific Filters (2020) (21)
- Adaptive Regularization of Labels (2019) (20)
- Minimum Pseudoweight and Minimum Pseudocodewords of LDPC Codes (2008) (20)
- Image Quality Assessment Based on Inter-Patch and Intra-Patch Similarity (2015) (20)
- Reconstruction guarantee analysis of binary measurement matrices based on girth (2013) (19)
- Boost Clickbait Detection Based on User Behavior Analysis (2017) (19)
- Reconstruction Guarantee Analysis of Basis Pursuit for Binary Measurement Matrices in Compressed Sensing (2017) (19)
- Hidden Backdoor Attack against Semantic Segmentation Models (2021) (17)
- Toward Latency-Aware Dynamic Middlebox Scheduling (2015) (17)
- Structured non-binary LDPC codes with large girth (2007) (17)
- On the stopping distance of finite geometry LDPC codes (2006) (16)
- Unifying attribute splitting criteria of decision trees by Tsallis entropy (2017) (15)
- Image Super-Resolution via Residual Block Attention Networks (2019) (15)
- ABFL: An autoencoder based practical approach for software fault localization (2020) (15)
- Unbiased Multivariate Correlation Analysis (2017) (15)
- Open-sourced Dataset Protection via Backdoor Watermarking (2020) (14)
- Minimum Pseudo-Codewords of LDPC Codes (2006) (14)
- Construction of MDS Euclidean Self-Dual Codes via Two Subsets (2020) (14)
- Referenceless quality metric of multiply-distorted images based on structural degradation (2018) (13)
- Adversarial Defense Via Local Flatness Regularization (2019) (13)
- On the linear codes with (r, δ)-locality for distributed storage (2017) (13)
- Improving Vision Transformers by Revisiting High-frequency Components (2022) (13)
- DAG-GAN: Causal Structure Learning with Generative Adversarial Nets (2021) (13)
- Semi-supervised robust training with generalized perturbed neighborhood (2022) (12)
- Toward Adversarial Robustness via Semi-supervised Robust Training (2020) (12)
- Deterministic constructions of binary measurement matrices with various sizes (2014) (12)
- LDPC Codes Based on Berlekamp-Justesen Codes with Large Stopping Distances (2006) (12)
- Hijacking Tracker: A Powerful Adversarial Attack on Visual Tracking (2020) (12)
- Locally repairable codes with multiple (ri, δi)-localities (2017) (12)
- On the Maximal Code Length of Optimal Linear Locally Repairable Codes (2018) (12)
- Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection (2022) (12)
- TNT: An Interpretable Tree-Network-Tree Learning Framework using Knowledge Distillation (2020) (12)
- Deep image prior based defense against adversarial examples (2021) (12)
- Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution (2022) (11)
- Revisiting Loss Landscape for Adversarial Robustness (2020) (11)
- Rectified Decision Trees: Towards Interpretability, Compression and Empirical Soundness (2019) (11)
- BackdoorBox: A Python Toolbox for Backdoor Learning (2023) (11)
- DPAttack: Diffused Patch Attacks against Universal Object Detection (2020) (11)
- Link sign prediction by Variational Bayesian Probabilistic Matrix Factorization with Student-t Prior (2017) (11)
- Accelerated Stochastic Greedy Coordinate Descent by Soft Thresholding Projection onto Simplex (2017) (10)
- Practical and Bilateral Privacy-preserving Federated Learning (2020) (10)
- Network coding for data-retrieving in cloud storage systems (2015) (10)
- Stopping Set Distributions of Some Reed–Muller Codes (2011) (10)
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification (2021) (10)
- Improved Analyses for SP and CoSaMP Algorithms in Terms of Restricted Isometry Constants (2013) (9)
- End-to-end coding for TCP (2016) (9)
- Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval (2022) (9)
- Nonlocal Pixel Selection for Multisurface Fitting-Based Super-Resolution (2014) (9)
- Special focus on distributed storage coding (2018) (9)
- DIPDefend: Deep Image Prior Driven Defense against Adversarial Examples (2020) (9)
- A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes (2005) (9)
- Improving decision trees by Tsallis Entropy Information Metric method (2016) (9)
- Stochastic Deep Gaussian Processes over Graphs (2020) (9)
- Is 2D Heatmap Representation Even Necessary for Human Pose Estimation? (2021) (9)
- Correlation-based structural dropout for convolutional neural networks (2021) (8)
- Cyclic Annealing Training Convolutional Neural Networks for Image Classification with Noisy Labels (2018) (8)
- Link Prediction in Aligned Heterogeneous Networks (2015) (8)
- Student-t Process Regression with Student-t Likelihood (2017) (8)
- Bernoulli Random Forests: Closing the Gap between Theoretical Consistency and Empirical Soundness (2016) (8)
- On the weight hierarchy of locally repairable codes (2017) (8)
- t-k-means: A ROBUST AND STABLE k-means VARIANT (2020) (8)
- A class of deterministic construction of binary compressed sensing matrices (2012) (8)
- Defending against Model Stealing via Verifying Embedded External Features (2021) (8)
- Unifying Decision Trees Split Criteria Using Tsallis Entropy (2015) (7)
- RAPIT: RTT-Aware Pending Interest Table for Content Centric Networking (2015) (7)
- CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined Networks (2018) (7)
- A Fine-Grained Differentially Private Federated Learning Against Leakage From Gradients (2022) (7)
- Student-t Process Regression with Dependent Student-t Noise (2016) (7)
- SAM: Self-Attention based Deep Learning Method for Online Traffic Classification (2020) (7)
- A Note on Self-Dual Generalized Reed-Solomon Codes (2020) (7)
- Stopping Set Distributions of Some Linear Codes (2006) (7)
- Video scene parsing: An overview of deep learning methods and datasets (2020) (7)
- A novel feature subspace selection method in random forests for high dimensional data (2016) (7)
- A generic denoising framework via guided principal component analysis (2017) (7)
- Clustering Effect of Adversarial Robust Models (2021) (7)
- Mean-removed product quantization for large-scale image retrieval (2020) (6)
- Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound (2019) (6)
- Hrnet: Hamiltonian Rescaling Network for Image Downscaling (2020) (6)
- Binary Constant-Weight Codes for Error Detection (1998) (6)
- The undetected error probability threshold of m-out-of-n codes (2000) (6)
- On the Undetected Error Probability of m-out-of-n Codes on the Binary Symmetric Channel (2000) (6)
- Improved bounds and Optimal Constructions of Locally Repairable Codes with distance 5 and 6 (2019) (6)
- Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips (2022) (5)
- Expander Recovery Performance of Bipartite Graphs With Girth Greater Than 4 (2019) (5)
- Corrdrop: Correlation Based Dropout for Convolutional Neural Networks (2020) (5)
- Recursive bounds for locally repairable codes with multiple repair groups (2016) (5)
- SimCC: A Simple Coordinate Classification Perspective for Human Pose Estimation (2021) (5)
- Maximum Multiflow in Wireless Network Coding (2012) (5)
- Alpha Discovery Neural Network based on Prior Knowledge (2019) (5)
- Contrastive Quantization with Code Memory for Unsupervised Image Retrieval (2021) (5)
- Efficient Black-Box Adversarial Attack Guided by the Distribution of Adversarial Perturbations (2020) (5)
- Attentiondrop for Convolutional Neural Networks (2019) (5)
- Steward: smart edge based joint QoE optimization for adaptive video streaming (2019) (5)
- Complete Characterization of Optimal LRCs with Minimum Distance 6 and Locality 2: Improved Bounds and Constructions (2020) (4)
- SwinFGHash: Fine-grained Image Retrieval via Transformer-based Hashing Network (2021) (4)
- DELTA: degradation-free fully test-time adaptation (2023) (4)
- On the Effectiveness of Adversarial Training against Backdoor Attacks (2022) (4)
- An effective puncturing scheme for rate-compatible LDPC codes (2010) (4)
- Construction of ternary matrices with small coherence for compressed sensing (2016) (4)
- Foveated nonlocal dual denoising (2017) (4)
- Self -Paced Mixture of T Distribution Model (2018) (4)
- Decoding Buffer Management in Practical Wireless Network Coding (2011) (4)
- Visual Privacy Protection via Mapping Distortion (2019) (4)
- Multi-level Recognition on Falls from Activities of Daily Living (2020) (4)
- Exploiting Multiple Features for Learning to Rank in Expert Finding (2013) (4)
- A probabilistic model for semantic advertising (2019) (4)
- Webly Supervised Deep Attentive Quantization (2021) (4)
- A customized and cost-efficient backup scheme in software-defined networks (2017) (4)
- An Adaptive Approach to Chinese Semantic Advertising (2011) (3)
- WeClick: Weakly-Supervised Video Semantic Segmentation with Click Annotations (2021) (3)
- Vertical Semi-Federated Learning for Efficient Online Advertising (2022) (3)
- A comparative study of wavelets and adaptively learned dictionary in compressive image sensing (2012) (3)
- On the Alignment Space and its applications (2006) (3)
- Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes (2006) (3)
- HOCA: Higher-Order Channel Attention for Single Image Super-Resolution (2021) (3)
- Mean-Removed Product Quantization for Approximate Nearest Neighbor Search (2019) (3)
- S2A: Scale-Attention-Aware Networks for Video Super-Resolution (2021) (3)
- Deterministic Construction of Binary Measurement Matrices with Flexible Sizes (2014) (3)
- Open-Vocabulary Multi-Label Classification via Multi-modal Knowledge Transfer (2022) (3)
- Pyramid Hybrid Pooling Quantization for Efficient Fine-Grained Image Retrieval (2021) (3)
- Black-box Ownership Verification for Dataset Protection via Backdoor Watermarking (2022) (3)
- SARD: A Smart Approach of Rule Division for fast flow-level consistent update in SDN (2015) (3)
- Robust Survey Aggregation with Student-t Distribution and Sparse Representation (2017) (3)
- Semi-Supervised Cross-Silo Advertising with Partial Knowledge Transfer (2022) (3)
- On the Linear Programming Bounds for Constant Dimension Codes (2011) (3)
- Neural Style Transfer with Content Discrimination (2019) (3)
- Towards A Category-extended Object Detector without Relabeling or Conflicts (2020) (3)
- Portrait-Aware Artistic Style Transfer (2018) (3)
- Multi-document Summarization Based on Sentence Clustering (2014) (3)
- Cyclic repetition erasure code (2013) (3)
- RT-ADI: Fast Real-Time Video Representation for Multi-view Human Fall Detection (2019) (3)
- Imperceptible and Robust Backdoor Attack in 3D Point Cloud (2022) (3)
- Query-Focused Multi-document Summarization Based on Concept Importance (2016) (3)
- Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning (2020) (3)
- Improving the Classification accuracy of Noisy Dataset by Effective Data Preprocessing (2019) (3)
- Improving Decision Trees Using Tsallis Entropy (2015) (2)
- Multinomial Random Forests: Fill the Gap between Theoretical Consistency and Empirical Soundness (2019) (2)
- Incorrigible set distributions and unsuccessful decoding probability of linear codes (2013) (2)
- Keyword Proximity Search over Large and Complex RDF Database (2012) (2)
- Generalized Local Aggregation for Large Scale Gaussian Process Regression (2020) (2)
- SDCN: Sparsity and Diversity Driven Correlation Networks for Traffic Demand Forecasting (2020) (2)
- On the single-parity locally repairable codes with availability (2016) (2)
- A traffic localization strategy for peer-to-peer live streaming (2013) (2)
- Making Large Ensemble of Convolutional Neural Networks via Bootstrap Re-sampling (2019) (2)
- Capacity Region of Wireless Network Coding (2014) (2)
- D2Defend: Dual-Domain based Defense against Adversarial Examples (2021) (2)
- A Graham-Sloane Type Construction of Constant Dimension Codes (2008) (2)
- Compressed Sensing Performance of Binary Matrices with Binary Column Correlations (2017) (2)
- Matrix Smoothing: A Regularization For Dnn With Transition Matrix Under Noisy Labels (2020) (2)
- CUBIST: High-Quality 360-Degree Video Streaming Services via Tile-based Edge Caching and FoV-Adaptive Prefetching (2021) (2)
- Query efficient black-box adversarial attack on deep neural networks (2022) (2)
- On the Single-Parity Locally Repairable Codes (2017) (2)
- Attention on Attention Sparse Dense Convolutional Network for Financial Signal Processing (2021) (2)
- Deep Flow Collaborative Network for Online Visual Tracking (2019) (2)
- Detecting and grouping keypoints for multi-person pose estimation using instance-aware attention (2022) (2)
- Clustering Effect of (Linearized) Adversarial Robust Models (2021) (2)
- Perfect LRCs and k-Optimal LRCs (2020) (2)
- Blind quality assessment of multiply-distorted images based on structural degradation (2017) (2)
- Scale the Internet routing table by generalized next hops of strict partial order (2017) (2)
- An Optimal Pull-Push Scheduling Algorithm Based on Network Coding for Mesh Peer-to-Peer Live Streaming (2012) (2)
- Attend to Who You Are: Supervising Self-Attention for Keypoint Detection and Instance-Aware Association (2021) (1)
- Self-Adaptive Feature Fool (2020) (1)
- An optimal segment replication strategy in P2P-VoD systems (2013) (1)
- Deep Dirichlet process mixture models (2022) (1)
- Multitask Deep Learning for Edge Intelligence Video Surveillance System (2020) (1)
- Automatic Financial Feature Construction (2019) (1)
- Neural network-based automatic factor construction (2020) (1)
- The characterization of binary constant weight codes meeting the bound of Fu and Shen (2007) (1)
- Single-Frame Super-Resolution via Compressive Sampling on Hybrid Reconstructions (2015) (1)
- Prior Knowledge Neural Network for Automatic Feature Construction in Financial Time Series (2019) (1)
- CG-ATTACK: Modeling the Conditional Distribution of Adversarial Perturbations to Boost Black-Box Attack. (2020) (1)
- Exploiting Common Characters in Chinese and Japanese to Learn Cross-Lingual Word Embeddings via Matrix Factorization (2018) (1)
- Exploiting Level-Wise Category Links for Semantic Relatedness Computing (2014) (1)
- Undetected error probability of q-ary constant weight codes (2008) (1)
- Mix-order Attention Networks for Image Restoration (2021) (1)
- Towards Effective Image Manipulation Detection with Proposal Contrastive Learning (2022) (1)
- A Novel Puncturing Scheme for Rate-compatible LDPC Codes: A Novel Puncturing Scheme for Rate-compatible LDPC Codes (2011) (1)
- Sure-Based Dual Domain Image Denoising (2018) (1)
- Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation (2022) (1)
- Content-Aware Bilateral Filtering (2018) (1)
- Unifying the Split Criteria of Decision Trees Using Tsallis Entropy (2016) (1)
- UA-DRN: Unbiased Aggregation of Deep Neural Networks for Regression Ensemble (2019) (1)
- Hugs Are Better Than Handshakes: Unsupervised Cross-Modal Transformer Hashing with Multi-granularity Alignment (2022) (1)
- Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks (2023) (1)
- On Optimal Pseudo-cyclic ($r, \delta$) Locally Repairable Codes (2018) (1)
- A Two-Step Non-redundant Subspace Clustering Approach (2012) (1)
- An Ontology-Based Approach to Query Suggestion Diversification (2014) (1)
- New bounds Under Restricted Isometry for the exact k-sparse recovery via ℓq minimization (2013) (1)
- Subspace thresholding pursuit: A reconstruction algorithm for compressed sensing (2013) (1)
- BATT: Backdoor Attack with Transformation-based Triggers (2022) (1)
- A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes (2006) (1)
- TOW:A novel time and popularity sensitive cache algorithm for P2P live media streaming (2008) (1)
- Versatile Weight Attack via Flipping Limited Bits (2022) (1)
- Temporal Calibrated Regularization for Robust Noisy Label Learning (2020) (1)
- A constant approximation for multicast scheduling under physical interference model (2013) (1)
- GDST: Global Distillation Self-Training for Semi-Supervised Federated Learning (2021) (1)
- JSRT: James-Stein Regression Tree (2020) (1)
- Bishift-Net for Image Inpainting (2021) (1)
- Sample-aware Data Augmentor for Scene Text Recognition (2021) (1)
- Deterministic complex-valued measurement matrices based on Berlekamp-Justesen codes (2014) (1)
- PTS: A Prompt-based Teacher-Student Network for Weakly Supervised Aspect Detection (2022) (1)
- Practical protection against video data leakage via universal adversarial head (2022) (1)
- Hybrid Contrastive Quantization for Efficient Cross-View Video Retrieval (2022) (1)
- Alpha Discovery Neural Network, the Special Fountain of Financial Trading Signals (2019) (1)
- Novel erasure codes with repair optimality for cloud storage (2015) (1)
- Class Aware Robust Training (2021) (1)
- Clean-label Backdoor Attack against Deep Hashing based Retrieval (2021) (1)
- PatentRank: An Ontology-based Approach to Patent Search (2011) (1)
- Learning Chinese-Japanese Bilingual Word Embedding by Using Common Characters (2016) (1)
- Design of exact regenerating hierarchical code for distributed storage system (2013) (1)
- Combating Unknown Bias with Effective Bias-Conflicting Scoring and Gradient Alignment (2021) (1)
- A Practical Privacy-preserving Method in Federated Deep Learning. (2020) (1)
- Adaptive Local Implicit Image Function for Arbitrary-Scale Super-Resolution (2022) (1)
- Backdoor Defense via Suppressing Model Shortcuts (2022) (0)
- Untargeted Backdoor Attack against Object Detection (2022) (0)
- Semantic Preserving Learning for Task-Oriented Point Cloud Downsampling (2023) (0)
- BAAT: Towards Sample-specific Backdoor Attack with Clean Labels (2022) (0)
- LCD: Adaptive Label Correction for Denoising Music Recommendation (2022) (0)
- Residual Frame for Noisy Video Classification According to Perceptual Quality in Convolutional Neural Networks (2019) (0)
- Black-Box Dataset Ownership Verification via Backdoor Watermarking (2022) (0)
- A quantization schema with negligible degradation for LDPC decoder (2010) (0)
- On Optimal (r, δ)-LRCs with Length n | (q+1) (2018) (0)
- Supplementary File : Second-order Attention Network for Single Image Super-resolution (2019) (0)
- Nonextensive information theoretical machine (2016) (0)
- On the Single-Parity Locally Repairable Codes with Multiple Repairable Groups (2018) (0)
- Achieving Lightweight Federated Advertising with Self-Supervised Split Distillation (2022) (0)
- A Lightweight Ontology Learning Method for Chinese Government Documents (2011) (0)
- Progressive Splitting and Upscaling Structure for Super-Resolution (2021) (0)
- Learned Distributed Image Compression with Multi-Scale Patch Matching in Feature Domai (2022) (0)
- Locally Repairable Codes with Multiple $(r_{i}, \delta_{i})$-Localities (2017) (0)
- L G ] 1 7 Ju l 2 01 9 tk-means : A k-means Variant with Robustness and Stability (2019) (0)
- Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension (2020) (0)
- Transferable Adversarial Attacks for Deep Scene Text Detection (2021) (0)
- SFR: Semantic-Aware Feature Rendering of Point Cloud (2023) (0)
- An analysis of scheduling mechanism in wireless network coding (2014) (0)
- NeXT: Towards High Quality Neural Radiance Fields via Multi-skip Transformer (2022) (0)
- Delving into Identify-Emphasize Paradigm for Combating Unknown Bias (2023) (0)
- GDTW: A Novel Differentiable DTW Loss for Time Series Tasks (2021) (0)
- A Comparative Study of Feature Expansion Unit for 3D Point Cloud Upsampling (2022) (0)
- Universal Adversarial Head: Practical Protection against Video Data Leakage (2021) (0)
- Automatic Grassland Degradation Estimation Using Deep Learning (2019) (0)
- A probabilistic model for semantic advertising (2018) (0)
- Motion-Aware Graph Reasoning Hashing for Self-supervised Video Retrieval (2022) (0)
- Compressive sensing based asymmetric semantic image compression for resource-constrained IoT system (2022) (0)
- Learning Transferable Spatiotemporal Representations from Natural Script Knowledge (2022) (0)
- Batch Normalization Assisted Adversarial Pruning: Towards Lightweight, Sparse and Robust Models (2021) (0)
- Enhanced Image Restoration Via Supervised Target Feature Transfer (2020) (0)
- Portfolio Selection Via Graph-Aware Gaussian Processes With Generalized Gaussian Likelihood (2023) (0)
- ACEs: Unsupervised Multi-label Aspect Detection with Aspect-category Experts (2022) (0)
- Self-attentive Pyramid Network for Single Image De-raining (2019) (0)
- Context Feature Guided Network for Image Super-resolution (2022) (0)
- EDKE: Encoder-Decoder based Kernel Estimation for Blind Image Super-resolution (2021) (0)
- Analysis of Repair Cost in Distributed Storage Systems with Fault-Tolerant Coding Strategies (2015) (0)
- Bandwidth Efficiency of Distance-optimal Scalar Locally Repairable Codes (2018) (0)
- Self-Ensemble Variance Regularization for Domain Adaptation (2022) (0)
- Deep Portfolio Optimization Modeling based on Conv-Transformers with Graph Attention Mechanism (2022) (0)
- On the Alignment Space (2005) (0)
- t-k-means: A k-means Variant with Robustness and Stability (2019) (0)
- Multinomial Random Forest: Toward Consistency and Privacy-Preservation (2019) (0)
- Special focus on distributed storage coding (2018) (0)
- Optimal Locally Repairable Codes for Parallel Reading (2020) (0)
- Improved Real-Time Visual Tracking via Adversarial Learning (2020) (0)
- Construction of structured low density lattice codes based on finite fields (2015) (0)
- L G ] 2 4 Se p 20 20 tk-means : A ROBUST AND STABLE k-means VARIANT (2020) (0)
- Training Interpretable Convolutional Neural Networks towards Class-specific Filters (2019) (0)
- Puncturing schemes for rate-compatible non-binary LDPC codes (2011) (0)
- Search Results Diversification Based on Swap Minimal Marginal Contribution (2012) (0)
- Energy Aligning for Biased Models (2021) (0)
- Automatic financial feature construction based on neural network (2019) (0)
- MOVE: Effective and Harmless Ownership Verification via Embedded External Features (2022) (0)
- BMSCS: A New Approach to Detecting Android Malware with System Call Sequences (2016) (0)
- H-GPR: A Hybrid Strategy for Large-Scale Gaussian Process Regression (2021) (0)
- Exploiting Ontologies to Rank Relationships Between Patents (2012) (0)
- Greedy coordinate descent from the view of $\ell_1$-norm gradient descent (2017) (0)
- Adaptive Frequency Learning in Two-branch Face Forgery Detection (2022) (0)
- Some Results on the Improved Bound and Construction of Optimal (r, δ) LRCs (2022) (0)
- On the error-detecting abilities of binary constant weight codes (1997) (0)
- Towards a category-extended object detector with limited data (2020) (0)
- Backdoor Defense via Adaptively Splitting Poisoned Dataset (2023) (0)
- Difficulty-Aware Data Augmentor for Scene Text Recognition (2023) (0)
- Label Aggregation of Gradient Boosting Decision Trees (2020) (0)
- Bayesian linear regression with Student-t assumptions (2016) (0)
- Matrix-Completion-Based Method for Cold-Start of Distributed Recommender Systems (2015) (0)
- A Novel \ell ^1 ℓ 1 -graph Based Image Classification Algorithm (2015) (0)
- Instance-aware Dynamic Prompt Tuning for Pre-trained Point Cloud Models (2023) (0)
- Multi-task Ranking with User Behaviors for Text-video Search (2022) (0)
- Alternating direction algorithms for ℓ0 regularization in compressed sensing (2016) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Shu-tao Xia?
Shu-tao Xia is affiliated with the following schools: