default search action
Fei Kang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Huaqi Sun, Hui Shu, Fei Kang, Yuntian Zhao, Yuyao Huang:
Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques. Comput. Secur. 140: 103772 (2024) - [j25]Xinbo Huang, Chenxi Liang, Xinyu Li, Fei Kang:
An Underwater Crack Detection System Combining New Underwater Image-Processing Technology and an Improved YOLOv9 Network. Sensors 24(18): 5981 (2024) - [c8]Peirang Li, Yoshiki Sawairi, Fei Kang, Chi Zhu:
A Novel Constant Driving-Force Lift Mechanism with Sensorless Load Estimation for Scissor Lift Trolley. ICARM 2024: 830-834 - [c7]Fangfang Wang, Hui Shu, Hao Zhao, Fei Kang:
SLI-YOLO: A Lightweight Unauthorized Login Detection Model Based on Multiscale Convolutional Attention. IJCNN 2024: 1-8 - 2023
- [j24]Xin Yu, Junjie Li, Fei Kang:
A hybrid model of bald eagle search and relevance vector machine for dam safety monitoring using long-term temperature. Adv. Eng. Informatics 55: 101863 (2023) - [j23]Xi Liu, Fei Kang, Maria Pina Limongelli:
Multi-zone parametric inverse analysis of super high arch dams using deep learning networks based on measured displacements. Adv. Eng. Informatics 56: 102002 (2023) - [j22]Yu Shi, Yirong Wang, Fanzhen Meng, Jianwei Zhou, Bo Wen, Xuexue Zhang, Yanyun Liu, Lei Li, Juntao Li, Xu Cao, Fei Kang, Shouping Zhu:
3D directional gradient L0 norm minimization guided limited-view reconstruction in a dual-panel positron emission mammography. Comput. Biol. Medicine 161: 107010 (2023) - [j21]Yankai Yin, Fei Kang, Xiaoquan Yan, Tao Li, Feng Duan:
A novel Penta-jet VTOL aerial robot: Modeling, control, and simulation verification. Comput. Electr. Eng. 111(Part A): 108906 (2023) - [j20]Zhao Zhang, Shuning Han, Huaihai Yi, Feng Duan, Fei Kang, Zhe Sun, Jordi Solé-Casals, Cesar F. Caiafa:
A Brain-Controlled Vehicle System Based on Steady State Visual Evoked Potentials. Cogn. Comput. 15(1): 159-175 (2023) - [j19]Ying Xing, Hui Shu, Fei Kang:
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning. Comput. Secur. 128: 103129 (2023) - [j18]Yeming Gu, Hui Shu, Fei Kang:
BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries. Comput. Secur. 135: 103508 (2023) - 2022
- [j17]Yuyao Huang, Hui Shu, Fei Kang, Yan Guang:
Protocol Reverse-Engineering Methods and Tools: A Survey. Comput. Commun. 182: 238-254 (2022) - [j16]Yuyao Huang, Hui Shu, Fei Kang:
DeMal: Module decomposition of malware based on community discovery. Comput. Secur. 117: 102680 (2022) - [j15]Han Zhang, Ying Bi, Fei Kang, Zhong Wang:
Incentive mechanisms for government officials' implementing open government data in China. Online Inf. Rev. 46(2): 224-243 (2022) - [j14]Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang:
Model of Execution Trace Obfuscation Between Threads. IEEE Trans. Dependable Secur. Comput. 19(6): 4156-4171 (2022) - 2021
- [j13]Fei Kang, Yingrui Wu, Junjie Li, Hongjun Li:
Dynamic parameter inverse analysis of concrete dams based on Jaya algorithm with Gaussian processes surrogate model. Adv. Eng. Informatics 49: 101348 (2021) - [c6]Jianbo Xu, Fei Kang, Ju Yang, Wenjuan Bu:
Vulnerability Sample Analysis Based on Reverse Debugging. ICAIIS 2021: 325:1-325:8 - [c5]Yankai Yin, Feng Duan, Fei Kang:
Design and Control of Penta-Jet Aerial Vehicle. ICIRA (3) 2021: 760-770 - 2020
- [j12]Zhijie Gui, Hui Shu, Fei Kang, Xiaobing Xiong:
FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution. IEEE Access 8: 29826-29841 (2020) - [c4]Jianing Xue, Fei Kang, Hiroshi Yokoi, Chi Zhu, Feng Duan:
A Novel Water Proof Prosthetic Hand Based on Conductive Silicon sEMG Sensors. RCAR 2020: 44-49
2010 – 2019
- 2019
- [j11]Hao Wu, Hui Shu, Fei Kang, Xiaobing Xiong:
BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary. IEEE Access 7: 169548-169564 (2019) - [j10]Fei Kang, Junjie Li, Jianghong Dai:
Prediction of long-term temperature effect in structural health monitoring of concrete dams using support vector machines with Jaya optimizer and salp swarm algorithms. Adv. Eng. Softw. 131: 60-76 (2019) - [c3]Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang:
Semantic-based Malware Behavior Description: Past and Future. ICCNS 2019: 11-19 - 2017
- [j9]Fei Kang, Bin Xu, Junjie Li, Sizeng Zhao:
Slope stability evaluation using Gaussian processes with various covariance functions. Appl. Soft Comput. 60: 387-396 (2017) - 2016
- [j8]Fei Kang, Jing-shuang Li, Junjie Li:
System reliability analysis of slopes using least squares support vector machines with particle swarm optimization. Neurocomputing 209: 46-56 (2016) - [j7]Fei Kang, Junjie Li:
Artificial Bee Colony Algorithm Optimized Support Vector Regression for System Reliability Analysis of Slopes. J. Comput. Civ. Eng. 30(3) (2016) - 2015
- [c2]Chunxiang Gu, Yonghui Zheng, Fei Kang, Dan Xin:
Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model. CloudCom-Asia 2015: 335-343 - 2013
- [j6]Fei Kang, Junjie Li, Haojin Li:
Artificial bee colony algorithm and pattern search hybridized for global optimization. Appl. Soft Comput. 13(4): 1781-1791 (2013) - [j5]Shuhua Wu, Qiong Pu, Fei Kang:
Practical authentication scheme for SIP. Peer-to-Peer Netw. Appl. 6(1): 61-74 (2013) - 2012
- [j4]Fei Kang, Junjie Li, Qing Xu:
Damage detection based on improved particle swarm optimization using vibration data. Appl. Soft Comput. 12(8): 2329-2335 (2012) - [i2]Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Improved side channel attack on the block cipher NOEKEON. IACR Cryptol. ePrint Arch. 2012: 571 (2012) - [i1]Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Symbolic computation in block cipher with application to PRESENT. IACR Cryptol. ePrint Arch. 2012: 587 (2012) - 2011
- [j3]Fei Kang, Junjie Li, Zhenyue Ma:
Rosenbrock artificial bee colony algorithm for accurate global optimization of numerical functions. Inf. Sci. 181(16): 3508-3531 (2011) - [j2]Fei Kang, Junjie Li, Zhenyue Ma, Haojin Li:
Artificial Bee Colony Algorithm with Local Search for Numerical Optimization. J. Softw. 6(3): 490-497 (2011) - 2010
- [c1]Junbo Wang, Fei Kang, Xinlei Xu, Jingning Chen:
A Fast Single Pattern Matching Algorithm Based on the Bit-Parallel. FCST 2010: 17-21
2000 – 2009
- 2008
- [j1]Fei Kang, Junjie Li, Qing Xu:
Virus coevolution partheno-genetic algorithms for optimal sensor placement. Adv. Eng. Informatics 22(3): 362-370 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint