default search action
Le Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Chao Zhang, Cailin Wang, Le Su, Wuhua Yang, Ruliang Zhang:
An electron injection enhanced bi-mode MOS controlled thyristor to suppress the snapback phenomenon. IEICE Electron. Express 21(12): 20240205 (2024) - [j13]Lunke Fei, Le Su, Bob Zhang, Shuping Zhao, Jie Wen, Xiaoping Li:
Learning Frequency-Aware Common Feature for VIS-NIR Heterogeneous Palmprint Recognition. IEEE Trans. Inf. Forensics Secur. 19: 7604-7618 (2024) - [j12]Le Su, Lunke Fei, Bob Zhang, Shuping Zhao, Jie Wen, Yong Xu:
Complete Region of Interest for Unconstrained Palmprint Recognition. IEEE Trans. Image Process. 33: 3662-3675 (2024) - 2023
- [j11]Le Su, Lunke Fei, Shuping Zhao, Jie Wen, Jian Zhu, Shaohua Teng:
Learning modality-invariant binary descriptor for crossing palmprint to palm-vein recognition. Pattern Recognit. Lett. 172: 1-7 (2023) - 2022
- [j10]Sheng Wang, Yiran Li, Huorong Li, Feifei Li, Chengjin Tian, Le Su, Yanshan Zhang, Yubing Ma, Lie Yan, Yuanyuan Sun, Xuntao Cheng, Xiaolong Xie, Yu Zou:
Operon: An Encrypted Database for Ownership-Preserving Data Management. Proc. VLDB Endow. 15(12): 3332-3345 (2022) - [j9]Xuanle Ren, Le Su, Zhen Gu, Sheng Wang, Feifei Li, Yuan Xie, Song Bian, Chao Li, Fan Zhang:
HEDA: Multi-Attribute Unbounded Aggregation over Homomorphically Encrypted Database. Proc. VLDB Endow. 16(4): 601-614 (2022) - 2021
- [j8]Qinglei Kong, Le Su, Maode Ma:
Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain. IEEE Trans. Intell. Transp. Syst. 22(8): 4889-4898 (2021) - [i4]Ye Ouyang, Lilei Wang, Aidong Yang, Le Su, David Belanger, Tongqing Gao, Leping Wei, Yaqin Zhang:
The Next Decade of Telecommunications Artificial Intelligence. CoRR abs/2101.09163 (2021) - 2020
- [j7]Ye Ouyang, Zhongyuan Li, Le Su, Wenyuan Lu, Zhenyi Lin:
Application Behaviors Driven Self-Organizing Network (SON) for 4G LTE Networks. IEEE Trans. Netw. Sci. Eng. 7(1): 3-14 (2020) - [c12]Zhengyao Yu, Le Su, Daniel deWolfe, Dandan Wang:
A Novel Anomaly Detection Framework for LTE/VoLTE/VoWiFi Performance at Device-model Level. WTS 2020: 1-7
2010 – 2019
- 2019
- [c11]Le Su, Yao Cheng, Huasong Meng, Vrizlynn L. L. Thing, Zhe Wang, Linghe Kong, Long Cheng:
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation. SmartBlock 2019: 109-119 - [c10]Zhengyi Lin, Ye Ouyang, Le Su, Wenyuan Lu, Zhongyuan Li:
A Machine Learning Assisted Method of Coverage and Capacity Optimization (CCO) in 4G LTE Self Organizing Networks (SON). WTS 2019: 1-9 - [c9]Ye Ouyang, Le Su, Wenyuan Lu, Zhengyi Lin, Maulik Shah, Zhongyuan Li:
P2P: From Packets to Pepole, Leverage Wireless Artifical Intelligence for Bridging Network Performance Healthiness to Quality of Experience (QoE) in 4G Networks. WTS 2019: 1-11 - 2018
- [j6]Ido Nevat, Dinil Mon Divakaran, Sai Ganesh Nagarajan, Pengfei Zhang, Le Su, Li Ling Ko, Vrizlynn L. L. Thing:
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic. IEEE/ACM Trans. Netw. 26(1): 131-144 (2018) - [j5]Le Su, Lianjun Liao, Wenpeng Zhai, Shihong Xia:
Data-driven human model estimation for realtime motion capture. J. Vis. Lang. Comput. 48: 10-18 (2018) - [c8]Le Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Privacy preserving IP traceback. ISBA 2018: 1-8 - [c7]Fok Kar Wai, Lilei Zheng, Watt Kwong Wai, Le Su, Vrizlynn L. L. Thing:
Automated Botnet Traffic Detection via Machine Learning. TENCON 2018: 38-43 - [c6]Duc-Phong Le, Huasong Meng, Le Su, Sze Ling Yeo, Vrizlynn L. L. Thing:
BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy. TENCON 2018: 2372-2377 - [c5]Shihong Xia, Zihao Zhang, Le Su:
Cascaded 3D Full-Body Pose Regression from Single Depth Image at 100 FPS. VR 2018: 431-438 - [c4]Zhongyuan Li, Ye Ouyang, Le Su, Wei Jiang, Yirui Hu, Zhenyi Lin:
Detecting traffic anomaly in wireless networks, an analytics methodology. WTS 2018: 1-6 - 2017
- [j4]Dinil Mon Divakaran, Li Ling Ko, Le Su, Vrizlynn L. L. Thing:
REX: Resilient and efficient data structure for tracking network flows. Comput. Networks 118: 37-53 (2017) - [j3]Shihong Xia, Le Su, Xinyu Fei, Han Wang:
Toward accurate real-time marker labeling for live optical motion capture. Vis. Comput. 33(6-8): 993-1003 (2017) - [c3]Ye Ouyang, Zhongyuan Li, Le Su, Wenyuan Lu, Zhenyi Lin:
APP-SON: Application characteristics-driven SON to optimize 4G/5G network performance and quality of experience. IEEE BigData 2017: 1514-1523 - [i3]Shihong Xia, Zihao Zhang, Le Su:
Cascaded 3D Full-body Pose Regression from Single Depth Image at 100 FPS. CoRR abs/1711.08126 (2017) - 2015
- [j2]Dinil Mon Divakaran, Le Su, Yung Siang Liau, Vrizlynn L. L. Thing:
SLIC: Self-Learning Intelligent Classifier for network traffic. Comput. Networks 91: 283-297 (2015) - 2014
- [j1]Jie Chen, Hoon Wei Lim, San Ling, Le Su, Huaxiong Wang:
Spatial encryption supporting non-monotone access structure. Des. Codes Cryptogr. 73(3): 731-746 (2014) - 2013
- [c2]Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang:
Revocable IBE Systems with Almost Constant-Size Key Update. Pairing 2013: 168-185 - [i2]Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang:
Revocable IBE Systems with Almost Constant-size Key Update. IACR Cryptol. ePrint Arch. 2013: 495 (2013) - 2012
- [i1]Jie Chen, Hoon Wei Lim, San Ling, Le Su, Huaxiong Wang:
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters. CoRR abs/1210.6441 (2012) - 2010
- [c1]Le Su, Ying Ju, Xiangrong Liu:
Quantitative modeling and simulation of Anterior Chamber in OCT images. BIC-TA 2010: 1314-1318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint