default search action
Kai Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Yuting Hu, Yue Ming, Panzi Zhao, Boyang Lyu, Kai Hong:
LMGSNet: A Lightweight Multi-scale Group Shift Fusion Network for Low-quality 3D Face Recognition. ICME 2024: 1-6 - 2023
- [j12]Kuan Xiong, Kai Hong, Jin Li, Wanyun Li, Weidong Liao, Qiegen Liu:
Joint intensity-gradient guided generative modeling for colorization. Vis. Comput. 39(12): 6537-6552 (2023) - [c15]Kai Hong, Junjie Zhong, Linqi Chen, Chengguang Wang, Lei Wang:
Scheduling Algorithm Based on Load-Aware Queue Partitioning in Heterogeneous Multi-core Systems. IEA/AIE (2) 2023: 189-200 - 2022
- [j11]Zhuonan He, Kai Hong, Jinjie Zhou, Dong Liang, Yuhao Wang, Qiegen Liu:
Deep frequency-recurrent priors for inverse imaging reconstruction. Signal Process. 190: 108320 (2022) - [j10]Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. IEEE Trans. Software Eng. 48(5): 1463-1479 (2022) - 2021
- [i2]Kai Hong, Chunhua Wu, Cailian Yang, Minghui Zhang, Yancheng Lu, Yuhao Wang, Qiegen Liu:
High-dimensional Assisted Generative Model for Color Image Restoration. CoRR abs/2108.06460 (2021) - 2020
- [j9]Daojing He, Menghan Pan, Kai Hong, Yao Cheng, Sammy Chan, Xiaowen Liu, Nadra Guizani:
Fake Review Detection Based on PU Learning and Behavior Density. IEEE Netw. 34(4): 298-303 (2020) - [j8]Jinjie Zhou, Kai Hong, Tao Deng, Yuhao Wang, Qiegen Liu:
Progressive Colorization via Iterative Generative Models. IEEE Signal Process. Lett. 27: 2054-2058 (2020) - [i1]Kai Hong, Jin Li, Wanyun Li, Cailian Yang, Minghui Zhang, Yuhao Wang, Qiegen Liu:
Joint Intensity-Gradient Guided Generative Modeling for Colorization. CoRR abs/2012.14130 (2020)
2010 – 2019
- 2019
- [j7]Daojing He, Kai Hong, Yao Cheng, Zongli Tang, Mohsen Guizani:
Detecting Promotion Attacks in the App Market Using Neural Networks. IEEE Wirel. Commun. 26(4): 110-116 (2019) - [c14]Yuan Huang, Nan Jia, Xiaocong Zhou, Kai Hong, Xiangping Chen:
Would the Patch Be Quickly Merged? BlockSys 2019: 461-475 - 2018
- [c13]Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng:
Salient-class location: help developers understand code change in code review. ESEC/SIGSOFT FSE 2018: 770-774 - 2015
- [c12]Kai Hong, Mitchell Marcus, Ani Nenkova:
System Combination for Multi-document Summarization. EMNLP 2015: 107-117 - 2014
- [j6]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, K. P. Subbalakshmi, Rajarathnam Chandramouli, Hasan Cam:
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. IEEE Trans. Veh. Technol. 63(8): 3867-3874 (2014) - [c11]Kai Hong, Ani Nenkova:
Improving the Estimation of Word Importance for News Multi-Document Summarization. EACL 2014: 712-721 - [c10]Chun-Hsien Peng, ChiaYu Yang, Adonis Tsu, Chung-Jin Tsai, Yosen Chen, C.-Y. Lin, Kai Hong, Kaipon Kao, Paul C. P. Liang, Chao Long Tsai, Charles Chien, H. C. Hwang:
A novel RF self test for a combo SoC on digital ATE with multi-site applications. ITC 2014: 1-8 - [c9]Kai Hong, John M. Conroy, Benoît Favre, Alex Kulesza, Hui Lin, Ani Nenkova:
A Repository of State of the Art and Competitive Baseline Summaries for Generic News Summarization. LREC 2014: 1608-1616 - [c8]Kai Hong, Pengjun Pei, Ye-Yi Wang, Dilek Hakkani-Tür:
Entity ranking for descriptive queries. SLT 2014: 200-205 - 2013
- [j5]Kai Hong, Shamik Sengupta, Rajarathnam Chandramouli:
SpiderRadio: A Cognitive Radio Implementation Using IEEE 802.11 Components. IEEE Trans. Mob. Comput. 12(11): 2105-2118 (2013) - 2012
- [j4]Yan Xu, Kai Hong, Junichi Tsujii, Eric I-Chao Chang:
Feature engineering combined with machine learning and rule-based methods for structured information extraction from narrative clinical discharge summaries. J. Am. Medical Informatics Assoc. 19(5): 824-832 (2012) - [j3]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, Rajarathnam Chandramouli:
Power Control Game in Multi-Terminal Covert Timing Channels. IEEE J. Sel. Areas Commun. 30(1): 44-53 (2012) - [c7]Kai Hong, Christian G. Kohler, Mary E. March, Amber A. Parker, Ani Nenkova:
Lexical Differences in Autobiographical Narratives from Schizophrenic Patients and Healthy Controls. EMNLP-CoNLL 2012: 37-47 - 2011
- [j2]Shamik Sengupta, Kai Hong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
SpiderRadio: A cognitive radio network with commodity hardware and open source software. IEEE Commun. Mag. 49(3): 101-109 (2011) - [c6]Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli, Shamik Sengupta, K. P. Subbalakshmi:
Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network. GLOBECOM 2011: 1-5 - [c5]Yi Tan, Kai Hong, Shamik Sengupta, K. P. Subbalakshmi:
Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks. GLOBECOM 2011: 1-5 - [c4]Santhanakrishnan Anand, Kai Hong, Shamik Sengupta, Rajarathnam Chandramouli:
Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure? ICC 2011: 1-5 - [c3]Yi Tan, Kai Hong, Shamik Sengupta, Koduvayur P. Subbalakshmi:
Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense. ICC 2011: 1-5 - 2010
- [c2]Kai Hong, Shamik Sengupta, Rajarathnam Chandramouli:
Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks. ICC 2010: 1-5 - [c1]Kai Hong, Shamik Sengupta, Rajarathnam Chandramouli:
SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices. ICC 2010: 1-5
2000 – 2009
- 2009
- [j1]Shamik Sengupta, Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli:
On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels? ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(2): 96-107 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint