default search action
Chao Su
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Chao Su, Zhi Li, Tianyi Lei, Dezhong Peng, Xu Wang:
MetaVG: A Meta-Learning Framework for Visual Grounding. IEEE Signal Process. Lett. 31: 236-240 (2024) - [j18]Chao Su, Xiaoshuang Xing, Xiaolu Cheng, Rui Guo, Chuanwen Luo:
LPAH: Illustrating Efficient Live Patching With Alignment Holes in Kernel Data. IEEE Trans. Computers 73(10): 2434-2448 (2024) - [j17]Chao Su, Cai Liu, Yunhe Liu, Guoqing Ma, Xiaowei Gao, Yinfeng Wang, Bo Zhang:
High-Resolution Hybrid-Dimensional Inversion of Transient Electromagnetic Data for Water Hazard Detection in Coal Mines. IEEE Trans. Geosci. Remote. Sens. 62: 1-14 (2024) - [j16]Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Chao Su, Hangyu Hu, Kejun Long:
Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs. IEEE Trans. Intell. Veh. 9(2): 4115-4129 (2024) - 2023
- [j15]Jun Wang, Wenjin Zhao, Fu-Sheng Tsai, Hanlei Jin, Jinghua Tan, Chao Su:
A study of crude oil futures price volatility based on multi-dimensional data from event-driven and deep learning perspectives. Appl. Soft Comput. 146: 110548 (2023) - [j14]Chao Su, Haoliang Yuan, Loi Lei Lai, Qiang Yang:
Anchor-based multi-view subspace clustering with graph learning. Neurocomputing 547: 126320 (2023) - [c16]Zhuoqun Xia, Chao Su, Zisang Xu, Kejun Long:
Lightweight Security Authentication Scheme for Vehicle-Road Collaboration using Physical Unclonable Function. ISPA/BDCloud/SocialCom/SustainCom 2023: 169-174 - 2022
- [j13]Binjun He, Wenbin Hu, Kang Zhang, Shunda Yuan, Xiaoliang Han, Chao Su, Jiaming Zhao, Guzong Wang, Guoxia Wang, Liuya Zhang:
Image segmentation algorithm of lung cancer based on neural network model. Expert Syst. J. Knowl. Eng. 39(3) (2022) - [j12]Wentai Ma, Jing Yang, Haoyi Fu, Chao Su, Caixia Yu, Qihui Wang, Ana Tereza Ribeiro de Vasconcelos, Georgii A. Bazykin, Yiming Bao, Mingkun Li:
Genomic Perspectives on the Emerging SARS-CoV-2 Omicron Variant. Genom. Proteom. Bioinform. 20(1): 60-69 (2022) - [j11]Jianjian Dai, Xiangyang Xu, Hao Yang, Chao Su, Nan Ye:
Safety Risk Analysis of a New Design of Basalt Fiber Gabion Slope Based on Improved 3D Discrete Element Method and Monitoring Data. Sensors 22(10): 3645 (2022) - [j10]Chao Su, Heyan Huang, Shumin Shi, Ping Jian:
Improving Neural Machine Translation by Transferring Knowledge from Syntactic Constituent Alignment Learning. ACM Trans. Asian Low Resour. Lang. Inf. Process. 21(5): 91:1-91:15 (2022) - [c15]Chao Su, Xiaomei Wu, Yanming Guo, Chun Sing Lai, Liang Xu, Xuan Zhao:
Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar. ISC2 2022: 1-5 - 2021
- [j9]Chao Su, Qingfei Min, Eusebio Scornavacca, Zilong Liu:
A Dual-role Trust Model for Social Commerce: A Guanxi Perspective. Inf. Manag. 58(7): 103512 (2021) - [j8]Chao Su, Qingkai Zeng:
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures. Secur. Commun. Networks 2021: 5559552:1-5559552:15 (2021) - [j7]Heng Zhang, Chao Su, Jiawei Bai, Rongyao Yuan, Yujun Ma, Wenjun Wang:
The Rheological Analytical Solution and Parameter Inversion of Soft Soil Foundation. Symmetry 13(7): 1228 (2021) - [c14]Chao Su, Xuhua Ding, Qingkai Zeng:
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions. DSN 2021: 326-337 - 2020
- [j6]Wenjun Wang, Chao Su:
Convolutional Neural Network-Based Pavement Crack Segmentation Using Pyramid Attention Network. IEEE Access 8: 206548-206558 (2020) - [j5]Chao Su, Heyan Huang, Shumin Shi, Ping Jian, Xuewen Shi:
Neural machine translation with Gumbel Tree-LSTM based encoder. J. Vis. Commun. Image Represent. 71: 102811 (2020) - [c13]Chao Su, Jin-lei Hu, Dong Hua, Pei-yi Cui, Guang-yong Ji:
Micro Image Surface Defect Detection Technology Based on Machine Vision Big Data Analysis. ADHIP (2) 2020: 433-441
2010 – 2019
- 2019
- [j4]Qingfei Min, Yangguang Lu, Zhiyong Liu, Chao Su, Bo Wang:
Machine Learning based Digital Twin Framework for Production Optimization in Petrochemical Industry. Int. J. Inf. Manag. 49: 502-519 (2019) - [j3]Ming Lei, Heyan Huang, Chong Feng, Yang Gao, Chao Su:
An input information enhanced model for relation extraction. Neural Comput. Appl. 31(12): 9113-9126 (2019) - 2017
- [j2]Chao Su, Yuhang Guo, Heyan Huang, Shumin Shi, Chong Feng:
Incorporating target language semantic roles into a string-to-tree translation model. Frontiers Inf. Technol. Electron. Eng. 18(10): 1534-1542 (2017) - [c12]Yi Liang, Shilu Chang, Chao Su:
A Workload-Specific Memory Capacity Configuration Approach for In-Memory Data Analytic Platforms. ISPA/IUCC 2017: 486-490 - [c11]Chao Su, Heyan Huang, Shumin Shi, Yuhang Guo, Hao Wu:
A Parallel Recurrent Neural Network for Language Modeling with POS Tags. PACLIC 2017: 140-147 - [c10]Hao Wu, Heyan Huang, Ping Jian, Yuhang Guo, Chao Su:
BIT at SemEval-2017 Task 1: Using Semantic Information Space to Evaluate Semantic Textual Similarity. SemEval@ACL 2017: 77-84 - [i1]Yi Liang, Shilu Chang, Chao Su:
A Workload-Specific Memory Capacity Configuration Approach for In-Memory Data Analytic Platforms. CoRR abs/1712.05554 (2017) - 2015
- [j1]Hao Sun, Chao Su, Yue Wang, Qingkai Zeng:
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1573-1594 (2015) - [c9]Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng:
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. AsiaCCS 2015: 483-494 - [c8]Chao Su, Heyan Huang, Shumin Shi, Ping Jian:
Chinese Text Analysis Based on Minimal Recursion Semantics. CLSW 2015: 421-429 - [c7]Hao Sun, Chao Su, Yue Wang, Qingkai Zeng:
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis. SEKE 2015: 601-606 - [c6]Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng:
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses. TrustCom/BigDataSE/ISPA (1) 2015: 190-197 - 2014
- [c5]Ruijing Li, Shumin Shi, Heyan Huang, Chao Su, Tianhang Wang:
A Method of Polarity Computation of Chinese Sentiment Words Based on Gaussian Distribution. CICLing (2) 2014: 53-61
2000 – 2009
- 2006
- [c4]Chao Su, Randall L. Geiger:
Dynamic calibration of current-steering DAC. ISCAS 2006 - 2004
- [c3]Siming Huang, Guoliang Yang, Chao Su:
Solving Discriminant Models Using Interior Point Algorithm. CASDMKM 2004: 51-60 - 2003
- [c2]Chao Su, Sreenath Thoka, Kee-Chee Tiew, Randall L. Geiger:
A 40 GHz modified-Colpitts voltage controlled oscillator with increased tuning range. ISCAS (1) 2003: 717-720
1990 – 1999
- 1990
- [c1]Chao Su, Yuan F. Zheng:
Task decomposition for multilimbed robots to work in the reachable-but-unorientable space. ICRA 1990: 1659-1664
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint