BibTeX records: Chengpo Mu

download as .bib file

@article{DBLP:journals/tmm/ZhangXYSMX22,
  author       = {Ruiheng Zhang and
                  Lixin Xu and
                  Zhengyu Yu and
                  Ye Shi and
                  Chengpo Mu and
                  Min Xu},
  title        = {Deep-IRTarget: An Automatic Target Detector in Infrared Imagery Using
                  Dual-Domain Feature Extraction and Allocation},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {24},
  pages        = {1735--1749},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMM.2021.3070138},
  doi          = {10.1109/TMM.2021.3070138},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/ZhangXYSMX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnidc/LiuMYHW21,
  author       = {Huan Liu and
                  Chengpo Mu and
                  Ruixin Yang and
                  Yang He and
                  Nan Wu},
  title        = {Research on Object Detection Algorithm Based on {UVA} Aerial Image},
  booktitle    = {7th {IEEE} International Conference on Network Intelligence and Digital
                  Content, {IC-NIDC} 2021, Beijing, China, November 17-19, 2021},
  pages        = {122--127},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IC-NIDC54101.2021.9660571},
  doi          = {10.1109/IC-NIDC54101.2021.9660571},
  timestamp    = {Wed, 12 Jan 2022 13:23:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icnidc/LiuMYHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/Zhang0SFMX20,
  author       = {Ruiheng Zhang and
                  Min Xu and
                  Yaxin Shi and
                  Jian Fan and
                  Chengpo Mu and
                  Lixin Xu},
  title        = {Infrared Target Detection Using Intensity Saliency And Self-Attention},
  booktitle    = {{IEEE} International Conference on Image Processing, {ICIP} 2020,
                  Abu Dhabi, United Arab Emirates, October 25-28, 2020},
  pages        = {1991--1995},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIP40778.2020.9191055},
  doi          = {10.1109/ICIP40778.2020.9191055},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/Zhang0SFMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangMXXX19,
  author       = {Ruiheng Zhang and
                  Chengpo Mu and
                  Min Xu and
                  Lixin Xu and
                  Xiaofeng Xu},
  title        = {Facial Component-Landmark Detection With Weakly-Supervised {LR-CNN}},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {10263--10277},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2890573},
  doi          = {10.1109/ACCESS.2018.2890573},
  timestamp    = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangMXXX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangMXXSW19,
  author       = {Ruiheng Zhang and
                  Chengpo Mu and
                  Min Xu and
                  Lixin Xu and
                  Qiaolin Shi and
                  Junbo Wang},
  title        = {Synthetic {IR} Image Refinement Using Adversarial Learning With Bidirectional
                  Mappings},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {153734--153750},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2947657},
  doi          = {10.1109/ACCESS.2019.2947657},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangMXXSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MuYLZ14,
  author       = {Chengpo Mu and
                  Meng Yu and
                  Yingjiu Li and
                  Wanyu Zang},
  title        = {Risk balance defense approach against intrusions for network server},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {3},
  pages        = {255--269},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0214-9},
  doi          = {10.1007/S10207-013-0214-9},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MuYLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/MuHZW13,
  author       = {Chengpo Mu and
                  Chao Han and
                  Xianlei Zhang and
                  Jiyuan Wang},
  title        = {A New Approach for Estimating the Infrared Radiative and Simulation},
  booktitle    = {2013 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12,
                  2013},
  pages        = {233--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CyberC.2013.45},
  doi          = {10.1109/CYBERC.2013.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/MuHZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/MuWYZH13,
  author       = {Chengpo Mu and
                  Jiyuan Wang and
                  Zhijie Yuan and
                  Xianlei Zhang and
                  Chao Han},
  title        = {The Research of the {ATR} System Based on Infrared Images and {L-M}
                  {BP} Neural Network},
  booktitle    = {Proceedings of the Seventh International Conference on Image and Graphics,
                  {ICIG} 2013, Qingdao, China, July 26-28, 2013},
  pages        = {801--805},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICIG.2013.162},
  doi          = {10.1109/ICIG.2013.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icig/MuWYZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/MuS12,
  author       = {Chengpo Mu and
                  Bing Shuai},
  editor       = {Yanling Hao and
                  Lean Yu},
  title        = {Research on Preprocessing Technique of Alert Aggregation},
  booktitle    = {Fifth International Joint Conference on Computational Sciences and
                  Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26,
                  2012},
  pages        = {597--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSO.2012.136},
  doi          = {10.1109/CSO.2012.136},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/MuS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/MuL10,
  author       = {Chengpo Mu and
                  Yingjiu Li},
  title        = {An intrusion response decision-making model based on hierarchical
                  task network planning},
  journal      = {Expert Syst. Appl.},
  volume       = {37},
  number       = {3},
  pages        = {2465--2472},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.eswa.2009.07.079},
  doi          = {10.1016/J.ESWA.2009.07.079},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/MuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MuLHT08,
  author       = {Chengpo Mu and
                  X. J. Li and
                  Houkuan Huang and
                  Shengfeng Tian},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Online Risk Assessment of Intrusion Scenarios Using {D-S} Evidence
                  Theory},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_3},
  doi          = {10.1007/978-3-540-88313-5\_3},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MuLHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/FuRMW07,
  author       = {Shujun Fu and
                  Qiuqi Ruan and
                  Chengpo Mu and
                  Wenqia Wang},
  editor       = {Yong Shi and
                  G. Dick van Albada and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Geometry-Driven Nonlinear Equation with an Accelerating Coupled Scheme
                  for Image Enhancement},
  booktitle    = {Computational Science - {ICCS} 2007, 7th International Conference
                  Beijing, China, May 27-30, 2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4487},
  pages        = {490--496},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72584-8\_65},
  doi          = {10.1007/978-3-540-72584-8\_65},
  timestamp    = {Tue, 08 Nov 2022 08:34:32 +0100},
  biburl       = {https://dblp.org/rec/conf/iccS/FuRMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MuHT05,
  author       = {Chengpo Mu and
                  Houkuan Huang and
                  Shengfeng Tian},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Intrusion Detection Alert Verification Based on Multi-level Fuzzy
                  Comprehensive Evaluation},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3801},
  pages        = {9--16},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596448\_2},
  doi          = {10.1007/11596448\_2},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MuHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}