default search action
BibTeX records: Chengpo Mu
@article{DBLP:journals/tmm/ZhangXYSMX22, author = {Ruiheng Zhang and Lixin Xu and Zhengyu Yu and Ye Shi and Chengpo Mu and Min Xu}, title = {Deep-IRTarget: An Automatic Target Detector in Infrared Imagery Using Dual-Domain Feature Extraction and Allocation}, journal = {{IEEE} Trans. Multim.}, volume = {24}, pages = {1735--1749}, year = {2022}, url = {https://doi.org/10.1109/TMM.2021.3070138}, doi = {10.1109/TMM.2021.3070138}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhangXYSMX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnidc/LiuMYHW21, author = {Huan Liu and Chengpo Mu and Ruixin Yang and Yang He and Nan Wu}, title = {Research on Object Detection Algorithm Based on {UVA} Aerial Image}, booktitle = {7th {IEEE} International Conference on Network Intelligence and Digital Content, {IC-NIDC} 2021, Beijing, China, November 17-19, 2021}, pages = {122--127}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IC-NIDC54101.2021.9660571}, doi = {10.1109/IC-NIDC54101.2021.9660571}, timestamp = {Wed, 12 Jan 2022 13:23:53 +0100}, biburl = {https://dblp.org/rec/conf/icnidc/LiuMYHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/Zhang0SFMX20, author = {Ruiheng Zhang and Min Xu and Yaxin Shi and Jian Fan and Chengpo Mu and Lixin Xu}, title = {Infrared Target Detection Using Intensity Saliency And Self-Attention}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2020, Abu Dhabi, United Arab Emirates, October 25-28, 2020}, pages = {1991--1995}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIP40778.2020.9191055}, doi = {10.1109/ICIP40778.2020.9191055}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/Zhang0SFMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangMXXX19, author = {Ruiheng Zhang and Chengpo Mu and Min Xu and Lixin Xu and Xiaofeng Xu}, title = {Facial Component-Landmark Detection With Weakly-Supervised {LR-CNN}}, journal = {{IEEE} Access}, volume = {7}, pages = {10263--10277}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2890573}, doi = {10.1109/ACCESS.2018.2890573}, timestamp = {Thu, 14 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangMXXX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangMXXSW19, author = {Ruiheng Zhang and Chengpo Mu and Min Xu and Lixin Xu and Qiaolin Shi and Junbo Wang}, title = {Synthetic {IR} Image Refinement Using Adversarial Learning With Bidirectional Mappings}, journal = {{IEEE} Access}, volume = {7}, pages = {153734--153750}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2947657}, doi = {10.1109/ACCESS.2019.2947657}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangMXXSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MuYLZ14, author = {Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang}, title = {Risk balance defense approach against intrusions for network server}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {3}, pages = {255--269}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0214-9}, doi = {10.1007/S10207-013-0214-9}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MuYLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/MuHZW13, author = {Chengpo Mu and Chao Han and Xianlei Zhang and Jiyuan Wang}, title = {A New Approach for Estimating the Infrared Radiative and Simulation}, booktitle = {2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12, 2013}, pages = {233--236}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CyberC.2013.45}, doi = {10.1109/CYBERC.2013.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/MuHZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/MuWYZH13, author = {Chengpo Mu and Jiyuan Wang and Zhijie Yuan and Xianlei Zhang and Chao Han}, title = {The Research of the {ATR} System Based on Infrared Images and {L-M} {BP} Neural Network}, booktitle = {Proceedings of the Seventh International Conference on Image and Graphics, {ICIG} 2013, Qingdao, China, July 26-28, 2013}, pages = {801--805}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICIG.2013.162}, doi = {10.1109/ICIG.2013.162}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/MuWYZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/MuS12, author = {Chengpo Mu and Bing Shuai}, editor = {Yanling Hao and Lean Yu}, title = {Research on Preprocessing Technique of Alert Aggregation}, booktitle = {Fifth International Joint Conference on Computational Sciences and Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26, 2012}, pages = {597--600}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSO.2012.136}, doi = {10.1109/CSO.2012.136}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/MuS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/MuL10, author = {Chengpo Mu and Yingjiu Li}, title = {An intrusion response decision-making model based on hierarchical task network planning}, journal = {Expert Syst. Appl.}, volume = {37}, number = {3}, pages = {2465--2472}, year = {2010}, url = {https://doi.org/10.1016/j.eswa.2009.07.079}, doi = {10.1016/J.ESWA.2009.07.079}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/MuL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MuLHT08, author = {Chengpo Mu and X. J. Li and Houkuan Huang and Shengfeng Tian}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Online Risk Assessment of Intrusion Scenarios Using {D-S} Evidence Theory}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {35--48}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_3}, doi = {10.1007/978-3-540-88313-5\_3}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MuLHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/FuRMW07, author = {Shujun Fu and Qiuqi Ruan and Chengpo Mu and Wenqia Wang}, editor = {Yong Shi and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {Geometry-Driven Nonlinear Equation with an Accelerating Coupled Scheme for Image Enhancement}, booktitle = {Computational Science - {ICCS} 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4487}, pages = {490--496}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72584-8\_65}, doi = {10.1007/978-3-540-72584-8\_65}, timestamp = {Tue, 08 Nov 2022 08:34:32 +0100}, biburl = {https://dblp.org/rec/conf/iccS/FuRMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MuHT05, author = {Chengpo Mu and Houkuan Huang and Shengfeng Tian}, editor = {Yue Hao and Jiming Liu and Yuping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3801}, pages = {9--16}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596448\_2}, doi = {10.1007/11596448\_2}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/MuHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.