


default search action
Xiao Su
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xiao Su 0001
— Department of Biomedical Engineering, Key Laboratory of Biomedical Information Engineering of Ministry of Education, Xi'an, China - Xiao Su 0002
— Beihang University, Beijing, China - Xiao Su 0003
— Peking University, Beijing, China - Xiao Su 0004
— Institut Pasteur of Shanghai, Shanghai, China - Xiao Su 0005
— Tianjin University, Tianjin, China - Xiao Su 0006
— San Jose State University, San Jose, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Xiao Su, Bin Yu
, Yunlong Liu:
A robust clustering algorithm based on weighted optimization of fuzzy feature difference using shadow sets. Fuzzy Sets Syst. 521: 109575 (2025)
[j10]Longjie Fan, Duanling Li
, Jin Huang
, Linjie Ren
, Xiao Su
, Yuankai Zhang, Ye-Hwa Chen
:
Resolving Conflicting Performance Requirements in UGV Swarm Systems: A Differential Homeomorphic Control Design. IEEE Trans. Intell. Transp. Syst. 26(11): 20407-20420 (2025)
[i4]MiniMax, Aonian Li, Bangwei Gong, Bo Yang, Boji Shan, Chang Liu, Cheng Zhu, Chunhao Zhang, Congchao Guo, Da Chen, Dong Li, Enwei Jiao, Gengxin Li, Guojun Zhang, Haohai Sun, Houze Dong, Jiadai Zhu, Jiaqi Zhuang, Jiayuan Song, Jin Zhu, Jingtao Han, Jingyang Li, Junbin Xie, Junhao Xu, Junjie Yan, Kaishun Zhang, Kecheng Xiao, Kexi Kang, Le Han, Leyang Wang, Lianfei Yu, Liheng Feng, Lin Zheng, Linbo Chai, Long Xing, Meizhi Ju, Mingyuan Chi, Mozhi Zhang, Peikai Huang, Pengcheng Niu, Pengfei Li, Pengyu Zhao, Qi Yang, Qidi Xu, Qiexiang Wang, Qin Wang, Qiuhui Li, Ruitao Leng, Shengmin Shi, Shuqi Yu, Sichen Li, Songquan Zhu, Tao Huang, Tianrun Liang, Weigao Sun, Weixuan Sun, Weiyu Cheng, Wenkai Li, Xiangjun Song, Xiao Su, Xiaodong Han, Xinjie Zhang, Xinzhu Hou, Xu Min, Xun Zou, Xuyang Shen, Yan Gong, Yingjie Zhu, Yipeng Zhou, Yiran Zhong, Yongyi Hu, Yuanxiang Fan, Yue Yu, Yufeng Yang, Yuhao Li, Yunan Huang, Yunji Li, Yunpeng Huang, Yunzhi Xu, Yuxin Mao, Zehan Li, Zekang Li, Zewei Tao, Zewen Ying, Zhaoyang Cong, Zhen Qin, Zhenhua Fan, Zhihang Yu, Zhuo Jiang, Zijia Wu:
MiniMax-01: Scaling Foundation Models with Lightning Attention. CoRR abs/2501.08313 (2025)
[i3]Jiashun Suo, Xiaojian Liao, Limin Xiao, Li Ruan, Jinquan Wang, Xiao Su, Zhisheng Huo:
CoServe: Efficient Collaboration-of-Experts (CoE) Model Inference with Limited Memory. CoRR abs/2503.02354 (2025)
[i2]Aili Chen, Aonian Li, Bangwei Gong, Binyang Jiang, Bo Fei, Bo Yang, Boji Shan, Changqing Yu, Chao Wang, Cheng Zhu, Chengjun Xiao, Chengyu Du, Chi Zhang, Chu Qiao, Chunhao Zhang, Chunhui Du, Congchao Guo, Da Chen, Deming Ding, Dianjun Sun, Dong Li, Enwei Jiao, Haigang Zhou, Haimo Zhang, Han Ding, Haohai Sun, Haoyu Feng, Huaiguang Cai, Haichao Zhu, Jian Sun, Jiaqi Zhuang, Jiaren Cai, Jiayuan Song, Jin Zhu, Jingyang Li, Jinhao Tian, Jinli Liu, Junhao Xu, Junjie Yan, Junteng Liu, Junxian He, Kaiyi Feng, Ke Yang, Kecheng Xiao, Le Han, Leyang Wang, Lianfei Yu, Liheng Feng, Lin Li, Lin Zheng, Linge Du, Lingyu Yang, Lunbin Zeng, Minghui Yu, Mingliang Tao, Mingyuan Chi, Mozhi Zhang, Mujie Lin
, Nan Hu, Nongyu Di, Peng Gao, Pengfei Li, Pengyu Zhao, Qibing Ren, Qidi Xu, Qile Li, Qin Wang, Rong Tian, Ruitao Leng, Shaoxiang Chen, Shaoyu Chen, Shengmin Shi, Shitong Weng, Shuchang Guan, Shuqi Yu, Sichen Li, Songquan Zhu, Tengfei Li, Tianchi Cai, Tianrun Liang, Weiyu Cheng, Weize Kong, Wenkai Li, Xiancai Chen, Xiangjun Song, Xiao Luo, Xiao Su, Xiaobo Li, Xiaodong Han, Xinzhu Hou, Xuan Lu, Xun Zou, Xuyang Shen, Yan Gong, Yan Ma, Yang Wang, Yiqi Shi, Yiran Zhong, Yonghong Duan:
MiniMax-M1: Scaling Test-Time Compute Efficiently with Lightning Attention. CoRR abs/2506.13585 (2025)- 2024
[c16]Shun Li, Xiao Su, Bing Shi:
A Multi-Agent Reinforcement Learning Algorithm Embedded with Opponent Modeling. ECAI 2024: 1816-1823
[c15]Xiao Su, Yutong Yuan, Longjie Fan
, Duanling Li
, Jin Huang
:
An Innovative Hierarchical Approach to Multi-rigid Body Modeling and Control Using Constraint-Following Method. ICIRA (1) 2024: 381-395
[c14]Xiao Su, Xiaolan Wang, Jialin Liu, Hao Zhang, Li Yue:
Optimization Design of Braking System for A-Double. ICRCA 2024: 338-342
[c13]Longjie Fan, Duanling Li, Linjie Ren, Xiao Su, Jin Huang:
Constraint-Following Robust Control for Flying Car: A Model-Based Approach. QRS Companion 2024: 962-969- 2023
[c12]Xiao Su, Yalan Zhou, Shanshan He, Xiangxia Li:
Ensemble Strategy Based on Deep Reinforcement Learning for Portfolio Optimization. KSEM (4) 2023: 242-249
[i1]Chaoyi Wu, Feng Chang, Xiao Su, Zhihan Wu, Yanfeng Wang, Ling Zhu, Ya Zhang
:
Integrating features from lymph node stations for metastatic lymph node detection. CoRR abs/2301.03202 (2023)- 2022
[j9]Chaoyi Wu
, Feng Chang, Xiao Su, Zhihan Wu, Yanfeng Wang, Ling Zhu, Ya Zhang
:
Integrating features from lymph node stations for metastatic lymph node detection. Comput. Medical Imaging Graph. 101: 102108 (2022)- 2021
[j8]Xiao Su, Yuguo Chen
:
Variational approximation for importance sampling. Comput. Stat. 36(3): 1901-1930 (2021)
[c11]Qing Guo, Mengchuan Shao, Xingguo Zhang, Xiao Su, Haixia Yu, Dachao Li:
A novel method to realize continuous input power control during acoustic droplet ejection. I2MTC 2021: 1-5
2010 – 2019
- 2019
[j7]Yijiang Liu
, Yinghong Wan, Xiao Su:
Identifying individual expectations in service recovery through natural language processing and machine learning. Expert Syst. Appl. 131: 288-298 (2019)
[c10]Qinglin Jia
, Xiao Su, Zhonghai Wu:
Learning Continuous User and Item Representations for Neural Collaborative Filtering. KSEM (1) 2019: 357-362
[c9]Wei Zhuang, Ruixin Zhang, Xiao Su, Yonghua Huang:
Research on the Lateral Balance Control of a Bicycle Robot. RICAI 2019: 744-750- 2017
[j6]Xiao Su, Sheng Luo:
Analysis of censored longitudinal data with skewness and a terminal event. Commun. Stat. Simul. Comput. 46(7): 5378-5391 (2017)- 2013
[j5]Pan Tong, Yong Chen, Xiao Su, Kevin R. Coombes
:
SIBER: systematic identification of bimodally expressed genes using RNAseq data. Bioinform. 29(5): 605-613 (2013)
[j4]Mingfeng Tan, Xiao Su, Haiyan Wu:
Media Cloud: When Media Revolution Meets Rise of Cloud Computing. Int. J. Softw. Informatics 7(2): 169-193 (2013)- 2012
[j3]Hua Li
, Xiao Su, Juan J. Gallegos, Yue Lu
, Yuan Ji, Jeffrey J. Molldrem, Shoudan Liang:
dsPIG: a tool to predict imprinted genes from the deep sequencing of whole transcriptomes. BMC Bioinform. 13: 271 (2012)
[j2]Weider D. Yu, Xiao Su, Jason Hansen:
A Smartphone Design Approach to User Communication Interface for Administering Storage System Network. Netw. Protoc. Algorithms 4(4): 126-155 (2012)
[c8]Weimin Ding, Xiao Su:
Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture. SEKE 2012: 768-773- 2010
[c7]Sonia Gulrajani, Anuja Oka, Xiao Su:
Multi-Tracker Collaboration in Bittorrent Systems. SEKE 2010: 117-122
[c6]Eduardo Segura, Xiao Su:
P2PSecT: Peer-to-peer Security Testbed. SEKE 2010: 783-786
2000 – 2009
- 2006
[j1]Christopher J. O. Baker
, Arash Shaban-Nejad
, Xiao Su, Volker Haarslev, Greg Butler:
Semantic web infrastructure for fungal enzyme biotechnologists. J. Web Semant. 4(3): 168-180 (2006)
[c5]Christopher J. O. Baker
, Xiao Su, Greg Butler, Volker Haarslev:
Ontoligent Interactive Query Tool. CSWWS 2006: 155-169- 2005
[c4]Yuan Fan, Xiao Su:
In-Memory Storage and Search System for Event Management in Network Security. ITCC (2) 2005: 734-739- 2004
[c3]Xiao Su, Tao Wang:
Sequence of linear programming for fine-scalable coded image transmission with delay bound. GLOBECOM 2004: 622-626
[c2]Xiao Su, Yi Shang, Yuqing Mai:
Delay-sensitive delivery of scalable coded images over peer-to-peer networks. ICME 2004: 1627-1630
[c1]Yuqing Mai, Radhika Upadrashta, Xiao Su:
J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. ITCC (1) 2004: 804-808- 2001
[b1]Xiao Su:
Error Concealment for Robust Image and Video Transmissions on the Internet. University of Illinois Urbana-Champaign, USA, 2001
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 01:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







