default search action
Shuai Feng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j50]Yan Gao, Lunzhi Deng, Shuai Feng, Huan Liu, Binhan Li, Na Wang:
Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT. Inf. Sci. 690: 121540 (2025) - [j49]Yuntao Du, Siqi Luo, Yi Xin, Mingcai Chen, Shuai Feng, Mujie Zhang, Chonngjun Wang:
Multi-source fully test-time adaptation. Neural Networks 181: 106661 (2025) - 2024
- [j48]Shuai Feng, Maopeng Ran, Baoyong Zhang, Lihua Xie, Shengyuan Xu:
The bottleneck and ceiling effects in quantized tracking control of heterogeneous multi-agent systems under DoS attacks. Autom. 160: 111424 (2024) - [j47]Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. Comput. J. 67(2): 617-631 (2024) - [j46]Guanxiong Wang, Xiaojian Hu, Ting Wang, Jiqiong Liu, Shuai Feng, Chuanlei Wang:
Tripartite Evolutionary Game Analysis of a Logistics Service Supply Chain Cooperation Mechanism for Network Freight Platforms. Int. J. Intell. Syst. 2024: 1-17 (2024) - [j45]Shuai Feng, Huaming Qian, Huilin Wang, Wenna Wang:
LightSGM: Local feature matching with lightweight seeded. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102095 (2024) - [j44]Huilin Wang, Huaming Qian, Shuai Feng, Wenna Wang:
L-SSD: lightweight SSD target detection based on depth-separable convolution. J. Real Time Image Process. 21(2): 33 (2024) - [j43]Shuai Feng, Huaming Qian, Huilin Wang, Wenna Wang:
Real-time object detection method based on YOLOv5 and efficient mobile network. J. Real Time Image Process. 21(2): 56 (2024) - [j42]Huilin Wang, Huaming Qian, Shuai Feng:
GAN-STD: small target detection based on generative adversarial network. J. Real Time Image Process. 21(3): 65 (2024) - [j41]Shuai Feng, Huaming Qian, Huilin Wang, Wenna Wang:
η-repyolo: real-time object detection method based on η-RepConv and YOLOv8. J. Real Time Image Process. 21(3): 81 (2024) - [j40]Shuai Feng, Chongjun Wang:
When an extra rejection class meets out-of-distribution detection in long-tailed image classification. Neural Networks 178: 106485 (2024) - [j39]Shuai Feng, Maopeng Ran, Hideaki Ishii, Shengyuan Xu:
Dynamic Quantized Consensus Under DoS Attacks: Towards a Tight Zooming-Out Factor. IEEE Trans. Control. Netw. Syst. 11(1): 340-352 (2024) - [j38]Lunzhi Deng, Shuai Feng, Tao Wang, Zhenyu Hu, Siwei Li:
Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(4): 3644-3655 (2024) - [j37]Yuchang Zhao, Shuai Feng, Chang Li, Rencheng Song, Deng Liang, Xun Chen:
Source-Free Domain Adaptation for Privacy-Preserving Seizure Prediction. IEEE Trans. Ind. Informatics 20(2): 2787-2798 (2024) - [j36]Yadan Wang, Shuai Feng, Jingwen Pan, Chichao Zheng, Hu Peng, Yuanguo Wang:
Random Matrix Theory-Based Wiener Postfilter Combined With Eigenspace and Spatial Coherence-Based Minimum Variance Beamformer for Coherent Plane-Wave Adaptive Compounding. IEEE Trans. Instrum. Meas. 73: 1-17 (2024) - [j35]Huilin Wang, Huaming Qian, Shuai Feng:
Ssd-kdgan: a lightweight SSD target detection method based on knowledge distillation and generative adversarial networks. J. Supercomput. 80(16): 23544-23564 (2024) - 2023
- [j34]Jiqiong Liu, Shuai Feng:
Cooperate or Not? A Service Cooperation Strategy for Products With Service Attributes Considering Showrooming Behavior. IEEE Access 11: 92150-92166 (2023) - [j33]Yu Kawano, Michele Cucuzzella, Shuai Feng, Jacquelien M. A. Scherpen:
Krasovskii and shifted passivity based output consensus. Autom. 155: 111167 (2023) - [j32]Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system. Concurr. Comput. Pract. Exp. 35(22) (2023) - [j31]Beijia Zhao, Dongsheng Yang, Hamid Reza Karimi, Bowen Zhou, Shuai Feng, Guangdi Li:
Filter-wrapper combined feature selection and adaboost-weighted broad learning system for transformer fault diagnosis under imbalanced samples. Neurocomputing 560: 126803 (2023) - [j30]Lunzhi Deng, Tao Wang, Shuai Feng, Yunyun Qu, Siwei Li:
Secure Identity-Based Designated Verifier Anonymous Aggregate Signature Scheme Suitable for Smart Grids. IEEE Internet Things J. 10(1): 57-65 (2023) - [j29]Shiyu Jiao, Shengyuan Xu, Deming Yuan, Shuai Feng, Jian Guo:
Sliding mode control for networked control systems under DoS attacks via an event-triggered scheme. J. Frankl. Inst. 360(4): 2931-2954 (2023) - [j28]Huaming Qian, Huilin Wang, Shuai Feng, Shuya Yan:
FESSD:SSD target detection based on feature fusion and feature enhancement. J. Real Time Image Process. 20(1): 2 (2023) - [j27]Shuai Feng, Shigang Wang, Wanxiong Jiang, Xueshan Gao:
Planning of Medical Flexible Needle Motion in Effective Area of Clinical Puncture. Sensors 23(2): 671 (2023) - [j26]Maopeng Ran, Shuai Feng, Juncheng Li, Lihua Xie:
Quantized Consensus Under Data-Rate Constraints and DoS Attacks: A Zooming-In and Holding Approach. IEEE Trans. Autom. Control. 68(9): 5397-5412 (2023) - [j25]Huilin Wang, Huaming Qian, Shuai Feng, Shuya Yan:
CALYOLOv4: lightweight YOLOv4 target detection based on coordinated attention. J. Supercomput. 79(16): 18947-18969 (2023) - [j24]Shuai Feng, Huaming Qian, Huilin Wang:
A deep feature matching pipeline with triple search strategy. J. Supercomput. 79(18): 20878-20898 (2023) - [j23]Lunzhi Deng, Bo Wang, Tao Wang, Shuai Feng, Siwei Li:
Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. IEEE Trans. Serv. Comput. 16(6): 3986-3998 (2023) - [j22]Shuai Feng, Liang Feng Zhang:
An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage. IEEE Trans. Serv. Comput. 16(6): 4481-4492 (2023) - [j21]Shuai Feng, Michele Cucuzzella, Thijs Bouman, Linda Steg, Jacquelien M. A. Scherpen:
An Integrated Human-Cyber-Physical Framework for Control of Microgrids. IEEE Trans. Smart Grid 14(5): 3388-3400 (2023) - 2022
- [j20]Xiaosi Li, Kaiyu Wang, Haichuan Yang, Sichen Tao, Shuai Feng, Shangce Gao:
PAIDDE: A Permutation-Archive Information Directed Differential Evolution Algorithm. IEEE Access 10: 50384-50402 (2022) - [j19]Hideaki Ishii, Yuan Wang, Shuai Feng:
An overview on multi-agent consensus under adversarial attacks. Annu. Rev. Control. 53: 252-272 (2022) - [j18]Mingming Shi, Shuai Feng, Hideaki Ishii:
Quantized state feedback stabilization of nonlinear systems under Denial-of-Service. Autom. 139: 110180 (2022) - [j17]Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis:
Resilient quantized control under Denial-of-Service: Variable bit rate quantization. Autom. 141: 110302 (2022) - [j16]Shuai Feng, Dongxue Zhao, Qiang Guan, Jinpeng Li, Ziyang Liu, Zhongyu Jin, Guangming Li, Tongyu Xu:
A deep convolutional neural network-based wavelength selection method for spectral characteristics of rice blast disease. Comput. Electron. Agric. 199: 107199 (2022) - [j15]Lunzhi Deng, Shuai Feng, Zhiwei Chen:
Certificateless encryption scheme with provable security in the standard model suitable for mobile devices. Inf. Sci. 613: 228-238 (2022) - [j14]Qiang Guan, Kai Song, Shuai Feng, Fenghua Yu, Tongyu Xu:
Detection of Peanut Leaf Spot Disease Based on Leaf-, Plant-, and Field-Scale Hyperspectral Reflectance. Remote. Sens. 14(19): 4988 (2022) - [j13]Shuai Feng, Hideaki Ishii:
Dynamic Quantized Consensus of General Linear Multiagent Systems Under Denial-of-Service Attacks. IEEE Trans. Control. Netw. Syst. 9(2): 562-574 (2022) - 2021
- [j12]Shuai Feng, Jiqiong Liu, Xiaojian Hu:
Presale Strategy for a Dual-Channel Retailer Considering Sales Effort. IEEE Access 9: 40318-40335 (2021) - [j11]Shuai Feng, Yingli Cao, Tongyu Xu, Fenghua Yu, Dongxue Zhao, Guosheng Zhang:
Rice Leaf Blast Classification Method Based on Fused Features and One-Dimensional Deep Convolutional Neural Network. Remote. Sens. 13(16): 3207 (2021) - [j10]Xinchao Zhao, Shuai Feng, Junling Hao, Xingquan Zuo, Yong Zhang:
Neighborhood opposition-based differential evolution with Gaussian perturbation. Soft Comput. 25(1): 27-46 (2021) - [j9]Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis:
Networked Control Under DoS Attacks: Tradeoffs Between Resilience and Data Rate. IEEE Trans. Autom. Control. 66(1): 460-467 (2021) - [j8]Jiahua Tang, Bao Zou, Chang Li, Shuai Feng, Hu Peng:
Plane-Wave Image Reconstruction via Generative Adversarial Network and Attention Mechanism. IEEE Trans. Instrum. Meas. 70: 1-15 (2021) - 2020
- [j7]Guanxiong Wang, Xiaojian Hu, Xiaozheng Li, Yue Zhang, Shuai Feng, Aifeng Yang:
Multiobjective decisions for provider selection and order allocation considering the position of the CODP in a logistics service supply chain. Comput. Ind. Eng. 140: 106216 (2020) - [j6]Kai Li, Tong Xu, Shuai Feng, Lisheng Qiao, Hua-Wei Shen, Tian-yang Lv, Xueqi Cheng, En-Hong Chen:
The Propagation Background in Social Networks: Simulating and Modeling. Int. J. Autom. Comput. 17(3): 353-363 (2020) - 2017
- [j5]Shuai Feng, Pietro Tesi:
Resilient control under Denial-of-Service: Robust design. Autom. 79: 42-51 (2017) - [j4]Shuai Feng, Pietro Tesi:
Networked control systems under Denial-of-Service: Co-located vs. remote architectures. Syst. Control. Lett. 108: 40-47 (2017) - 2014
- [j3]Junpeng Chen, Shuai Feng, Juan Liu:
Topic sense induction from social tags based on non-negative matrix factorization. Inf. Sci. 280: 16-25 (2014) - 2013
- [j2]Shuai Feng, S. Al Yahmadi Amur, Zengqi Sun:
Biped walking on level ground with torso using only one actuator. Sci. China Inf. Sci. 56(11): 1-9 (2013) - 2009
- [j1]Pan Wang, Shuai Feng, Zhun Fan:
Some Issues of the Paradigm of Multi-Learning Machine - Modular Neural Networks. Int. J. Distributed Sens. Networks 5(1): 46 (2009)
Conference and Workshop Papers
- 2024
- [c23]Shuai Feng, Pengsheng Jin, Chongjun Wang:
CASE: Exploiting Intra-class Compactness and Inter-class Separability of Feature Embeddings for Out-of-Distribution Detection. AAAI 2024: 21081-21089 - [c22]Shenghua Wan, Ziyuan Chen, Le Gan, Shuai Feng, De-Chuan Zhan:
SeMOPO: Learning High-quality Model and Policy from Low-quality Offline Visual Datasets. ICML 2024 - [c21]Yucen Wang, Shenghua Wan, Le Gan, Shuai Feng, De-Chuan Zhan:
AD3: Implicit Action is the Key for World Models to Distinguish the Diverse Visual Distractors. ICML 2024 - 2023
- [c20]Wenyu Jiang, Yuxin Ge, Hao Cheng, Mingcai Chen, Shuai Feng, Chongjun Wang:
READ: Aggregating Reconstruction Error into Out-of-Distribution Detection. AAAI 2023: 14910-14918 - [c19]Siyu Hong, Lin Chen, Wensheng Hou, Siyuan Zhang, Shuai Feng, Xin Zhang, Jiangjie Zhou:
Effects of motor fatigue on cortical activation level and functional connectivity during upper limb resistance training. EMBC 2023: 1-5 - [c18]Shuai Feng, Wenyu Jiang, Mingcai Chen, Yuntao Du, Hao Cheng, Yuxin Ge, Chongjun Wang:
CESED: Exploiting Hyperspherical Predefined Evenly-Distributed Class Centroids for OOD Detection. SDM 2023: 262-270 - 2022
- [c17]Shuai Feng, Shuaijianni Xu, Liang Feng Zhang:
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits. AsiaCCS 2022: 17-27 - [c16]Siyu Hong, Lin Chen, Shuai Feng, Xin Zhang, Liqing Yang, Jiangjie Zhou, Qi Wang, Kaige Zheng, Siyuan Zhang:
Effects of Photobiomodulation therapy on relieving peripheral and central fatigue in the grip exercise. ICBBS 2022: 99-104 - [c15]Shuai Feng, Siyu Hong, Lin Chen:
Neuroplasticity Influence Peripheral Nervous Response during Long-term Motor Skill Learning- A fNIRS Study. ICBET 2022: 89-93 - [c14]Jiujun Cheng, Yonghong Xiong, Shuai Feng, Guiyuan Yuan, Qichao Mao, Bo Lu:
A Behavior Decision Method for Autonomous Vehicles in an Urban Scene. WASA (1) 2022: 175-184 - 2021
- [c13]Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis:
Resilient Quantized Control under Denial-of-Service with the Application of Variable Bit Rate Quantization. ECC 2021: 509-514 - [c12]Jiujun Cheng, Lu Yang, Guangtao Zhou, Hongjiang Zheng, Shuai Feng, Jie Cui, Zhenhua Huang:
Accessibility for VANET in an Urban Scene. ICNSC 2021: 1-6 - 2020
- [c11]Shuai Feng, Hideaki Ishii:
Dynamic Quantized Leader-follower Consensus under Denial-of-Service Attacks. CDC 2020: 488-493 - [c10]Xiao-yan Wang, Zheng-wei Gu, Shuai Feng:
Data Mining of the Effect of Cold and Heat Properties of Traditional Chinese Medicine on Normal Rats. ISAIMS 2020: 220-224 - 2019
- [c9]Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis:
Networked Control under DoS Attacks: Trade-off between Resilience and Data Rate. ACC 2019: 378-383 - 2018
- [c8]Shuai Feng, Haonan Guo, Jichao Yang, Zhengwu Xu, Shenghong Li:
A Learning Automata-Based Compression Scheme for Convolutional Neural Network. CSPS (3) 2018: 42-49 - [c7]Zhicong Yan, Shuai Feng, Fangqi Li, Zhengwu Xu, Shenghong Li:
A Multi-view Deep Learning Approach for Detecting Threats on 3D Human Body. CSPS (3) 2018: 286-294 - 2017
- [c6]Shuai Feng, Pietro Tesi, Claudio De Persis:
Towards stabilization of distributed systems under denial-of-service. CDC 2017: 5360-5365 - 2016
- [c5]Shuai Feng, Pietro Tesi:
Resilient control under Denial-of-Service: Robust design. ACC 2016: 4737-4742 - 2013
- [c4]Yanan Ga, Yue Lin, Songtao Fan, Shuai Feng:
The fault tolerant GNC system architecture for space station spacecrafts. ICCA 2013: 729-734 - [c3]Xizhe Zhang, Shuai Feng, Ying Yin, Bin Zhang:
Community discovery of public cloud web services based on structural networks. ICNC 2013: 1129-1133 - 2008
- [c2]Shuai Feng, Zengqi Sun:
A simple trajectory generation method for biped walking. ICARCV 2008: 2078-2082 - [c1]Shuai Feng, Zengqi Sun:
Biped Robot Walking Using Three-Mass Linear Inverted Pendulum Model. ICIRA (1) 2008: 371-380
Informal and Other Publications
- 2024
- [i19]Yucen Wang, Shenghua Wan, Le Gan, Shuai Feng, De-Chuan Zhan:
AD3: Implicit Action is the Key for World Models to Distinguish the Diverse Visual Distractors. CoRR abs/2403.09976 (2024) - [i18]Kaichen Huang, Hai-Hang Sun, Shenghua Wan, Minghao Shao, Shuai Feng, Le Gan, De-Chuan Zhan:
DIDA: Denoised Imitation Learning based on Domain Adaptation. CoRR abs/2404.03382 (2024) - [i17]Kaichen Huang, Minghao Shao, Shenghua Wan, Hai-Hang Sun, Shuai Feng, Le Gan, De-Chuan Zhan:
SENSOR: Imitate Third-Person Expert's Behaviors via Active Sensoring. CoRR abs/2404.03386 (2024) - [i16]Shenghua Wan, Ziyuan Chen, Le Gan, Shuai Feng, De-Chuan Zhan:
SeMOPO: Learning High-quality Model and Policy from Low-quality Offline Visual Datasets. CoRR abs/2406.09486 (2024) - [i15]Shuai Feng, Junsoo Kim:
Asymptotic tracking control of dynamic reference over homomorphically encrypted data with finite modulus. CoRR abs/2409.18787 (2024) - 2023
- [i14]Shuai Feng, Maopeng Ran, Hideaki Ishii, Shengyuan Xu:
Dynamic quantized consensus under DoS attacks: Towards a tight zooming-out factor. CoRR abs/2306.00279 (2023) - [i13]Shuai Feng, Maojiao Ye, Lihua Xie, Shengyuan Xu:
Quantized distributed Nash equilibrium seeking under DoS attacks: A quantized consensus based approach. CoRR abs/2308.12617 (2023) - [i12]Shuai Feng, Liang Feng Zhang:
An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage. CoRR abs/2310.15972 (2023) - [i11]Shuai Feng, Maopeng Ran, Baoyong Zhang, Lihua Xie, Shengyuan Xu:
The bottleneck and ceiling effects in quantized tracking control of heterogeneous multi-agent systems under DoS attacks. CoRR abs/2311.00263 (2023) - 2022
- [i10]Wenyu Jiang, Hao Cheng, Mingcai Chen, Shuai Feng, Yuxin Ge, Chongjun Wang:
READ: Aggregating Reconstruction Error into Out-of-distribution Detection. CoRR abs/2206.07459 (2022) - [i9]Yu Kawano, Michele Cucuzzella, Shuai Feng, Jacquelien M. A. Scherpen:
Krasovskii and Shifted Passivity Based Output Consensus. CoRR abs/2207.01430 (2022) - [i8]Maopeng Ran, Shuai Feng, Juncheng Li, Lihua Xie:
Quantized Consensus under Data-Rate Constraints and DoS Attacks: A Zooming-In and Holding Approach. CoRR abs/2207.08332 (2022) - 2021
- [i7]Mingming Shi, Shuai Feng, Hideaki Ishii:
Quantized State Feedback Stabilization of Nonlinear Systems under Denial-of-Service. CoRR abs/2104.04333 (2021) - 2020
- [i6]Shuai Feng, Hideaki Ishii:
Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks. CoRR abs/2004.13815 (2020) - [i5]Shuai Feng, Michele Cucuzzella, Thijs Bouman, Linda Steg, Jacquelien M. A. Scherpen:
An Integrated Human-physical Framework for Control of Power Grids. CoRR abs/2012.11208 (2020) - 2018
- [i4]Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis:
Data Rates for Stabilizing Control under Denial-of-Service Attacks. CoRR abs/1809.04892 (2018) - 2017
- [i3]Shuai Feng, Pietro Tesi:
Networked Systems under Denial-of-Service: Co-located vs. Remote Control Architectures. CoRR abs/1703.07612 (2017) - [i2]Shuai Feng, Pietro Tesi, Claudio De Persis:
Towards Stabilization of Distributed Systems under Denial-of-Service. CoRR abs/1709.03766 (2017) - 2016
- [i1]Shuai Feng, Pietro Tesi:
Resilient Control under Denial-of-Service: Robust Design. CoRR abs/1603.02564 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint