Shu-Tao Xia
Title
Cited by
Cited by
Year
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
4962019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
2142018
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
1712018
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50 (2), 163-172, 2009
1292009
Adversarial weight perturbation helps robust generalization
D Wu, ST Xia, Y Wang
arXiv preprint arXiv:2004.05884, 2020
852020
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
672020
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
632020
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
512017
Some results on optimal locally repairable codes
J Hao, ST Xia, B Chen
2016 IEEE International Symposium on Information Theory (ISIT), 440-444, 2016
502016
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
482017
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2017
472017
Backdoor learning: A survey
Y Li, B Wu, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2007.08745, 2020
412020
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
412014
Bounds and constructions of locally repairable codes: parity-check matrix approach
J Hao, ST Xia, KW Shum, B Chen, FW Fu, Y Yang
IEEE Transactions on Information Theory 66 (12), 7465-7474, 2020
36*2020
Entropy-based bilateral filtering with a new range kernel
T Dai, W Lu, W Wang, J Wang, ST Xia
Signal Processing 137, 223-234, 2017
362017
Byte segment neural network for network traffic classification
R Li, X Xiao, S Ni, H Zheng, S Xia
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
352018
Improved analysis for subspace pursuit algorithm in terms of restricted isometry constant
CB Song, ST Xia, XJ Liu
IEEE Signal Processing Letters 21 (11), 1365-1369, 2014
352014
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
322020
A survey of network update in SDN
D Li, S Wang, K Zhu, S Xia
Frontiers of Computer Science 11 (1), 4-12, 2017
322017
Constructions of quasi-cyclic measurement matrices based on array codes
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 479-483, 2013
322013
The system can't perform the operation now. Try again later.
Articles 1–20