default search action
Xiaopeng Ji
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Wei Pei, Yan Li, Peng Wen, Fuwen Yang, Xiaopeng Ji:
An automatic method using MFCC features for sleep stage classification. Brain Informatics 11(1): 6 (2024) - [j29]Xiaopeng Ji, Yan Li, Peng Wen, Prabal Datta Barua, U. Rajendra Acharya:
MixSleepNet: A Multi-Type Convolution Combined Sleep Stage Classification Model. Comput. Methods Programs Biomed. 244: 107992 (2024) - [j28]Yuxuan Li, Yanqiu Chen, Xiaopeng Ji:
Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping. Entropy 26(1): 64 (2024) - [j27]Peng Zhai, Xiaoyi Wei, Taixian Hou, Xiaopeng Ji, Zhiyan Dong, Jiafu Yi, Lihua Zhang:
Robust Proximal Adversarial Reinforcement Learning Under Model Mismatch. IEEE Robotics Autom. Lett. 9(11): 10248-10255 (2024) - [j26]Sen Qiao, Ruizhi Zhu, Xiaopeng Ji, Junjie Zhao, Huihui Ding:
Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems. Sensors 24(3): 796 (2024) - [j25]Yunxiang Li, Wen Tian, Xiaopeng Ji, Guangjie Liu, Yuewei Dai:
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures. IEEE Syst. J. 18(1): 692-701 (2024) - [j24]Xiaopeng Ji, Ruizhi Zhu, Qiaosheng Eric Zhang, Chunguo Li, Daming Cao:
Enhancing Covert Communication in OOK Schemes by Phase Deflection. IEEE Trans. Inf. Forensics Secur. 19: 9775-9788 (2024) - [j23]Wen Tian, Jifei Du, Xiaopeng Ji, Miao Du, Guangjie Liu, Zhu Han:
UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information. IEEE Trans. Wirel. Commun. 23(7): 6921-6937 (2024) - 2023
- [j22]Xufei Ding, Wen Tian, Guangjie Liu, Xiaopeng Ji:
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks. Sensors 23(23): 9411 (2023) - [j21]Jifei Du, Wen Tian, Xiaopeng Ji, Miao Du, Guangjie Liu, Yuewei Dai, Zhu Han:
Strategic UAV-Assisted Game Model for Detection in Covert Communication. IEEE Trans. Veh. Technol. 72(6): 7426-7438 (2023) - 2022
- [j20]Chenyang Wu, Xiaopeng Ji, Yuewei Dai:
Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j19]Peng Zhai, Taixian Hou, Xiaopeng Ji, Zhiyan Dong, Lihua Zhang:
Robust Adaptive Ensemble Adversary Reinforcement Learning. IEEE Robotics Autom. Lett. 7(4): 12562-12568 (2022) - [c15]Zhize Zhou, Qing Shuai, Yize Wang, Qi Fang, Xiaopeng Ji, Fashuai Li, Hujun Bao, Xiaowei Zhou:
QuickPose: Real-time Multi-view Multi-person Pose Estimation in Crowded Scenes. SIGGRAPH (Conference Paper Track) 2022: 45:1-45:9 - [c14]Di Huang, Xiaopeng Ji, Xingyi He, Jiaming Sun, Tong He, Qing Shuai, Wanli Ouyang, Xiaowei Zhou:
Reconstructing Hand-Held Objects from Monocular Video. SIGGRAPH Asia 2022: 46:1-46:9 - [i2]Qingsong Zhao, Shuguang Dou, Xiaopeng Ji, Xinyang Jiang, Cairong Zhao, Yin Wang:
GSC Loss: A Gaussian Score Calibrating Loss for Deep Learning. CoRR abs/2203.00833 (2022) - [i1]Di Huang, Xiaopeng Ji, Xingyi He, Jiaming Sun, Tong He, Qing Shuai, Wanli Ouyang, Xiaowei Zhou:
Reconstructing Hand-Held Objects from Monocular Video. CoRR abs/2211.16835 (2022) - 2021
- [j18]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. Int. J. Digit. Crime Forensics 13(2): 115-133 (2021) - [j17]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game. IEEE Internet Things J. 8(24): 17372-17381 (2021) - [j16]Xiaopeng Ji, Wen Tian, Weiwei Liu, Guangjie Liu:
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model. J. Ambient Intell. Humaniz. Comput. 12(9): 8859-8866 (2021) - [j15]Xiaopeng Ji, Qingsong Zhao, Jun Cheng, Chenfei Ma:
Exploiting spatio-temporal representation for 3D human action recognition from depth map sequences. Knowl. Based Syst. 227: 107040 (2021) - [j14]Chenfei Ma, Weiyu Guo, Hang Zhang, Oluwarotimi Williams Samuel, Xiaopeng Ji, Lisheng Xu, Guanglin Li:
A Novel and Efficient Feature Extraction Method for Deep Learning Based Continuous Estimation. IEEE Robotics Autom. Lett. 6(4): 7341-7348 (2021) - [j13]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure. IEEE Trans. Smart Grid 12(5): 4259-4268 (2021) - [c13]Yifei Liu, Ning Wang, Zhigang Wang, Xiaodong Wang, Yun Gao, Xiaopeng Ji, Zhiqiang Wei, Jun Qiao:
Differentially Private Linear Regression Analysis via Truncating Technique. WISA 2021: 249-260 - 2020
- [j12]Wen Tian, Xiaopeng Ji, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Shuhua Huang:
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid. IEEE Access 8: 64075-64085 (2020) - [j11]Xiaopeng Ji, Qi Fang, Junting Dong, Qing Shuai, Wen Jiang, Xiaowei Zhou:
A survey on monocular 3D human pose estimation. Virtual Real. Intell. Hardw. 2(6): 471-500 (2020)
2010 – 2019
- 2019
- [j10]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. KSII Trans. Internet Inf. Syst. 13(4): 1866-1883 (2019) - [j9]Yuewei Dai, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai:
An end-to-end generative network for environmental sound-based covert communication. Multim. Tools Appl. 78(7): 8635-8653 (2019) - [j8]Luhui Yang, Jiangtao Zhai, Weiwei Liu, Xiaopeng Ji, Huiwen Bai, Guangjie Liu, Yuewei Dai:
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis. Symmetry 11(2): 176 (2019) - [c12]Qibing Qin, Zhiqiang Wei, Lei Huang, Jie Nie, Xiaopeng Ji:
A Novel Deep Hashing Method with Top Similarity for Image Retrieval. ICASSP 2019: 2067-2071 - [c11]Qingsong Zhao, Shijie Sun, Xiaopeng Ji, Lei Wang, Jun Cheng:
View Invariant Human Action Recognition Using 3D Geometric Features. ICIRA (4) 2019: 564-575 - 2018
- [j7]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network. IEEE Access 6: 48030-48041 (2018) - [j6]Zhao Liu, Shuai Wang, Zhendong Ji, Xiaopeng Ji, Yunyun Xie:
A novel fault-tolerant control for battery-energy-storage system based on cascaded multilevel converter with battery/BMS failure. Microelectron. Reliab. 88-90: 1268-1273 (2018) - [j5]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Networks 2018: 1214681:1-1214681:15 (2018) - [j4]Weiwei Liu, Guangjie Liu, Yang Xia, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. Secur. Commun. Networks 2018: 5051270:1-5051270:16 (2018) - [j3]Xiaopeng Ji, Jun Cheng, Wei Feng, Dapeng Tao:
Skeleton embedded motion body partition for human action recognition using depth sequences. Signal Process. 143: 56-68 (2018) - [c10]Qingsong Zhao, Jun Cheng, Dapeng Tao, Xiaopeng Ji, Lei Wang:
CAS-YNU Multi-modal Cross-view Human Action Dataset. ICIA 2018: 678-683 - 2017
- [j2]Xiaopeng Ji, Jun Cheng, Dapeng Tao, Xinyu Wu, Wei Feng:
The spatial Laplacian and temporal energy pyramid representation for human action recognition using depth sequences. Knowl. Based Syst. 122: 64-74 (2017) - [c9]Liangliang Pan, Jun Cheng, Wei Feng, Xiaopeng Ji:
A Robust RGB-D Image-Based SLAM System. ICVS 2017: 120-130 - [c8]Yi Li, Jun Cheng, Xiaopeng Ji, Wei Feng, Dapeng Tao:
Real-time action recognition by feature-level fusion of depth and inertial sensor. RCAR 2017: 109-114 - 2016
- [c7]Xiaopeng Ji, Zhiqiang Wei, Lei Huang, Yun Gao:
Violation vehicle automated snap and road congestion detection. CCIS 2016: 16-20 - [c6]Xiaopeng Ji, Jun Cheng, Wei Feng:
Spatio-temporal cuboid pyramid for action recognition using depth motion sequences. ICACI 2016: 208-213 - [c5]Xiaohui Huang, Jun Cheng, Xiaopeng Ji:
Human contour extraction from RGBD camera for action recognition. ICIA 2016: 1822-1827 - 2015
- [c4]Xiaopeng Ji, Jun Cheng, Dapeng Tao:
Local mean spatio-temporal feature for depth image-based speed-up action recognition. ICIP 2015: 2389-2393
2000 – 2009
- 2008
- [c3]He Huang, Xiaodong Han, Xiaopeng Ji, Zhiquan Wang:
Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission delays. ICNSC 2008: 325-329 - [c2]Xiaodong Han, He Huang, Xiaopeng Ji, Zhiquan Wang:
Output Feedback Satisfactory Fault-Tolerant Control of Uncertain Linear Discrete-Time Systems. ICNSC 2008: 671-676 - [c1]Xiaopeng Ji, Long Ge, Xiaodong Han, Zhiquan Wang:
Wire-Sizing for Interconnect Performance Optimization Considering High Inductance Effects. ICNSC 2008: 1114-1118 - 2006
- [j1]Xiaopeng Ji, Zhiqiang Wei, Yewei Feng:
Effective vehicle detection technique for traffic surveillance systems. J. Vis. Commun. Image Represent. 17(3): 647-658 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint