Остановите войну!
for scientists:
default search action
Cong Feng
Publications
- 2024
- [j21]Ao Li, Cong Feng, Yuan Cheng, Yingtao Zhang, Hailu Yang:
Incomplete multiview subspace clustering based on multiple kernel low-redundant representation learning. Inf. Fusion 103: 102086 (2024) - [i8]Junjie Huang, Jinyang Liu, Zhuangbin Chen, Zhihan Jiang, Yichen LI, Jiazhen Gu, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems. CoRR abs/2402.17583 (2024) - 2023
- [c35]Si Liu, Yunxia Liu, Guo-Ning Lv, Cong Feng, Hongguo Zhao:
A High-Performance Steganography Algorithm Based on HEVC Standard. ICIC (1) 2023: 522-531 - [c34]Jinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu:
Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services. ISSRE 2023: 36-45 - [c33]Jinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems. ASE 2023: 268-280 - [i7]Jinyang Liu, Junjie Huang, Yintong Huo, Zhihan Jiang, Jiazhen Gu, Zhuangbin Chen, Cong Feng, Minzhi Yan, Michael R. Lyu:
Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop. CoRR abs/2306.05032 (2023) - [i6]Wenwei Gu, Jinyang Liu, Zhuangbin Chen, Jianping Zhang, Yuxin Su, Jiazhen Gu, Cong Feng, Zengyin Yang, Michael R. Lyu:
Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection. CoRR abs/2307.10869 (2023) - [i5]Jinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems. CoRR abs/2308.07638 (2023) - [i4]Jinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu:
Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services. CoRR abs/2308.09937 (2023) - 2022
- [j20]Bin Tan, Saige Xin, Yanshi Hu, Cong Feng, Ming Chen:
LBD: a manually curated database of experimentally validated lymphoma biomarkers. Database J. Biol. Databases Curation 2022(2022) (2022) - [j19]Xiaotian Hu, Cong Feng, Yincong Zhou, Andrew P. Harrison, Ming Chen:
DeepTrio: a ternary prediction system for protein-protein interaction using mask multiple parallel convolutional neural networks. Bioinform. 38(3): 694-702 (2022) - [j18]Yuhao Chen, Yanshi Hu, Xiaotian Hu, Cong Feng, Ming Chen:
CoGO: a contrastive learning framework to predict disease similarity based on gene network and ontology structure. Bioinform. 38(18): 4380-4386 (2022) - [c32]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao:
A Novel DCT-Based Video Steganography Algorithm for HEVC. ICIC (3) 2022: 604-614 - [c31]Cong Feng, Si Liu:
Blockchain Adoption in University Archives Data Management. ICIC (3) 2022: 662-671 - 2021
- [j16]Hongguo Zhao, Yunxia Liu, Yonghao Wang, Si Liu, Cong Feng:
A Video Steganography Method Based on Transform Block Decision for H.265/HEVC. IEEE Access 9: 55506-55521 (2021) - [j15]Md. Asif Ahsan, Yongjing Liu, Cong Feng, Yincong Zhou, Guangyuan Ma, Youhuang Bai, Ming Chen:
Bioinformatics resources facilitate understanding and harnessing clinical research of SARS-CoV-2. Briefings Bioinform. 22(2): 714-725 (2021) - [j14]Cong Feng, Min Dai, Yongjing Liu, Ming Chen:
Sequence repetitiveness quantification and de novo repeat detection by weighted k-mer coverage. Briefings Bioinform. 22(3) (2021) - [j13]Jiaming Wang, Bing Zhu, Pei Liu, Ruiqi Jia, Lijing Jia, Wei Chen, Cong Feng, Jing Li:
Screening Key Indicators for Acute Kidney Injury Prediction Using Machine Learning. Int. J. Comput. Commun. Control 16(3) (2021) - [j12]Md. Asif Ahsan, Yongjing Liu, Cong Feng, Ralf Hofestädt, Ming Chen:
OverCOVID: an integrative web portal for SARS-CoV-2 bioinformatics resources. J. Integr. Bioinform. 18(1): 9-17 (2021) - [c30]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao:
An Efficient Video Steganography Method Based on HEVC. ICIC (1) 2021: 327-336 - [c29]Cong Feng, Si Liu:
Research on Application of Blockchain Technology in Higher Education in China. ICIC (1) 2021: 379-389 - [c28]Cong Feng, Liang Tan, Huan Xiao, Xin Qi, Zheng Wen, Yang Liu:
EDKSAP : Efficient Double-Key Stealth Address Protocol in Blockchain. TrustCom 2021: 1196-1201 - 2020
- [j10]Cong Feng, Qing Wang, Changhua Hu, Li-Gang Gong:
Active Disturbance Rejection Attitude Control for Flapping Wing Micro Aerial Vehicle With Nonaffine-in-Control Characteristics. IEEE Access 8: 20013-20027 (2020) - [j9]Xiaohui Liang, Qing Wang, Changhua Hu, Zhi-Jie Zhou, Cong Feng:
Self-Healing Control for Large Launch Vehicle Based on Extended State Observer and Adaptive Dynamic Programming. IEEE Access 8: 43013-43026 (2020) - [j8]Cong Feng, Qing Wang, Chen Liu, Changhua Hu, Xiaohui Liang:
Variable-Structure Near-Space Vehicles with Time-Varying State Constraints Attitude Control Based on Switched Nonlinear System. Sensors 20(3): 848 (2020) - [j7]Cong Feng, Qing Wang, Changhua Hu, Shen Zhang:
Finite-time backstepping control with command filter for a class of nonlinear systems with parametric uncertainties. Trans. Inst. Meas. Control 42(12): 2297-2307 (2020) - [c27]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao, Yu Huang:
A HEVC Steganography Method Based on QDCT Coefficient. ICIC (3) 2020: 624-632 - [c26]Yongqiang Zhao, Yuan Rao, Lianwei Wu, Cong Feng:
Image Captioning Algorithm Based on Sufficient Visual Information and Text Information. ICONIP (5) 2020: 607-615 - [c23]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao, Yu Huang:
Blockchain Privacy Data Protection Method Based on HEVC Video Steganography. SmartBlock 2020: 39-44 - 2019
- [c22]Si Liu, Yunxia Liu, Zipei Wang, Cong Feng, Hongguo Zhao:
Privacy Protection Oriented Video Data Hiding Method. BigDataSecurity/HPSC/IDS 2019: 90-95 - [c21]Cong Feng, Qing Wang, Shen Zhang:
Adaptive Fuzzy Sliding Mode Control for a Flexible Air-breathing Hypersonic Vehicle Based on Tracking Differentiator. CAA SAFEPROCESS 2019: 731-738 - [c20]Yao Zhang, Feiqiang Li, Xiao Hu, Tong Zhang, Cong Feng, Ke Song:
Fuel cell air supply system control based on oxygen excess ratio. IECON 2019: 6394-6397 - 2018
- [j4]Yunxia Liu, Hongguo Zhao, Shuyang Liu, Cong Feng, Si Liu:
A Robust and Improved Visual Quality Data Hiding Method for HEVC. IEEE Access 6: 53984-53997 (2018) - [j3]Jieyu Zhan, Xudong Luo, Cong Feng, Minghua He:
A multi-demand negotiation model based on fuzzy rules elicited via psychological experiments. Appl. Soft Comput. 67: 840-864 (2018) - [c18]Si Liu, Yunxia Liu, Guo-Ning Lv, Cong Feng, Hongguo Zhao:
Hiding Bitcoin Transaction Information Based on HEVC. SmartBlock 2018: 1-11 - 2017
- [c16]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao:
A Reversible Data Hiding Method Based on HEVC Without Distortion Drift. ICIC (3) 2017: 613-624 - [c15]Yunxia Liu, Shuyang Liu, Hongguo Zhao, Si Liu, Cong Feng:
A Data Hiding Method for H.265 Without Intra-frame Distortion Drift. ICIC (3) 2017: 642-650 - [c14]Cong Feng, Hui Li:
Detection of periodic components from intrinsic mode function. SMC 2017: 2516-2520 - 2016
- [c12]Si Liu, Guo-Ning Lv, Cong Feng:
Event Space-Correlation Analysis Algorithm Based on Ant Colony Optimization. ICIC (1) 2016: 563-570 - 2014
- [c10]Jieyu Zhan, Xudong Luo, Cong Feng, Wenjun Ma:
A fuzzy logic based bargaining model in discrete domains: Axiom, elicitation and property. FUZZ-IEEE 2014: 424-431 - [c9]Si Liu, Cong Feng, Ming-Sheng Hu, Zhi-Juan Jia:
Community Detection Method of Complex Network Based on ACO Pheromone of TSP. ICIC (2) 2014: 763-770 - [c8]Si Liu, Cong Feng, Zhi-Juan Jia, Ming-Sheng Hu:
Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing. ICIC (2) 2014: 771-778 - [c7]Suimin Jia, Yun-Ye Wang, Cong Feng, Zhijuan Jia, Ming-Sheng Hu:
Cascading Failures in Power Grid under Three Node Attack Strategies. ICIC (2) 2014: 779-786 - [c6]Zhi-Juan Jia, Yu Zhang, Cong Feng, Ming-Sheng Hu:
Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid. ICIC (2) 2014: 787-794 - [c5]Cong Feng, Keng Lin Wong, Max Q.-H. Meng, Hongliang Ren:
Drilling pattern analysis of femur bone based on inertial measurement unit signal. ICIA 2014: 841-845 - 2013
- [c4]Jieyu Zhan, Xudong Luo, Kwang Mong Sim, Cong Feng, Youzhi Zhang:
A Fuzzy Logic Based Model of a Bargaining Game. KSEM 2013: 387-403 - 2011
- [c2]Nan Bao, Cong Feng, Yan Kang, Lisheng Xu, Yuhang Du, Lei Zhang, Feifei Yang, Qingchao Li:
A Method with Triaxial Acceleration Sensor for Fall Detection of the Elderly in Daily Activities. HCI (7) 2011: 121-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint