default search action
Caidan Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j9]Caidan Zhao, Jingqian Chen, Xiangyu Huang, Zhiqiang Wu:
A Cross-Scale Embedding Based Fusion Transformer for Automatic Modulation Recognition. IEEE Commun. Lett. 28(1): 68-72 (2024) - 2021
- [j8]Caidan Zhao, Gege Luo, Yilin Wang, Caiyun Chen, Zhiqiang Wu:
UAV Recognition Based on Micro-Doppler Dynamic Attribute-Guided Augmentation Algorithm. Remote. Sens. 13(6): 1205 (2021) - 2020
- [j7]Junjie Deng, Gege Luo, Caidan Zhao:
UCT-GAN: underwater image colour transfer generative adversarial network. IET Image Process. 14(14): 3613-3622 (2020) - 2017
- [j6]Caidan Zhao, Minmin Huang, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks. Comput. Networks 128: 164-171 (2017) - [j5]Caidan Zhao, Lianfen Huang, Yifeng Zhao, Xiaojiang Du:
Secure Machine-Type Communications toward LTE Heterogeneous Networks. IEEE Wirel. Commun. 24(1): 82-87 (2017) - 2015
- [j4]Weijian Xu, Caidan Zhao, Hua-Pei Chiang, Lianfen Huang, Yueh-Min Huang:
The RR-PEVQ algorithm research based on active area detection for big data applications. Multim. Tools Appl. 74(10): 3507-3520 (2015) - 2014
- [j3]Caidan Zhao, Lianfen Huang, Zi-Long Gao, Sha-Li Zhou, Dan Guo, Han-Chieh Chao:
Performance Analysis of the Multiple Antenna Asynchronous Cognitive MAC Protocol in Cognitive Radio Network for IT Convergence. Intell. Autom. Soft Comput. 20(1): 61-75 (2014) - 2013
- [j2]Caidan Zhao, Liang Xiao, Shan Kang, Guiquan Chen, Yunzhou Li, Lianfen Huang:
Secure relay selection based on learning with negative externality in wireless networks. EURASIP J. Adv. Signal Process. 2013: 89 (2013) - [j1]Caidan Zhao, Ting-Yun Chi, Lianfen Huang, Yan Yao, Sy-Yen Kuo:
Wireless local area network cards identification based on transient fingerprinting. Wirel. Commun. Mob. Comput. 13(7): 711-718 (2013)
Conference and Workshop Papers
- 2024
- [c25]Caidan Zhao, Xiang Li, Chenxing Gao, Zhiqiang Wu:
Video Anomaly Detection Framework Based on Motion Consistency. CSCWD 2024: 802-807 - [c24]Jinhui Yu, Caidan Zhao, Xiangyu Huang, Yicheng Zheng:
RF Fingerprint Recognition for Different Receiving Devices Using Transfer Learning. CSCWD 2024: 1887-1892 - [c23]Xiang Li, Caidan Zhao, Chenxing Gao, Wenxin Hu:
Anomalous Sound Detection Framework Based on Masking Strategy. ICIC (LNAI 6) 2024: 287-298 - [c22]Jingqian Chen, Caidan Zhao, Xiangyu Huang, Zhiqiang Wu:
Data Augmentation Aided Automatic Modulation Recognition Using Diffusion Model. WCNC 2024: 1-6 - 2023
- [c21]Chenxing Gao, Lingjun Chen, Caidan Zhao, Xiangyu Huang, Zhiqiang Wu:
Lightweight Image Dehazing Algorithm Based on Detail Feature Enhancement. CSCWD 2023: 1538-1543 - [c20]Xiangyu Huang, Caidan Zhao, Chenxing Gao, Lvdong Chen, Zhiqiang Wu:
Synthetic Pseudo Anomalies for Unsupervised Video Anomaly Detection: A Simple Yet Efficient Framework Based on Masked Autoencoder. ICASSP 2023: 1-5 - [c19]Xiangyu Huang, Caidan Zhao, Zhiqiang Wu:
A Video Anomaly Detection Framework Based on Appearance-Motion Semantics Representation Consistency. ICASSP 2023: 1-5 - [c18]Xiangyu Huang, Caidan Zhao, Jinhui Yu, Chenxing Gao, Zhiqiang Wu:
Multi-Level Memory-Augmented Appearance-Motion Correspondence Framework for Video Anomaly Detection. ICME 2023: 2717-2722 - [c17]Xiaolin Fan, Caidan Zhao, Liang Xiao, Yang Lei:
Redistillation of Radio Frequency Knowledge for RFF Imbalanced Sample Recognition. SMC 2023: 2391-2396 - [c16]Xiaolin Fan, Caidan Zhao, Liang Xiao, Xiangyu Huang:
Random Railings Enhancement For RFF Imbalanced Data Augmentation. WCNC 2023: 1-6 - 2022
- [c15]Lingjun Chen, Caidan Zhao, Yilin Wang, Xiangyu Huang:
Dust Image Enhancement Algorithm Based on Feature Transformation. CACML 2022: 342-348 - [c14]Xiangyu Huang, Junjie Deng, Xi Wang, Peiyun Zhuang, Lianfen Huang, Caidan Zhao:
Automatic Glottis Segmentation Method Based on Lightweight U-net. PRCV (2) 2022: 89-100 - 2021
- [c13]Yang Lei, Caidan Zhao, Yilin Wang, Yicheng Zheng, Lei Zhang:
Security Authentication of Smart Grid Based on RFF. ICA3PP (3) 2021: 362-375 - [c12]Yilin Wang, Caidan Zhao, Gege Luo:
A lightweight UAV recognition algorithm based on micro-Doppler features. ICCC 2021: 6-10 - [c11]Lvdong Chen, Caidan Zhao, Yicheng Zheng, Yilin Wang:
Radio Frequency Fingerprint Identification Based on Transfer Learning. ICCC 2021: 81-85 - [c10]Caidan Zhao, Yang Lei:
Intra-Class Cutmix for Unbalanced Data Augmentation. ICMLC 2021: 246-251 - [c9]Lingjun Chen, Caidan Zhao, Yunyi Liu, Peiyun Zhuang:
A Multi-Modal Joint Voice Parts Division Method Based On Deep Learning. ISMICT 2021: 35-40 - 2020
- [c8]Junjie Deng, Gege Luo, Caidan Zhao:
A New Bearing-Fault Classification Method Based on Deep Learning*. ICCSE 2020: 191-196 - [c7]Caidan Zhao, Zeping He, Gege Luo, Caiyun Chen:
An Intelligent Maritime Communication Signal Recognition Algorithm based on ACWGAN. ICCSE 2020: 197-201 - 2019
- [c6]Caidan Zhao, Mingxian Shi, Minmin Huang, Xiaojiang Du:
Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network. ICC 2019: 1-6 - 2018
- [c5]Caidan Zhao, Caiyun Chen, Zhibiao Cai, Mingxian Shi, Xiaojiang Du, Mohsen Guizani:
Classification of Small UAVs Based on Auxiliary Classifier Wasserstein GANs. GLOBECOM 2018: 206-212 - [c4]Caidan Zhao, Zhibiao Cai, Minmin Huang, Mingxian Shi, Xiaojiang Du, Mohsen Guizani:
The Identification of Secular Variation in IoT Based on Transfer Learning. ICNC 2018: 878-882 - 2017
- [c3]Zhiyuan Shi, Minmin Huang, Caidan Zhao, Lianfen Huang, Xiaojiang Du, Yifeng Zhao:
Detection of LSSUAV using hash fingerprint based SVDD. ICC 2017: 1-5 - 2016
- [c2]Caidan Zhao, Mengsiyun Tai, Lianfen Huang, Minmin Huang, Xiaojiang Du:
Power Optimization for Secure Communications in Full-Duplex System under Residual Self-Interference. GLOBECOM 2016: 1-6 - [c1]Caidan Zhao, Zhibiao Cai, Yifeng Zhao, Mingjun Shi, Jun Geng:
HEVC video quality assessment database toward LTE system. ICCSE 2016: 357-362
Informal and Other Publications
- 2023
- [i5]Xiangyu Huang, Caidan Zhao, Zhiqiang Wu:
Updated version: A Video Anomaly Detection Framework based on Appearance-Motion Semantics Representation Consistency. CoRR abs/2303.05109 (2023) - [i4]Xiangyu Huang, Caidan Zhao, Chenxing Gao, Lvdong Chen, Zhiqiang Wu:
Synthetic Pseudo Anomalies for Unsupervised Video Anomaly Detection: A Simple yet Efficient Framework based on Masked Autoencoder. CoRR abs/2303.05112 (2023) - [i3]Xiangyu Huang, Caidan Zhao, Jinghui Yu, Chenxing Gao, Zhiqiang Wu:
Multi-level Memory-augmented Appearance-Motion Correspondence Framework for Video Anomaly Detection. CoRR abs/2303.05116 (2023) - 2022
- [i2]Xiangyu Huang, Caidan Zhao, Yilin Wang, Zhiqiang Wu:
A Video Anomaly Detection Framework based on Appearance-Motion Semantics Representation Consistency. CoRR abs/2204.04151 (2022) - 2019
- [i1]Caidan Zhao, Mingxian Shi, Minmin Huang, Xiaojiang Du:
Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network. CoRR abs/1902.03683 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint