Shu-Tao Xia
Shu-Tao Xia
Verified email at sz.tsinghua.edu.cn
Title
Cited by
Cited by
Year
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE conference on computer vision and pattern …, 2019
2172019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, SM Erfani, ST Xia, S Wijewickrema, ...
arXiv preprint arXiv:1806.02612, 2018
1392018
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
1152018
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50 (2), 163-172, 2009
1152009
Some results on optimal locally repairable codes
J Hao, ST Xia, B Chen
2016 IEEE International Symposium on Information Theory (ISIT), 440-444, 2016
462016
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
432017
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
402014
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2016
322016
Constructions of quasi-cyclic measurement matrices based on array codes
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 479-483, 2013
322013
Entropy-based bilateral filtering with a new range kernel
T Dai, W Lu, W Wang, J Wang, ST Xia
Signal Processing 137, 223-234, 2017
302017
On the stopping distance of finite geometry LDPC codes
ST Xia, FW Fu
IEEE communications letters 10 (5), 381-383, 2006
302006
Bounds and constructions of locally repairable codes: Parity-check matrix approach
J Hao, ST Xia, KW Shum, B Chen, FW Fu, YX Yang
arXiv preprint arXiv:1601.05595, 2016
28*2016
Improved analysis for subspace pursuit algorithm in terms of restricted isometry constant
CB Song, ST Xia, XJ Liu
IEEE Signal Processing Letters 21 (11), 1365-1369, 2014
272014
Minimum pseudoweight and minimum pseudocodewords of LDPC codes
ST Xia, FW Fu
IEEE transactions on information theory 54 (1), 480-485, 2008
272008
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
262017
A survey of network update in SDN
D Li, S Wang, K Zhu, S Xia
Frontiers of Computer Science 11 (1), 4-12, 2017
252017
Reconstruction guarantee analysis of binary measurement matrices based on girth
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 474-478, 2013
252013
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
242020
Design and analysis of SEIQR worm propagation model in mobile internet
X Xiao, P Fu, C Dou, Q Li, G Hu, S Xia
Communications in nonlinear science and numerical simulation 43, 341-350, 2017
242017
Constructions of optimal binary locally repairable codes with multiple repair groups
J Hao, ST Xia
IEEE Communications Letters 20 (6), 1060-1063, 2016
242016
The system can't perform the operation now. Try again later.
Articles 1–20