Shu-Tao Xia
Shu-Tao Xia
Verified email at sz.tsinghua.edu.cn
Title
Cited by
Cited by
Year
Slimmable neural networks
J Yu, L Yang, N Xu, J Yang, T Huang
arXiv preprint arXiv:1812.08928, 2018
2572018
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50 (2), 163-172, 2009
1102009
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE conference on computer vision and pattern …, 2019
972019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, SM Erfani, ST Xia, S Wijewickrema, ...
arXiv preprint arXiv:1806.02612, 2018
952018
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
792018
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
382014
Some results on optimal locally repairable codes
J Hao, ST Xia, B Chen
2016 IEEE International Symposium on Information Theory (ISIT), 440-444, 2016
352016
Constructions of quasi-cyclic measurement matrices based on array codes
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 479-483, 2013
322013
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
302017
Entropy-based bilateral filtering with a new range kernel
T Dai, W Lu, W Wang, J Wang, ST Xia
Signal Processing 137, 223-234, 2017
292017
On the stopping distance of finite geometry LDPC codes
ST Xia, FW Fu
IEEE communications letters 10 (5), 381-383, 2006
292006
Minimum pseudoweight and minimum pseudocodewords of LDPC codes
ST Xia, FW Fu
IEEE transactions on information theory 54 (1), 480-485, 2008
262008
Improved analysis for subspace pursuit algorithm in terms of restricted isometry constant
CB Song, ST Xia, XJ Liu
IEEE Signal Processing Letters 21 (11), 1365-1369, 2014
252014
Reconstruction guarantee analysis of binary measurement matrices based on girth
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 474-478, 2013
242013
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2016
232016
Constructions of optimal binary locally repairable codes with multiple repair groups
J Hao, ST Xia
IEEE Communications Letters 20 (6), 1060-1063, 2016
232016
The problems and solutions of network update in SDN: A survey
S Wang, D Li, S Xia
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
232015
Design and analysis of SEIQR worm propagation model in mobile internet
X Xiao, P Fu, C Dou, Q Li, G Hu, S Xia
Communications in nonlinear science and numerical simulation 43, 341-350, 2017
222017
Bounds and constructions of locally repairable codes: Parity-check matrix approach
J Hao, ST Xia, KW Shum, B Chen, FW Fu, YX Yang
arXiv preprint arXiv:1601.05595, 2016
212016
Structured non-binary LDPC codes with large girth
X Ge, ST Xia
Electronics Letters 43 (22), 1220-1222, 2007
202007
The system can't perform the operation now. Try again later.
Articles 1–20