default search action
Cheng Cao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Cheng Cao, Hao Wang, Jin-Rong Yang, Qiang Chen, Ya-Min Guo, Jian-Zhong Chen:
MCPNET: Development of an interpretable deep learning model based on multiple conformations of the compound for predicting developmental toxicity. Comput. Biol. Medicine 171: 108037 (2024) - [j14]Yiming Ouyang, Cheng Cao, Qi Wang, Zhengfeng Huang:
Applying SMART-Based Power Gating Approach in NoC System. J. Circuits Syst. Comput. 33(10) (2024) - [j13]Zemeng Huang, Xiuping Li, Yubing Li, Kai Yue, Hongjie Zeng, Cheng Cao, Yujia Chen:
Knowledge-Aided Automated Synthesis for Broadband Power Amplifier With Transformer-Coupled Resonators. IEEE Trans. Circuits Syst. I Regul. Pap. 71(10): 4472-4485 (2024) - [j12]Huihui Chen, Yong Ma, Wentao Hu, Cheng Cao:
Time and Risk Optimal Path Planning for Surface Vehicle via Level Set in Dynamic Environment. IEEE Trans. Ind. Informatics 20(6): 8639-8649 (2024) - [j11]Yiming Ouyang, Cheng Cao, Dongyu Xu, Wu Zhou, Zhengfeng Huang, Huaguo Liang:
DBU-PG: energy-efficient noc design using dual-buffering power gating. J. Supercomput. 80(10): 13632-13656 (2024) - [c18]Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis:
Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models. AAAI 2024: 21779-21787 - [c17]Mengxiang Wang, Cheng Cao:
The Identification and Classification of Abnormal Collocations in Network Micro-language. IALP 2024: 247-250 - 2023
- [c16]Felicia Guo, Nayiri Krzysztofowicz, Alex Moreno, Jeffrey Ni, Daniel Lovell, Yufeng Chi, Kareem Ahmad, Sherwin Afshar, Josh Alexander, Dylan Brater, Cheng Cao, Daniel Fan, Ryan Lund, Jackson Paddock, Griffin Prechter, Troy Sheldon, Shreesha Sreedhara, Anson Tsai, Eric Wu, Kerry Yu, Daniel Fritchman, Aviral Pandey, Ali Niknejad, Kristofer S. J. Pister, Borivoje Nikolic:
A Heterogeneous SoC for Bluetooth LE in 28nm. HCS 2023: 1-11 - [c15]Jian Gao, Hanbo Sun, Cheng Cao, Zheng Du:
Human Transcription Quality Improvement. INTERSPEECH 2023: 3053-3057 - [i3]Hanbo Sun, Jian Gao, Xiaomin Wu, Anjie Fang, Cheng Cao, Zheng Du:
HTEC: Human Transcription Error Correction. CoRR abs/2309.10089 (2023) - [i2]Jian Gao, Hanbo Sun, Cheng Cao, Zheng Du:
Human Transcription Quality Improvement. CoRR abs/2309.14372 (2023) - [i1]Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis:
Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models. CoRR abs/2312.08303 (2023) - 2022
- [j10]Cheng Cao, Yubing Li, Zhe Wang, Zemeng Huang, Tao Tan, Deyang Chen, Xiuping Li:
CMOS X-band pole-converging triple-cascode LNA with low-noise and wideband performance. IET Circuits Devices Syst. 16(1): 26-39 (2022) - [j9]Umair Yasir, Xiuping Li, Cheng Cao:
Low power ASK modulator based on direct injection-locked current reuse VCO in 130-nm CMOS technology for high data rate RFID applications. Int. J. Circuit Theory Appl. 50(1): 56-71 (2022) - [j8]Umair Yasir, Xiuping Li, Cheng Cao, Tao Tan:
A low-power amplitude shift keying modulator based on adaptive body-biased injection-locked current-reuse voltage controlled oscillator for high data rate radio frequency identification applications. Int. J. Circuit Theory Appl. 50(10): 3584-3593 (2022) - [c14]Weiqing Li, Jingyi Zhang, Yaping Qiu, Cheng Cao:
An Applied Research of Big Data in the Work of Higher Education Students: Taking the Analysis of Finding Loneliness and Their Characteristics as an Example. ICCIR 2022: 789-793 - 2021
- [c13]Cheng Cao, Mu Zhang:
Credit Risk Evaluation of Quantum Communications Listed Companies in China Based on Fermatean Fuzzy TOPSIS. ITQM 2021: 361-368 - 2020
- [j7]Cheng Cao, Hongquan Chen, Jiale Zhang:
Preconditioned gridless methods for solving three-dimensional Euler equations at low Mach numbers. Int. J. Model. Simul. Sci. Comput. 11(6): 2050055:1-2050055:21 (2020) - [c12]Xinghua Li, Cheng Cao, Yongsheng Yin:
Risk Analysis of ERP in FY Coal-fired Power Enterprises. ICMSS 2020: 190-194
2010 – 2019
- 2019
- [j6]Cheng Cao, Hong-Quan Chen, Jia-Le Zhang, Shengguan Xu:
A multi-layered point reordering study of GPU-based meshless method for compressible flow simulations. J. Comput. Sci. 33: 45-60 (2019) - 2018
- [j5]Jia-Le Zhang, Zhihua Ma, Hong-Quan Chen, Cheng Cao:
A GPU-accelerated implicit meshless method for compressible flows. J. Comput. Phys. 360: 39-56 (2018) - [c11]Cheng Cao, Zhengzhang Chen, James Caverlee, Lu-An Tang, Chen Luo, Zhichun Li:
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks. CIKM 2018: 1977-1985 - [c10]Ying Lin, Zhengzhang Chen, Cheng Cao, Lu-An Tang, Kai Zhang, Wei Cheng, Zhichun Li:
Collaborative Alert Ranking for Anomaly Detection. CIKM 2018: 1987-1995 - 2017
- [j4]Zhe Liu, Xiaopeng Yu, Teng-long Fan, Cheng Cao, Wen-quan Sui:
A Bridged Contactless Measurement Technique for LC Tank Based Voltage-Controlled Oscillator. J. Electron. Test. 33(2): 261-266 (2017) - [j3]Zhiwei Wang, Cheng Cao, Nianhua Yang, Victor Chang:
ABE with improved auxiliary input for big data security. J. Comput. Syst. Sci. 89: 41-50 (2017) - [j2]Kai Yao, Cheng Cao, Siwen Yang:
Noninvasive Online Condition Monitoring of Output Capacitor's ESR and C for a Flyback Converter. IEEE Trans. Instrum. Meas. 66(12): 3190-3199 (2017) - [j1]Maojin Xia, Qingshan Wang, Qi Wang, Cheng Cao, Lifang Wang, Hao Guo:
Two-Level Community-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 96(4): 5687-5704 (2017) - [c9]Ron Wakkary, Doenja Oogjes, Sabrina Hauser, Henry W. J. Lin, Cheng Cao, Leo Ma, Tijs Duel:
Morse Things: A Design Inquiry into the Gap Between Things and Us. Conference on Designing Interactive Systems 2017: 503-514 - [c8]Nguyen Vo, Kyumin Lee, Cheng Cao, Thanh Tran, Hongkyu Choi:
Revealing and Detecting Malicious Retweeter Groups. ASONAM 2017: 363-368 - [c7]Cheng Cao, Hancheng Ge, Haokai Lu, Xia Hu, James Caverlee:
What Are You Known For?: Learning User Topical Profiles with Implicit and Explicit Footprints. SIGIR 2017: 743-752 - 2015
- [c6]Cheng Cao, James Caverlee, Kyumin Lee, Hancheng Ge, Jin-Wook Chung:
Organic or Organized?: Exploring URL Sharing Behavior. CIKM 2015: 513-522 - [c5]Yuan Liang, James Caverlee, Cheng Cao:
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media. ECIR 2015: 233-244 - [c4]Cheng Cao, James Caverlee:
Detecting Spam URLs in Social Media via Behavioral Analysis. ECIR 2015: 703-714 - 2014
- [c3]Cheng Cao, James Caverlee:
Behavioral detection of spam URL sharing: Posting patterns versus click patterns. ASONAM 2014: 138-141 - 2012
- [c2]Cheng Cao, Zeynep Akalin Acar, Kenneth Kreutz-Delgado, Scott Makeig:
A physiologically motivated sparse, compact, and smooth (SCS) approach to EEG source localization. EMBC 2012: 1546-1549
2000 – 2009
- 2009
- [c1]Hongche Guo, Cheng Cao, Junyou Yang, Qiuhao Zhang:
Research on Obstacle-Avoidance Control Algorithm of Lower Limbs Rehabilitation Robot Based on Fuzzy Control. FSKD (4) 2009: 151-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint