default search action
Gang Hou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Huanzhang Xiong, Gang Hou, Yueyuan Qin, Jie Wang, Weiqiang Kong:
A Dual Relaxation Method for Neural Network Verification. Int. J. Softw. Eng. Knowl. Eng. 34(8): 1199-1220 (2024) - 2023
- [c26]Huanzhang Xiong, Gang Hou, Long Zhu, Jie Wang, Weiqiang Kong:
A Single-sample Pruning and Clustering Method for Neural Network Verification. APSEC 2023: 319-328 - 2022
- [j15]Jie Wang, Xintao Wu, Gang Hou, Pengfei Li, Ao Gao, Zhichao Chen, Haoyu Gao:
Modeling and reliability verification of industrial control network protocol based on time state transition matrix. Int. J. Commun. Syst. 35(9) (2022) - 2021
- [j14]Huihui Wu, Deyun Lv, Tengxiang Cui, Gang Hou, Masahiko Watanabe, Weiqiang Kong:
SDLV: Verification of Steering Angle Safety for Self-Driving Cars. Formal Aspects Comput. 33(3): 325-341 (2021) - [c25]Jie Wang, Zhichao Chen, Gang Hou, Haoyu Gao, Pengfei Li, Ao Gao, Xintao Wu:
A Modeling and Verification Method of Modbus TCP/IP Protocol. ICA3PP (3) 2021: 527-539 - 2020
- [j13]Quan Cai, Si-Yao Du, Si Gao, Guo-Liang Huang, Zheng Zhang, Shu Li, Xin Wang, Pei-Ling Li, Peng Lv, Gang Hou, Lina Zhang:
A model based on CT radiomic features for predicting RT-PCR becoming negative in coronavirus disease 2019 (COVID-19) patients. BMC Medical Imaging 20(1): 118 (2020) - [j12]Gang Hou, Lizhu Chen:
D2D communication mode selection and resource allocation in 5G wireless networks. Comput. Commun. 155: 244-251 (2020) - [c24]Zhen Wang, Xiaoning Han, Weiqiang Kong, Yong Piao, Gang Hou, Masahiko Watanabe, Akira Fukuda:
A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features. TASE 2020: 193-200
2010 – 2019
- 2019
- [j11]Jie Wang, Junjie Kang, Gang Hou:
Real-Time Fault Repair Scheme Based on Improved Genetic Algorithm. IEEE Access 7: 35805-35815 (2019) - [j10]Shuo Chen, Mixing Liu, Jing Liu, Lingmin Kong, Wenbin Xu, Gang Hou, Liping Xie, Xiaoyu Cui:
High Spectral Resolution Raman Measurements Using Light-Emitting Diode as Excitation Based on Weighted Spectral Reconstruction Method. IEEE Access 7: 134828-134837 (2019) - [c23]Yuan Yuan, Weiqiang Kong, Gang Hou, Yan Hu, Masahiko Watanabe, Akira Fukuda:
From Local to Global Semantic Clone Detection. DSA 2019: 13-24 - [c22]Kun Liu, Xiaozhen Zhang, Weiqiang Kong, Gang Hou, Masahiko Watanabe, Akira Fukuda:
Interpolation-Based Multi-core Bounded Model Checking of HSTM Designs. DSA 2019: 25-36 - [c21]Jie Wang, Shuangmin Deng, Junjie Kang, Gang Hou, Kuanjiu Zhou, Chi Lin:
A Real-Time Fault Location Mechanism Combining CGP Code and Deep Learning. DSA 2019: 311-316 - [c20]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Chi Lin:
Non-Deterministic Behavior Analysis for Embedded Software Based on Probabilistic Model Checking. ICPADS 2019: 844-851 - [c19]Jie Wang, Junjie Kang, Gang Hou:
Real-Time System Fault-Tolerant Scheme Based on Improved Chaotic Genetic Algorithm. WISATS (2) 2019: 145-156 - [c18]Xiaozhen Zhang, Weiqiang Kong, Jianguo Jiang, Gang Hou, Akira Fukuda:
Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration. TASE 2019: 113-120 - 2018
- [j9]Fei Ye, Gang Hou, Yina Li, Shaoling Fu:
Managing bioethanol supply chain resiliency: a risk-sharing model to mitigate yield uncertainty risk. Ind. Manag. Data Syst. 118(7): 1510-1527 (2018) - [c17]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Xun Cao, Akira Fukuda:
Analysis of Interrupt Behavior Based on Probabilistic Model Checking. IIAI-AAI 2018: 86-91 - [c16]Kun Liu, Weiqiang Kong, Gang Hou, Akira Fukuda:
A Survey of Formal Techniques for Hardware/Software Co-verification. IIAI-AAI 2018: 125-128 - 2017
- [j8]Gang Hou, Kuanjiu Zhou, Tie Qiu, Weiqiang Kong, Mingchu Li:
Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN. IEEE Access 5: 5178-5189 (2017) - [j7]Xin Chen, Feng Ding, Tiantian Zhang, Gang Hou, Lan Lan:
A Cost-Optimized Resource Provisioning Policy for Heterogeneous Cloud Environments. IEEE Access 5: 26681-26689 (2017) - [j6]Shenglan Liu, Lin Feng, Jun Wu, Gang Hou, Guangjie Han:
Concept drift detection for data stream learning based on angle optimized global embedding and principal component analysis in sensor networks. Comput. Electr. Eng. 58: 327-336 (2017) - [j5]Gang Hou, Kuanjiu Zhou, Tie Qiu, Xun Cao, Mingchu Li, Jie Wang:
A novel green software evaluation model for cloud robotics. Comput. Electr. Eng. 63: 139-156 (2017) - [j4]Haoran Liang, Kuanjiu Zhou, Kai Cui, Jie Pan, Gang Hou:
基于PEFSM行为模型的黑盒测试用例生成方法 (Black-box Test Case Generation Method Based on PEFSM Behavioral Model). 计算机科学 44(4): 234-240 (2017) - 2016
- [j3]Weiqiang Kong, Gang Hou, Xiangpei Hu, Takahiro Ando, Kenji Hisazumi, Akira Fukuda:
Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC. J. Inf. Secur. Appl. 31: 61-74 (2016) - [j2]Jie Wang, Siguang Hang, Jiwei Liu, Weihao Chen, Gang Hou:
Multi-level Scheduling Algorithm Based on Storm. KSII Trans. Internet Inf. Syst. 10(3): 1091-1110 (2016) - [c15]Weiqiang Kong, Gang Hou, Xiangpei Hu, Yasuhito Arimoto, Masahiko Watanabe, Takahiro Ando, Kenji Hisazumi, Akira Fukuda:
ZipPath: A Simple-But-Useful Path Finder for HSTM Designs in ZIPC. ICA 2016: 154-157 - [c14]Gang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, Mingchu Li:
ETSTM: A New Green Software Model. Trustcom/BigDataSE/ISPA 2016: 1825-1830 - 2015
- [c13]Gang Hou, Yinfeng Ban, Kuanjiu Zhou, Jie Wang, Mingchu Li, Zihao Liao:
Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling. FCST 2015: 34-39 - [c12]Jie Wang, Jiwei Liu, Bin Feng, Gang Hou:
The Dynamic Evaluation Strategy for Evolvable Hardware. FCST 2015: 91-95 - [c11]Jie Wang, Weihao Chen, Gang Hou:
Parallel Computing Method for HRV Time-Domain Based on GPU. ICA3PP (2) 2015: 434-443 - [c10]Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou:
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set. IMIS 2015: 213-220 - 2013
- [c9]Gang Hou, Kuanjiu Zhou, Junwang Chang, Rui Li, Mingchu Li:
Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets. APPT 2013: 62-76 - [c8]Kuanjiu Zhou, Jiawei Yong, Xiaolong Wang, Longtao Ren, Gang Hou, Junwang Chang:
Accelerating Software Model Checking Based on Program Backbone. APPT 2013: 347-358 - [c7]Gang Hou, Ke Zhang, Xiaoxue Zhang, Jun Kong, Ming Zhang:
A Novel Image Retrieval Method Based on Mutual Information Descriptors. ICIC (2) 2013: 435-442 - 2012
- [j1]Kuanjiu Zhou, Xiaolong Wang, Gang Hou, Jie Wang, Shanbin Ai:
Software Reliability Test Based on Markov Usage Model. J. Softw. 7(9): 2061-2068 (2012) - 2011
- [c6]Yu Zhou, Tie Qiu, Feng Xia, Gang Hou:
N-Times Trilateral Centroid Weighted Localization Algorithm of Wireless Sensor Networks. iThings/CPSCom 2011: 351-357
2000 – 2009
- 2007
- [c5]Gang Hou, Kuanjiu Zhou, Yang Tian:
Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time. KSEM 2007: 562-567 - 2006
- [c4]Shaoqiang Zhang, Chunyong Ding, Gang Hou:
Resource and Bandwidth Allocation on a Computational Grid with Tree Topology. GCC 2006: 42-45 - [c3]Jialing Han, Jun Kong, Yinghua Lu, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks. ICONIP (3) 2006: 225-233 - [c2]Yinghua Lu, Jialing Han, Jun Kong, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks. RSCTC 2006: 806-814 - 2005
- [c1]Yinghua Lu, Wei Wang, Jun Kong, Jialing Han, Gang Hou:
Joint Spatial and Frequency Domains Watermarking Algorithm Based on Wavelet Packets. Australian Conference on Artificial Intelligence 2005: 934-937
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint