default search action
Haibo Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Pan Pan, Yue Wang, Chang Liu, Yanhui Tu, Haibo Cheng, Qingyun Yang, Fei Xie, Yuan Li, Lixin Xie, Yuhong Liu:
Revisiting the potential value of vital signs in the real-time prediction of mortality risk in intensive care unit patients. J. Big Data 11(1): 53 (2024) - [j9]Haibo Cheng, Yunpeng He, Peng Zeng, Valeriy Vyatkin:
Residual-Enhanced Physics-Guided Machine Learning With Hard Constraints for Subsurface Flow in Reservoir Engineering. IEEE Trans. Geosci. Remote. Sens. 62: 1-9 (2024) - [j8]Baikai Sui, Yungang Cao, Haibo Cheng, Shuang Zhang, Jun Zhu, Yakun Xie:
Detail-Optimized Super-Resolution Reconstruction-Based Multistage Training Strategy for Remote Sensing Semantic Segmentation. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - [c20]Bin Wen, Rumeng Pan, Yahui Zeng, Haibo Cheng, Jialuo Zou, Yungang Cao, Xuqing Li:
Crop classification in time-series remote sensing images based on multi-feature extraction and attention connection semantic segmentation model. Agro-Geoinformatics 2024: 1-5 - [c19]Haibo Cheng, Shichao Li, Peng Zeng:
Prior Knowledge Informed Neural Network for Subsurface Flow Prediction. ISIE 2024: 1-6 - 2023
- [j7]Chang Liu, Zhenjie Yao, Pengfei Liu, Yanhui Tu, Hu Chen, Haibo Cheng, Lixin Xie, Kun Xiao:
Early prediction of MODS interventions in the intensive care unit using machine learning. J. Big Data 10(1): 55 (2023) - [c18]Wenting Li, Jiahong Yang, Haibo Cheng, Ping Wang, Kaitai Liang:
Improved Wordpcfg for Passwords with Maximum Probability Segmentation. ICASSP 2023: 1-5 - [c17]Zongjie Zhang, Haibo Cheng, Wenting Li, Ping Wang:
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing. ICCAI 2023: 323-328 - [c16]Haibo Cheng, Yunpeng He, Peng Zeng, Shichao Li, Valeriy Vyatkin:
Deep Learning-Based Prediction of Subsurface Oil Reservoir Pressure Using Spatio-Temporal Data. IECON 2023: 1-6 - [c15]Haibo Cheng, Shichao Li, Peng Zeng, Valeriy Vyatkin:
Application of Deep Learning Method to Estimate Bottomhole Pressure Dynamics of Oil Wells. ISIE 2023: 1-6 - [i1]Pengcheng Su, Haibo Cheng, Wenting Li, Ping Wang:
Reveal the Mathematical Structures of Honeyword Security Metrics. CoRR abs/2311.10960 (2023) - 2022
- [c14]Jiahong Xie, Haibo Cheng, Rong Zhu, Ping Wang, Kaitai Liang:
WordMarkov: A New Password Probability Model of Semantics. ICASSP 2022: 3034-3038 - [c13]Xiaoxi He, Haibo Cheng, Jiahong Xie, Ping Wang, Kaitai Liang:
Passtrans: An Improved Password Reuse Model Based on Transformer. ICASSP 2022: 3044-3048 - 2021
- [j6]Wenting Li, Haibo Cheng, Ping Wang, Kaitai Liang:
Practical Threshold Multi-Factor Authentication. IEEE Trans. Inf. Forensics Secur. 16: 3573-3588 (2021) - [c12]Haibo Cheng, Wenting Li, Ping Wang, Kaitai Liang:
Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction. ICASSP 2021: 2690-2694 - [c11]Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. USENIX Security Symposium 2021: 857-874 - 2020
- [j5]Haibo Cheng, Valeriy Vyatkin, Evgeny Osipov, Peng Zeng, Haibin Yu:
LSTM Based EFAST Global Sensitivity Analysis for Interwell Connectivity Evaluation Using Injection and Production Fluctuation Data. IEEE Access 8: 67289-67299 (2020) - [j4]Haibo Cheng, Haibin Yu, Peng Zeng, Evgeny Osipov, Shichao Li, Valeriy Vyatkin:
Automatic Recognition of Sucker-Rod Pumping System Working Conditions Using Dynamometer Cards with Transfer Learning and SVM. Sensors 20(19): 5659 (2020)
2010 – 2019
- 2019
- [c10]Wenting Li, Haibo Cheng, Ping Wang:
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. Cyber Security 2019: 1-8 - [c9]Haibo Cheng, Xiaoning Han, Peng Zeng, Haibin Yu, Evgeny Osipov, Valeriy Vyatkin:
ANN based Interwell Connectivity Analysis in Cyber-Physical Petroleum Systems. INDIN 2019: 199-205 - [c8]Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:
Probability Model Transforming Encoders Against Encoding Attacks. USENIX Security Symposium 2019: 1573-1590 - 2018
- [j3]Zhixiong Zheng, Haibo Cheng, Zijian Zhang, Yiming Zhao, Ping Wang:
An Alternative Method for Understanding User-Chosen Passwords. Secur. Commun. Networks 2018: 6160125:1-6160125:12 (2018) - [j2]Ding Wang, Haibo Cheng, Debiao He, Ping Wang:
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices. IEEE Syst. J. 12(1): 916-925 (2018) - [c7]Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. NDSS 2018 - 2017
- [j1]Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. IEEE Trans. Inf. Forensics Secur. 12(11): 2776-2791 (2017) - [c6]Haibo Cheng, Lingling Xue, Peng Wang, Peng Zeng, Haibin Yu:
Discrete manufacturing ontology development. ICIT 2017: 1393-1396 - [c5]Lingling Xue, Peng Wang, Haibo Cheng, Xing Tong, Peng Zeng, Haibin Yu:
An ontology modeling and application for an assembly line of manufacturing system. IECON 2017: 5414-5419 - [c4]Haibo Cheng, Lingling Xue, Peng Wang, Peng Zeng, Haibin Yu:
Ontology-based web service integration for flexible manufacturing systems. INDIN 2017: 351-356 - 2016
- [c3]Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang:
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. AsiaCCS 2016: 475-486 - [c2]Ding Wang, Debiao He, Haibo Cheng, Ping Wang:
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. DSN 2016: 595-606 - [c1]Haibo Cheng, Peng Zeng, Lingling Xue, Zhao Shi, Peng Wang, Haibin Yu:
Manufacturing Ontology Development Based on Industry 4.0 Demonstration Production Line. TSA 2016: 42-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint