Shu-Tao Xia
Shu-Tao Xia
Verified email at
Cited by
Cited by
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE conference on computer vision and pattern …, 2019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, SM Erfani, ST Xia, S Wijewickrema, ...
arXiv preprint arXiv:1806.02612, 2018
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50 (2), 163-172, 2009
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
Some results on optimal locally repairable codes
J Hao, ST Xia, B Chen
2016 IEEE International Symposium on Information Theory (ISIT), 440-444, 2016
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
Constructions of quasi-cyclic measurement matrices based on array codes
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 479-483, 2013
Entropy-based bilateral filtering with a new range kernel
T Dai, W Lu, W Wang, J Wang, ST Xia
Signal Processing 137, 223-234, 2017
On the stopping distance of finite geometry LDPC codes
ST Xia, FW Fu
IEEE communications letters 10 (5), 381-383, 2006
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2016
Improved analysis for subspace pursuit algorithm in terms of restricted isometry constant
CB Song, ST Xia, XJ Liu
IEEE Signal Processing Letters 21 (11), 1365-1369, 2014
Minimum pseudoweight and minimum pseudocodewords of LDPC codes
ST Xia, FW Fu
IEEE transactions on information theory 54 (1), 480-485, 2008
Bounds and constructions of locally repairable codes: parity-check matrix approach
J Hao, ST Xia, KW Shum, B Chen, FW Fu, Y Yang
IEEE Transactions on Information Theory, 2020
Reconstruction guarantee analysis of binary measurement matrices based on girth
XJ Liu, ST Xia
2013 IEEE International Symposium on Information Theory, 474-478, 2013
Design and analysis of SEIQR worm propagation model in mobile internet
X Xiao, P Fu, C Dou, Q Li, G Hu, S Xia
Communications in nonlinear science and numerical simulation 43, 341-350, 2017
Constructions of optimal binary locally repairable codes with multiple repair groups
J Hao, ST Xia
IEEE Communications Letters 20 (6), 1060-1063, 2016
The problems and solutions of network update in SDN: A survey
S Wang, D Li, S Xia
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
Structured non-binary LDPC codes with large girth
X Ge, ST Xia
Electronics Letters 43 (22), 1220-1222, 2007
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
The system can't perform the operation now. Try again later.
Articles 1–20