Name
Papers
Collaborators
CONG CHEN
33
95
Citations 
PageRank 
Referers 
38
12.03
136
Referees 
References 
407
130
Search Limit
100407
Title
Citations
PageRank
Year
Selective Kernel Network with Intermediate Supervision Loss for Monaural Speech Enhancement.00.342021
Two Eyes Are Better Than One: Exploiting Binocular Correlation for Diabetic Retinopathy Severity Grading00.342021
A Model-Based Requirements Analysis Method for Avionics System Architecture.00.342021
Multi-Level Generative Chaotic Recurrent Network For Image Inpainting00.342021
Design of Test Flight Mission Planning and Playback Verification System Based on STK.00.342021
An Infrared Thermal Image Defect Detection Method Based on Phase Features*.00.342021
A Thermal-Mechanical Deformation Based Fault Diagnosis Method Utilizing Support Vector Machine Algorithm for IGBT Bonding Wire Crack Detection.00.342021
ViBERT: Visual Behavior Regression Testing.00.342020
Fiber-Reinforced Soft Bending Actuator Control Utilizing On/Off Valves10.362020
A Consensus Community-Based Particle Swarm Optimization for Dynamic Community Detection.60.402020
Solving Multiple Inference by Minimizing Expected Loss.00.342020
Efficient Heuristic Search for M-Modes Inference.00.342020
An Aircraft Fuel Flow Model of Cruise Phase Based on LSTM and QAR Data00.342020
Robust Unsupervised Cleaning of Underwater Bathymetric Point Cloud Data.00.342020
Myolov3-Tiny: A New Convolutional Neural Network Architecture For Real-Time Detection Of Track Fasteners10.352020
Schedulability analysis for real-time mobile systems (S).00.342019
Scalable, Secure and Broad-Spectrum Enforcement of Contracts, Without Blockchains.00.342019
Research on Multi-UAV Routing Simulation Based on Unity3d.00.342019
Diverse Multiple Prediction on Neuron Image Reconstruction00.342019
基于数据随机性特征和极速学习机的加密数据流识别 (Encrypted Data Stream Recognition Based on Data Randomness and ELM).00.342017
Guided Play: Automatic Stereotypical Behavior Analysis and Intervention during Play.20.392016
Solving M-Modes Using Heuristic Search.00.342016
Affinity and Conflict-Aware Placement of Virtual Machines in Heterogeneous Data Centers40.402015
Searching Graph Communities by Modularity Maximization via Convex Optimization.10.342015
Who asked what: integrating crowdsourced FAQs into API documentation150.642014
Ranked Highly-Arc-Transitive Digraphs as Colimits.20.392014
Adaptive Scheduling And Routing Scheme For Delay Guarantee In Wireless Sensor Networks10.362013
Empirical Evidence Of Tags Supporting High-Level Awareness00.342012
Action reconginiton using human pose00.342012
Research on Scheduling Algorithm for Workflow-Based Grid Resource00.342008
An Agent-based Framework for Enhancing Helping Behaviors in Human Teamwork00.342005
Formal semantics and communication strategies for proactive information delivery among team-based agents20.452003
Integrity, internal control and security in information systems: Connecting governance and technology30.512003