BibTeX records: Chengpo Mu

download as .bib file

@article{DBLP:journals/access/ZhangMXXX19,
  author    = {Ruiheng Zhang and
               Chengpo Mu and
               Min Xu and
               Lixin Xu and
               Xiaofeng Xu},
  title     = {Facial Component-Landmark Detection With Weakly-Supervised {LR-CNN}},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {10263--10277},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2018.2890573},
  doi       = {10.1109/ACCESS.2018.2890573},
  timestamp = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/ZhangMXXX19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MuYLZ14,
  author    = {Chengpo Mu and
               Meng Yu and
               Yingjiu Li and
               Wanyu Zang},
  title     = {Risk balance defense approach against intrusions for network server},
  journal   = {Int. J. Inf. Sec.},
  volume    = {13},
  number    = {3},
  pages     = {255--269},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10207-013-0214-9},
  doi       = {10.1007/s10207-013-0214-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/MuYLZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/MuHZW13,
  author    = {Chengpo Mu and
               Chao Han and
               Xianlei Zhang and
               Jiyuan Wang},
  title     = {A New Approach for Estimating the Infrared Radiative and Simulation},
  booktitle = {2013 International Conference on Cyber-Enabled Distributed Computing
               and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12,
               2013},
  pages     = {233--236},
  year      = {2013},
  crossref  = {DBLP:conf/cyberc/2013},
  url       = {https://doi.org/10.1109/CyberC.2013.45},
  doi       = {10.1109/CyberC.2013.45},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cyberc/MuHZW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/MuWYZH13,
  author    = {Chengpo Mu and
               Jiyuan Wang and
               Zhijie Yuan and
               Xianlei Zhang and
               Chao Han},
  title     = {The Research of the {ATR} System Based on Infrared Images and {L-M}
               {BP} Neural Network},
  booktitle = {Proceedings of the Seventh International Conference on Image and Graphics,
               {ICIG} 2013, Qingdao, China, July 26-28, 2013},
  pages     = {801--805},
  year      = {2013},
  crossref  = {DBLP:conf/icig/2013},
  url       = {https://doi.org/10.1109/ICIG.2013.162},
  doi       = {10.1109/ICIG.2013.162},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icig/MuWYZH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/MuS12,
  author    = {Chengpo Mu and
               Bing Shuai},
  title     = {Research on Preprocessing Technique of Alert Aggregation},
  booktitle = {Fifth International Joint Conference on Computational Sciences and
               Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26,
               2012},
  pages     = {597--600},
  year      = {2012},
  crossref  = {DBLP:conf/cso/2012},
  url       = {https://doi.org/10.1109/CSO.2012.136},
  doi       = {10.1109/CSO.2012.136},
  timestamp = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cso/MuS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/MuL10,
  author    = {Chengpo Mu and
               Yingjiu Li},
  title     = {An intrusion response decision-making model based on hierarchical
               task network planning},
  journal   = {Expert Syst. Appl.},
  volume    = {37},
  number    = {3},
  pages     = {2465--2472},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.eswa.2009.07.079},
  doi       = {10.1016/j.eswa.2009.07.079},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/MuL10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/FuRMW07,
  author    = {Shujun Fu and
               Qiuqi Ruan and
               Chengpo Mu and
               Wenqia Wang},
  title     = {Geometry-Driven Nonlinear Equation with an Accelerating Coupled Scheme
               for Image Enhancement},
  booktitle = {Computational Science - {ICCS} 2007, 7th International Conference
               Beijing, China, May 27-30, 2007, Proceedings, Part {I}},
  pages     = {490--496},
  year      = {2007},
  crossref  = {DBLP:conf/iccS/2007-1},
  url       = {https://doi.org/10.1007/978-3-540-72584-8\_65},
  doi       = {10.1007/978-3-540-72584-8\_65},
  timestamp = {Wed, 14 Nov 2018 10:56:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccS/FuRMW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MuHT05,
  author    = {Chengpo Mu and
               Houkuan Huang and
               Shengfeng Tian},
  title     = {Intrusion Detection Alert Verification Based on Multi-level Fuzzy
               Comprehensive Evaluation},
  booktitle = {Computational Intelligence and Security, International Conference,
               {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
               {I}},
  pages     = {9--16},
  year      = {2005},
  crossref  = {DBLP:conf/cis/2005-1},
  url       = {https://doi.org/10.1007/11596448\_2},
  doi       = {10.1007/11596448\_2},
  timestamp = {Fri, 21 Jul 2017 13:46:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/MuHT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyberc/2013,
  title     = {2013 International Conference on Cyber-Enabled Distributed Computing
               and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12,
               2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6684446},
  isbn      = {978-0-7695-5106-7},
  timestamp = {Thu, 23 Oct 2014 11:41:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cyberc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icig/2013,
  title     = {Proceedings of the Seventh International Conference on Image and Graphics,
               {ICIG} 2013, Qingdao, China, July 26-28, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6642427},
  isbn      = {978-0-7695-5050-3},
  timestamp = {Wed, 17 Sep 2014 19:35:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icig/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cso/2012,
  editor    = {Yanling Hao and
               Lean Yu},
  title     = {Fifth International Joint Conference on Computational Sciences and
               Optimization, {CSO} 2012, Harbin, Heilongjiang, China, June 23-26,
               2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6273238},
  isbn      = {978-1-4673-1365-0},
  timestamp = {Wed, 02 Dec 2015 12:12:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cso/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccS/2007-1,
  editor    = {Yong Shi and
               G. Dick van Albada and
               Jack J. Dongarra and
               Peter M. A. Sloot},
  title     = {Computational Science - {ICCS} 2007, 7th International Conference
               Beijing, China, May 27-30, 2007, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4487},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72584-8},
  doi       = {10.1007/978-3-540-72584-8},
  isbn      = {978-3-540-72583-1},
  timestamp = {Wed, 14 Nov 2018 10:56:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccS/2007-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2005-1,
  editor    = {Yue Hao and
               Jiming Liu and
               Yuping Wang and
               Yiu{-}ming Cheung and
               Hujun Yin and
               Licheng Jiao and
               Jianfeng Ma and
               Yong{-}Chang Jiao},
  title     = {Computational Intelligence and Security, International Conference,
               {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {3801},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11596448},
  doi       = {10.1007/11596448},
  isbn      = {3-540-30818-0},
  timestamp = {Fri, 21 Jul 2017 13:46:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/2005-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Schloss Dagstuhl LZI