Prof Xiangjian He

PhD, Professor in Computer Science, ** Chair Professor, Lead of Research Groups, FoSE, Deputy Head of CS School, Director of Computer Vision and Intelligent Perception Lab, PhD Programme Director for AIOP/CS

Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Conference contribution

Search results

  • Study on human behaviour retrieval

    Chen, Y., Wu, Q. & He, X., 2007, Proceedings of the 2007 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2007. p. 448-454 7 p. (Proceedings of the 2007 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2007).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Study on prioritization of network traffic for wireless traffic monitoring systems

    Xu, H. & He, X., 2004, Proceedings of the International Conference on Imaging Science, Systems and Technology, CISST'04. Arabnia, H. R. (ed.). p. 35-38 4 p. (Proceedings of the International Conference on Imaging Science, Systems and Technology, CISST'04).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Subspace analysis methods plus motion history image for human action recognition

    Du, C., Wu, Q., Yang, J., He, X. & Chen, Y., 2008, Proceedings - Digital Image Computing: Techniques and Applications, DICTA 2008. IEEE Computer Society, p. 606-611 6 p. 4700078. (Proceedings - Digital Image Computing: Techniques and Applications, DICTA 2008).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Super-resolution by prediction based sub-pel motion estimation

    Mudugamuwa, D. J., He, X., Wei, D. & Ahn, C. H., 2009, 2009 24th International Conference Image and Vision Computing New Zealand, IVCNZ 2009 - Conference Proceedings. p. 282-287 6 p. 5378397. (2009 24th International Conference Image and Vision Computing New Zealand, IVCNZ 2009 - Conference Proceedings).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Survey of Error Concealment techniques: Research directions and open issues

    Usman, M., He, X., Xu, M. & Lam, K. M., 28 Jul 2015, 2015 Picture Coding Symposium, PCS 2015 - with 2015 Packet Video Workshop, PV 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 233-238 6 p. 7170081. (2015 Picture Coding Symposium, PCS 2015 - with 2015 Packet Video Workshop, PV 2015 - Proceedings).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    26 Citations (Scopus)
  • Tensor error correction for corrupted values in visual data

    Li, Y., Zhou, Y., Yan, J., Yang, J. & He, X., 2010, 2010 IEEE International Conference on Image Processing, ICIP 2010 - Proceedings. p. 2321-2324 4 p. 5654055. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • Text detection in born-digital images using multiple layer images

    Zeng, C., Jia, W. & He, X., 18 Oct 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 1947-1951 5 p. 6637993. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • The bivariable fractal interpolation algorithm of simulating the mountains in the distributed navigation simulation system

    Liu, D., He, X. & Jin, Y., 2004, Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004). p. 410 1 p. (Proceedings of the Second International Conference on Information Technology and Applications (ICITA 2004)).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning

    Xu, H., Nanda, P., Liang, J. & He, X., 2022, Network and System Security - 16th International Conference, NSS 2022, Proceedings. Yuan, X., Bai, G., Alcaraz, C. & Majumdar, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 357-373 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13787 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection

    Tan, Z., Jamdagni, A., He, X., Nanda, P. & Liu, R. P., 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 33-40 8 p. 6295955. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    13 Citations (Scopus)
  • Trust and reputation in vehicular networks: A smart contract-based approach

    Malik, N., Nanda, P., He, X. & Liu, R., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers Inc., p. 34-41 8 p. 8887311. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • Trusted guidance pyramid network for human parsing

    Luo, X., Su, Z., Guo, J., Zhang, G. & He, X., 15 Oct 2018, MM 2018 - Proceedings of the 2018 ACM Multimedia Conference. Association for Computing Machinery, Inc, p. 654-662 9 p. (MM 2018 - Proceedings of the 2018 ACM Multimedia Conference).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    41 Citations (Scopus)
  • Uniformly partitioning images on virtual hexagonal structure

    He, X., Wang, H., Hur, N., Jia, W., Wu, Q., Kim, J. & Hintz, T., 2006, 9th International Conference on Control, Automation, Robotics and Vision, 2006, ICARCV '06. 4150371. (9th International Conference on Control, Automation, Robotics and Vision, 2006, ICARCV '06).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    9 Citations (Scopus)
  • Unsupervised decomposition of a multi-author document based on naive-Bayesian model

    Aldebei, K., He, X. & Yang, J., 2015, ACL-IJCNLP 2015 - 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 501-505 5 p. (ACL-IJCNLP 2015 - 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, Proceedings of the Conference; vol. 2).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    8 Citations (Scopus)
  • Unsupervised feature selection method for intrusion detection system

    Ambusaidi, M. A., He, X. & Nanda, P., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 295-301 7 p. 7345295. (Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015; vol. 1).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    20 Citations (Scopus)
  • Unsupervised multi-author document decomposition based on hidden Markov model

    Aldebei, K., He, X., Jia, W. & Yang, J., 2016, 54th Annual Meeting of the Association for Computational Linguistics, ACL 2016 - Long Papers. Association for Computational Linguistics (ACL), p. 706-714 9 p. (54th Annual Meeting of the Association for Computational Linguistics, ACL 2016 - Long Papers; vol. 2).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    6 Citations (Scopus)
  • Unsupervised video hashing by exploiting spatio-temporal feature

    Ma, C., Gu, Y., Liu, W., Yang, J. & He, X., 2016, Neural Information Processing - 23rd International Conference, ICONIP 2016, Proceedings. Hirose, A., Lee, M., Liu, D., Doya, K., Ikeda, K. & Ozawa, S. (eds.). Springer Verlag, p. 511-518 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9949 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    6 Citations (Scopus)
  • Urbanedge: Deep learning empowered edge computing for urban IoT time series prediction

    Fan, X., Xiang, C., Gong, L., He, X., Chen, C. & Huang, X., 17 May 2019, Proceedings of the ACM Turing Celebration Conference - China, ACM TURC 2019. Association for Computing Machinery, 12. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • User relationship classification of facebook messenger mobile data using WEKA

    Umair, A., Nanda, P., He, X. & Choo, K. K. R., 2018, Network and System Security - 12th International Conference, NSS 2018, Proceedings. Au, M. H., Luo, X., Li, J., Kluczniak, K., Yiu, S. M., Wang, C. & Castiglione, A. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11058 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
  • Using context saliency for movie shot classification

    Xu, M., Wang, J., Hasan, M. A., He, X., Xu, C., Lu, H. & Jin, J. S., 2011, ICIP 2011: 2011 18th IEEE International Conference on Image Processing. p. 3653-3656 4 p. 6116510. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    19 Citations (Scopus)
  • Using dynamic programming to match human behavior sequences

    Chen, Y., Wu, Q. & He, X., 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008. p. 1498-1503 6 p. 4795746. (2008 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Using scripts for affective content retrieval

    Xu, M., He, X., Jin, J. S., Peng, Y., Xu, C. & Guo, W., 2010, Advances in Multimedia Information Processing, PCM 2010 - 11th Pacific Rim Conference on Multimedia, Proceedings. PART 2 ed. p. 43-51 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6298 LNCS, no. PART 2).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Violence detection based on spatio-temporal feature and fisher vector

    Cai, H., Jiang, H., Huang, X., Yang, J. & He, X., 2018, Pattern Recognition and Computer Vision - First Chinese Conference, PRCV 2018, Proceedings. Lai, J-H., Zha, H., Zhou, J., Liu, C-L., Tan, T., Zheng, N. & Chen, X. (eds.). Springer Verlag, p. 180-190 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11256 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    4 Citations (Scopus)
  • Virtual samples construction using image-block-stretching for face recognition

    Zhao, Y., He, X. & Chen, B., 2016, Databases Theory and Applications - 27th Australasian Database Conference, ADC 2016, Proceedings. Cheema, M. A., Zhang, W. & Chang, L. (eds.). Springer Verlag, p. 346-354 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9877 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
  • Virtual spiral architecture

    Wu, Q., He, X. & Hintz, T., 2004, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04. Arabnia, H. R. (ed.). p. 399-405 7 p. (Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04; vol. 1).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    44 Citations (Scopus)
  • Visual tracking based on weighted subspace reconstruction error

    Zhou, T., Zhang, J., Xie, K., Yang, J. & He, X., 28 Jan 2014, 2014 IEEE International Conference on Image Processing, ICIP 2014. Institute of Electrical and Electronics Engineers Inc., p. 461-465 5 p. 7025092. (2014 IEEE International Conference on Image Processing, ICIP 2014).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • VSA-based fractal image compression

    Wang, H., Wang, M., Hintz, T., Wu, Q. & He, X., 2005, 13th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision 2005, WSCG'2005 - In Co-operation with EUROGRAPHICS, Full Papers. p. 89-96 8 p. (13th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision 2005, WSCG'2005 - In Co-operation with EUROGRAPHICS, Full Papers).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    13 Citations (Scopus)
  • Web service locating unit in RFID-centric anti-counterfeit system

    Tan, Z., He, X. & Nanda, P., 2009, Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009. p. 389-393 5 p. 5207907. (Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
  • Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic

    Alalmaie, A. Z., Nanda, P., He, X. & Alayan, M. S., 2023, Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications AINA-2023. Barolli, L. (ed.). Springer Science and Business Media Deutschland GmbH, p. 181-192 12 p. (Lecture Notes in Networks and Systems; vol. 655 LNNS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Zero Trust Network Intrusion Detection System (NIDS) using Auto Encoder for Attention-based CNN-BiLSTM

    Alalmaie, A., Nanda, P. & He, X., 30 Jan 2023, Proceeding of 2023 Australasian Computer Science Week, ACSW 2023. Association for Computing Machinery, p. 1-9 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection

    Alalmaie, A. Z., Nanda, P. & He, X., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers Inc., p. 449-456 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • ZT-NIDS: Zero Trust, Network Intrusion Detection System

    Alalmaie, A. Z., Nanda, P. & He, X., 2023, SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography. De Capitani di Vimercati, S. & Samarati, P. (eds.). Science and Technology Publications, Lda, p. 99-110 12 p. (Proceedings of the International Conference on Security and Cryptography; vol. 1).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access