Cheng Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j64]Yong Fang
, Yusong Guo, Cheng Huang, Liang Liu:
Analyzing and Identifying Data Breaches in Underground Forums. IEEE Access 7: 48770-48777 (2019) - [j63]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang:
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism. IEEE Access 7: 56329-56340 (2019) - [j62]Yizhe Zhao
, Cheng Huang, Zelin Song, Chengyong Yu, Shuo Liang, Xiangang Luo, Anyong Qing:
A Digital Metamaterial of Arbitrary Base Based on Voltage Tunable Liquid Crystal. IEEE Access 7: 79671-79676 (2019) - [j61]Xu Cheng
, Ziyang Zhang, Fulong Chen
, Chuanxin Zhao, Taochun Wang
, Hui Sun, Cheng Huang:
Secure Identity Authentication of Community Medical Internet of Things. IEEE Access 7: 115966-115977 (2019) - [j60]Cheng Huang, Bangzhao Zhai, Aimin Tang, Xudong Wang:
Virtual mesh networking for achieving multi-hop D2D communications in 5G networks. Ad Hoc Networks 94 (2019) - [j59]Lili Wang, Fu Xiao, Cheng Huang:
Adaptive Topology Control with Link Quality Prediction for Underwater Sensor Networks. Ad Hoc & Sensor Wireless Networks 43(3-4): 179-212 (2019) - [j58]Jialu Hao, Cheng Huang, Jianbing Ni, Hong Rong, Ming Xian, Xuemin (Sherman) Shen:
Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Computer Networks 153: 1-10 (2019) - [j57]Yong Fang, Cheng Huang
, Yijia Xu, Yang Li:
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet 11(8): 177 (2019) - [j56]Guoming Wang, Rongxing Lu, Cheng Huang, Yong Liang Guan:
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare. J. Inf. Sec. Appl. 46: 271-280 (2019) - [j55]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. TIIS 13(10): 5260-5275 (2019) - [j54]Cheng Huang, Xiaoming Huo
:
A distributed one-step estimator. Math. Program. 174(1-2): 41-76 (2019) - [j53]Bangzhao Zhai, Aimin Tang, Cheng Huang, Chong Han
, Xudong Wang:
Antenna subarray management for hybrid beamforming in millimeter-Wave mesh backhaul networks. Nano Comm. Netw. 19: 92-101 (2019) - [j52]Cheng Huang
, Jiaxuan Han, Xing Zhang, Jiayong Liu
:
Automatic Identification of Honeypot Server Using Machine Learning Techniques. Security and Communication Networks 2019: 2627608:1-2627608:8 (2019) - [j51]Yixin Wu, Yuqiang Sun, Cheng Huang, Peng Jia, Luping Liu:
Session-Based Webshell Detection Using Machine Learning in Web Logs. Security and Communication Networks 2019: 3093809:1-3093809:11 (2019) - [j50]Cheng Huang, Sibo Duan, Xiaoguang Jiang, Xiao-Jing Han, Hua Wu, Maofang Gao, Pei Leng, Zhao-Liang Li:
Intercomparison of AMSR2- and MODIS-Derived Land Surface Temperature Under Clear-Sky Conditions. IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing 12(9): 3286-3294 (2019) - [j49]Cheng Huang, Ping Yi
, Futai Zou, Yao Yao, Wei Wang, Ting Zhu
:
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS. Wireless Communications and Mobile Computing 2019: 6705347:1-6705347:9 (2019) - [c87]Jialu Hao, Cheng Huang, Guangyu Chen, Ming Xian, Xuemin Sherman Shen:
Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing. ICC 2019: 1-6 - [c86]Cheng Huang, Jianbing Ni, Rongxing Lu, Xuemin Sherman Shen:
Online Advertising with Verifiable Fairness. ICC 2019: 1-6 - [c85]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. ICAIS (3) 2019: 564-575 - [c84]Xu Cheng, Fulong Chen, Dong Xie, Hui Sun, Cheng Huang, Zhuyun Qi:
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing. ICPCSEE (1) 2019: 396-411 - [c83]Xiao-Jing Han, Huajun Tang, Sibo Duan, Maofang Gao, Pei Leng, Cheng Huang, Zhao-Liang Li, Shangrong Wu:
New Perspective on Global Thermal Environment Monitoring. IGARSS 2019: 1657-1660 - [c82]Cheng Huang, Xiaoping Zhang, Caixia Gao, Sibo Duan, Xiaoguang Jiang, Zhao-Liang Li, Hua Wu, Xiao-Jing Han, Pei Leng, Maofang Gao, Yazhen Jiang:
Evaluation of A Physically-Based Passive Microwave Land Surface Temperature Retrieval Algorithm Using MODIS Data. IGARSS 2019: 7132-7135 - [i9]Yunyou Huang, Nana Wang, Tianshu Hao, Wanling Gao, Cheng Huang, Jianqing Li, Jianfeng Zhan:
LoadCNN: A Efficient Green Deep Learning Model for Day-ahead Individual Resident Load Forecasting. CoRR abs/1908.00298 (2019) - [i8]Renee Swischuk, Boris Kramer, Cheng Huang, Karen Willcox:
Learning physics-based reduced-order models for a single-injector combustion process. CoRR abs/1908.03620 (2019) - 2018
- [j48]Liehuang Zhu
, Chuan Zhang, Chang Xu
, Ximeng Liu, Cheng Huang:
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEEE Access 6: 19025-19033 (2018) - [j47]Yong Fang
, Cheng Huang, Liang Liu, Min Xue:
Research on Malicious JavaScript Detection Technology Based on LSTM. IEEE Access 6: 59118-59125 (2018) - [j46]Ji Han
, Xing Meng, Hanwei Liang, Zhi Cao
, Liang Dong
, Cheng Huang:
An improved nightlight-based method for modeling urban CO2 emissions. Environmental Modelling and Software 107: 307-320 (2018) - [j45]Cheng Huang, Yongbo Lv:
An Internet of Things System Based on Device-to-Device Communication Technology and Radio-Frequency Identification. Int. J. Online Eng. 14(10): 210-218 (2018) - [j44]Cheng Huang
, Toru Kawajiri, Hiroki Ishikuro:
A 13.56-MHz Wireless Power Transfer System With Enhanced Load-Transient Response and Efficiency by Fully Integrated Wireless Constant-Idle-Time Control for Biomedical Implants. J. Solid-State Circuits 53(2): 538-551 (2018) - [j43]Xun Liu
, Cheng Huang
, Philip K. T. Mok
:
A High-Frequency Three-Level Buck Converter With Real-Time Calibration and Wide Output Range for Fast-DVS. J. Solid-State Circuits 53(2): 582-595 (2018) - [j42]Yazhen Jiang, Xiaoguang Jiang, Ronglin Tang, Zhao-Liang Li, Yuze Zhang, Cheng Huang, Chen Ru:
Estimation of Daily Evapotranspiration Using Instantaneous Decoupling Coefficient From the MODIS and Field Data. IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing 11(6): 1832-1838 (2018) - [j41]Cheng Huang
, Rongxing Lu
, Xiaodong Lin
, Xuemin Shen:
Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles. IEEE Trans. Vehicular Technology 67(11): 11169-11180 (2018) - [c81]Chunjie Luo, Fan Zhang, Cheng Huang, Xingwang Xiong, Jianan Chen, Lei Wang, Wanling Gao, Hainan Ye, Tong Wu, Runsong Zhou, Jianfeng Zhan:
AIoT Bench: Towards Comprehensive Benchmarking Mobile and Embedded Device Intelligence. Bench 2018: 31-35 - [c80]Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. DSC 2018: 153-160 - [c79]Jialu Hao, Cheng Huang, Jian Liu, Ming Xian, Xuemin Shen:
Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT. GLOBECOM 2018: 1-6 - [c78]Cheng Huang, Dongxiao Liu, Jianbing Ni, Rongxing Lu, Xuemin Shen:
Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT. ICC 2018: 1-6 - [c77]Yong Fang, Yang Li, Liang Liu, Cheng Huang:
DeepXSS: Cross Site Scripting Detection Based on Deep Learning. ICCAI 2018: 47-51 - [c76]Yong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang:
Detecting Webshell Based on Random Forest with FastText. ICCAI 2018: 52-56 - [c75]Yong Fang, Xiao Long, Liang Liu, Cheng Huang:
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ICCSP 2018: 10-15 - [c74]Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang:
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. ICCSP 2018: 170-174 - [c73]Zhenxing Qian, Cheng Huang, Zichi Wang, Xinpeng Zhang:
Breaking CNN-Based Steganalysis. ICGEC 2018: 483-491 - 2017
- [j40]Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu
, Cheng Huang:
TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning. IEEE Access 5: 26973-26989 (2017) - [j39]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo
:
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges. IEEE Communications Magazine 55(11): 105-111 (2017) - [j38]Cheng Huang, Rongxing Lu, Hui Zhu:
Privacy-friendly spatial crowdsourcing in vehicular networks. J. Comm. Inform. Networks 2(2): 59-74 (2017) - [j37]Cheng Huang, Zhilun Lin, Jianhui Wu, Chao Chen:
A Low Offset Dynamic Comparator with Offset Elimination Circuit. Journal of Circuits, Systems, and Computers 26(7): 1-7 (2017) - [j36]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo
:
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. J. Comput. Syst. Sci. 89: 51-63 (2017) - [j35]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10(5): 1204-1218 (2017) - [j34]Xing Meng, Ji Han
, Cheng Huang:
An Improved Vegetation Adjusted Nighttime Light Urban Index and Its Application in Quantifying Spatiotemporal Dynamics of Carbon Emissions in China. Remote Sensing 9(8): 829 (2017) - [j33]Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu, Cheng Huang:
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems. Sensors 17(3): 500 (2017) - [c72]Cheng Huang, Yong Lei:
A novel model-based path planning method for robot-assisted flexible needle insertion. CASE 2017: 1414-1419 - [c71]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - [c70]Yaochen Hu, Yushi Wang, Bang Liu, Di Niu, Cheng Huang:
Latency reduction and load balancing in coded storage systems. SoCC 2017: 365-377 - [c69]Yu-Ze Zhang, Sibo Duan
, Xiaoguang Jiang, Hua Wu, Yazhen Jiang, Zhao-Xia Liu, Cheng Huang:
Complement analysis for the wavelet transform method for separating temperature and emissivity. IGARSS 2017: 3965-3968 - [c68]Yazhen Jiang, Xiaoguang Jiang, Ronglin Tang, Zhao-Liang Li, Yuze Zhang, Cheng Huang, Chen Ru:
Estimation of daily evapotranspiration using MODIS data to calculate instantaneous decoupling coefficient and resistances. IGARSS 2017: 4004-4007 - [c67]Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li:
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. SecureComm 2017: 339-355 - [c66]Yu Lin Chen, Shuai Mu, Jinyang Li, Cheng Huang, Jin Li, Aaron Ogus, Douglas Phillips:
Giza: Erasure Coding Objects across Global Data Centers. USENIX Annual Technical Conference 2017: 539-551 - 2016
- [j32]Xinjiang Sun
, Xiaobei Wu, Cheng Huang, Zhiliang Xu, Jianlin Zhong:
Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Networks 37: 324-336 (2016) - [j31]Xu Ding, Xinjiang Sun, Cheng Huang, Xiaobei Wu:
Cluster-level based link redundancy with network coding in duty cycled relay wireless sensor networks. Computer Networks 99: 15-36 (2016) - [j30]Cheng Huang, Jiayong Liu, Yong Fang, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Computers & Security 58: 47-62 (2016) - [j29]Xicheng Tan
, Liping Di, Meixia Deng, Fang Huang, Xinyue Ye, Zongyao Sha, Ziheng Sun, Weishu Gong, Yuanzheng Shao, Cheng Huang:
Agent-as-a-service-based geospatial service aggregation in the cloud: A case study of flood response. Environmental Modelling and Software 84: 210-225 (2016) - [j28]Lanhua Xia, Jianhui Wu, Cheng Huang, Meng Zhang:
Built-in self-test structure for fault detection of charge-pump phase-locked loop. IET Circuits, Devices & Systems 10(4): 317-321 (2016) - [j27]Yongqiang Zhang, Hongjun Lv, Huakun Du, Cheng Huang, Shuai Liu, Guangjun Xie:
Modular design of QCA carry flow adders and multiplier with reduced wire crossing and number of logic gates. I. J. Circuit Theory and Applications 44(7): 1351-1366 (2016) - [j26]Lichun Li, Rongxing Lu, Cheng Huang:
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data. IEEE Internet of Things Journal 3(2): 206-218 (2016) - [j25]Cheng Huang
, Toru Kawajiri, Hiroki Ishikuro:
A Near-Optimum 13.56 MHz CMOS Active Rectifier With Circuit-Delay Real-Time Calibrations for High-Current Biomedical Implants. J. Solid-State Circuits 51(8): 1797-1809 (2016) - [j24]Hao Hu, Rongxing Lu
, Cheng Huang, Zonghua Zhang:
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs. Sensors 16(6): 803 (2016) - [j23]Huaiyuan Wang, Xu Ding, Cheng Huang, Xiaobei Wu:
Adaptive Connectivity Restoration from Node Failure(s) in Wireless Sensor Networks. Sensors 16(10): 1487 (2016) - [j22]Hui Zhu, Rongxing Lu, Cheng Huang, Le Chen, Hui Li:
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Trans. Vehicular Technology 65(9): 7729-7739 (2016) - [c65]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin:
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. AsiaCCS 2016: 95-106 - [c64]Pantazis Deligiannis, Matt McCutchen, Paul Thomson, Shuo Chen, Alastair F. Donaldson, John Erickson, Cheng Huang, Akash Lal, Rashmi Mudduluru, Shaz Qadeer, Wolfram Schulte:
Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!). FAST 2016: 249-262 - [c63]Cheng Huang, Rongxing Lu, Hui Zhu, Hao Hu, Xiaodong Lin:
PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing. GLOBECOM 2016: 1-6 - [c62]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin:
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques. ICC 2016: 1-6 - [c61]Cheng Huang, Toru Kawajiri, Hiroki Ishikuro:
A wireless power transfer system with enhanced response and efficiency by fully-integrated fast-tracking wireless constant-idle-time control for implants. VLSI Circuits 2016: 1-2 - [c60]Xun Liu, Cheng Huang
, Philip K. T. Mok:
A 50MHz 5V 3W 90% efficiency 3-level buck converter with real-time calibration and wide output range for fast-DVS in 65nm CMOS. VLSI Circuits 2016: 1-2 - 2015
- [j21]Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. Comput. J. 58(4): 536-548 (2015) - [j20]Shengfeng Zhang, Xiaobei Wu, Cheng Huang:
Adaptive Topology Reconfiguration from an Actor Failure in Wireless Sensor-Actor Networks. IJDSN 11: 602471:1-602471:11 (2015) - [j19]Cheng Huang, Zixuan Wang, Chao Chen, Jianhui Wu:
A Review of LC-Based Digitally Controlled Oscillator with High Frequency Resolution. Journal of Circuits, Systems, and Computers 24(5) (2015) - [j18]Cheng Huang
, Philip K. T. Mok:
A Delay-Line-Based Voltage-to-Duty-Cycle Controller for High-Frequency PWM Switching Converters. IEEE Trans. on Circuits and Systems 62-II(8): 751-755 (2015) - [j17]Jianhui Wu, Zixuan Wang, Chao Chen, Cheng Huang, Meng Zhang:
A 2.4-GHz All-Digital PLL With a 1-ps Resolution 0.9-mW Edge-Interchanging-Based Stochastic TDC. IEEE Trans. on Circuits and Systems 62-II(10): 917-921 (2015) - [c59]Guoming Wang, Rongxing Lu, Cheng Huang:
PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare. ICICS 2015: 1-5 - [c58]Cheng Huang
, Toru Kawajiri, Hiroki Ishikuro:
A near-optimum 13.56 MHz active rectifier with circuit-delay real-time calibrations for high-current biomedical implants. CICC 2015: 1-4 - [c57]Rongxing Lu, Khalid Alharbi, Xiaodong Lin, Cheng Huang:
A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications. GLOBECOM 2015: 1-6 - [c56]Guoming Wang, Rongxing Lu, Cheng Huang:
PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme. GLOBECOM 2015: 1-6 - [c55]Wenhao Yuan, Cheng Huang, Shiyun Wu, Zhiliang Xu:
The design and applications for straightening exceeded value of elevator guide rail based on neural network. ICCAIS 2015: 12-15 - [c54]Cheng Huang, Rongxing Lu:
EFPA: Efficient and flexible privacy-preserving mining of association rule in cloud. ICCC 2015: 1-6 - [c53]Aditya Akella, Theophilus Benson, Balakrishnan Chandrasekaran, Cheng Huang, Bruce M. Maggs, David A. Maltz:
A Universal Approach to Data Center Network Design. ICDCN 2015: 41:1-41:10 - [c52]Baochun He, Cheng Huang, Fucang Jia:
Fully Automatic Multi-Organ Segmentation Based on Multi-Boost Learning and Statistical Shape Model Search. VISCERAL Challenge@ISBI 2015: 18-21 - [c51]Xun Liu, Cheng Huang
, Philip K. T. Mok:
Dynamic performance analysis of 3-level integrated buck converters. ISCAS 2015: 2093-2096 - [c50]Junmin Jiang, Yan Lu
, Cheng Huang
, Wing-Hung Ki, Philip K. T. Mok:
20.5 A 2-/3-phase fully integrated switched-capacitor DC-DC converter in bulk CMOS for energy-efficient digital circuits with 14% efficiency improvement. ISSCC 2015: 1-3 - [i7]Cheng Huang, Xiaoming Huo:
A Distributed One-Step Estimator. CoRR abs/1511.01443 (2015) - 2014
- [j16]Zixuan Wang, Cheng Huang, Jianhui Wu:
A Review of CMOS Time-to-Digital Converter. Journal of Circuits, Systems, and Computers 23(7) (2014) - [j15]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes With Locality. IEEE Trans. Information Theory 60(9): 5245-5256 (2014) - [c49]Hui Zhu, Cheng Huang, Hui Li:
MPPM: Malware propagation and prevention model in online SNS. ICC Workshops 2014: 682-687 - [c48]Xuhui Li, Cheng Huang, Fucang Jia, Zongmin Li, Chihua Fang, Yingfang Fan:
Automatic Liver Segmentation Using Statistical Prior Models and Free-form Deformation. MCV 2014: 181-188 - 2013
- [j14]Jianhui Wu, Zixuan Wang, Xincun Ji, Cheng Huang:
A low-power high-speed true single phase clock divide-by-2/3 prescaler. IEICE Electronic Express 10(2): 20120913 (2013) - [j13]Cheng Huang:
Boundary Value Problem for Analysis of Portal Double-Row Stabilizing Piles. J. Applied Mathematics 2013: 485632:1-485632:10 (2013) - [j12]Cheng Huang
, Philip K. T. Mok
:
An 84.7% Efficiency 100-MHz Package Bondwire-Based Fully Integrated Buck Converter With Precise DCM Operation and Enhanced Light-Load Efficiency. J. Solid-State Circuits 48(11): 2595-2607 (2013) - [j11]Cheng Huang
, Philip K. T. Mok
:
A 100 MHz 82.4% Efficiency Package-Bondwire Based Four-Phase Fully-Integrated Buck Converter With Flying Capacitor for Area Reduction. J. Solid-State Circuits 48(12): 2977-2988 (2013) - [j10]Chao Chen, Jianhui Wu, Cheng Huang, Longxing Shi:
A CMOS Switched Load Harmonic Rejection Mixer for DTV Tuner Applications. IEEE Trans. on Circuits and Systems 60-I(2): 428-436 (2013) - [j9]Cheng Huang, Minghua Chen, Jin Li:
Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems. TOS 9(1): 3:1-3:28 (2013) - [j8]Fuyong Lin, T. C. E. Cheng
, Cheng Huang, Xiaoheng Liang, Jianan Zhao:
Developing an Organization Design Framework and Sample Based on the Total Relationship Flow Management Theorems. IEEE Trans. Systems, Man, and Cybernetics: Systems 43(6): 1466-1476 (2013) - [c47]Cheng Huang
, Lin Cheng
, Philip K. T. Mok
, Wing-Hung Ki
:
High-side NMOS power switch and bootstrap driver for high-frequency fully-integrated converters with enhanced efficiency. ISCAS 2013: 693-696 - [c46]Cheng Huang
, Philip K. T. Mok
:
An 82.4% efficiency package-bondwire-based four-phase fully integrated buck converter with flying capacitor for area reduction. ISSCC 2013: 362-363 - [i6]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes with Locality. CoRR abs/1307.4150 (2013) - [i5]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes with Locality. Electronic Colloquium on Computational Complexity (ECCC) 20: 104 (2013) - 2012
- [j7]Cheng Huang, Ivan Batanov, Jin Li:
A practical solution to the client-LDNS mismatch problem. Computer Communication Review 42(2): 35-41 (2012) - [j6]Parikshit Gopalan, Cheng Huang, Huseyin Simitci, Sergey Yekhanin:
On the Locality of Codeword Symbols. IEEE Trans. Information Theory 58(11): 6925-6934 (2012) - [c45]Osama Khan, Randal C. Burns, James S. Plank, William Pierce, Cheng Huang:
Rethinking erasure codes for cloud file systems: minimizing I/O for recovery and degraded reads. FAST 2012: 20 - [c44]Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li:
Simple regenerating codes: Network coding for cloud storage. INFOCOM 2012: 2801-2805 - [c43]Xiaocheng Jing, Philip K. T. Mok
, Cheng Huang
, Fan Yang
:
A 0.5V nanoWatt CMOS voltage reference with two high PSRR outputs. ISCAS 2012: 2837-2840 - [c42]Hsun-You Wang, Cheng Huang, Chin-Tai Chen:
Specific design and implementation of a piezoelectric droplet actuator for evaporative cooling of free space. NEMS 2012: 419-422 - [c41]Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, Sergey Yekhanin:
Erasure Coding in Windows Azure Storage. USENIX Annual Technical Conference 2012: 15-26 - 2011
- [c40]Viveck R. Cadambe, Cheng Huang, Jin Li, Sanjeev Mehrotra:
Polynomial length MDS codes with optimal repair in distributed storage. ACSCC 2011: 1850-1854 - [c39]Chao Zhang, Cheng Huang, Philip A. Chou, Jin Li, Sanjeev Mehrotra, Keith W. Ross, Hao Chen, Felix Livni, Jay Thaler:
Pangolin: speeding up concurrent messaging for cloud-based social gaming. CoNEXT 2011: 23 - [c38]Osama Khan, Randal C. Burns, James S. Plank, Cheng Huang:
In Search of I/O-Optimal Recovery from Disk Failures. HotStorage 2011 - [c37]Angela Wang, Cheng Huang, Jin Li, Keith W. Ross:
Estimating the performance of hypothetical cloud service deployments: A measurement-based approach. INFOCOM 2011: 2372-2380 - [c36]Cheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg:
Public DNS system and Global Traffic Management. INFOCOM 2011: 2615-2623 - [c35]Cheng Huang
, Philip K. T. Mok
:
Cross-Regulation-Suppression control scheme for CCM Single-Inductor-Dual-Output buck converter with ordered-power-distributive control. ISCAS 2011: 1612-1615 - [c34]