default search action
Su-Kit Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Boliang Zhang, Lu Shen, Jiahua Yao, Tenglong Wang, Su-Kit Tang, Silvia Mirri:
Automatic Tracking Based on Weighted Fusion Back Propagation in UWB for IoT Devices. Sensors 24(4): 1257 (2024) - [j6]Yongheng Qian, Su-Kit Tang:
Pose Attention-Guided Paired-Images Generation for Visible-Infrared Person Re-Identification. IEEE Signal Process. Lett. 31: 346-350 (2024) - [c26]Haoxuan Xie, Lam Chi Hou, Lap Tou Chau, Lei Ka Weng, Xichen Wang, Yuxuan Guo, Giovanni Delnevo, Chiara Ceccarini, Chan-Tong Lam, Su-Kit Tang:
Multimodal Interface for Games: A Case Study with TinyML. CCNC 2024: 823-826 - [c25]Juntao Chen, Xiaodeng Zhou, Jiahua Yao, Su-Kit Tang:
Evaluation of Student Performance Based on Learning Behavior with Random Forest Model. ICEIT 2024: 266-272 - 2023
- [j5]Yongheng Qian, Xu Yang, Su-Kit Tang:
Dual-Space Aggregation Learning and Random Erasure for Visible Infrared Person Re-Identification. IEEE Access 11: 75440-75450 (2023) - [j4]Teng-Lai Wong, Ka-Seng Chou, Kei Long Wong, Su-Kit Tang:
Dataset of Public Objects in Uncontrolled Environment for Navigation Aiding. Data 8(2): 42 (2023) - [c24]Ka-Seng Chou, Davide Aguiari, Rita Tse, Su-Kit Tang, Giovanni Pau:
Impact Evaluation of Driving Style on Electric Vehicle Battery based on Field Testing Result. CCNC 2023: 1143-1146 - [c23]Giovanni Delnevo, Marcus Im, Rita Tse, Chan-Tong Lam, Su-Kit Tang, Paola Salomoni, Giovanni Pau, Vittorio Ghini, Silvia Mirri:
Italian-Chinese Neural Machine Translation: results and lessons learnt. GoodIT 2023: 455-461 - [c22]Boliang Zhang, Lu Shen, Jiahua Yao, Su-Kit Tang, Silvia Mirri:
UWB Hybrid Filtering-Based Mobile IoT Device Tracking. GoodIT 2023: 471-476 - [c21]Kaiyuan Tang, AoXuan Li, Su-Kit Tang:
Fully On-chain Cloud Storage DApp on the Internet Computer Protocol. ICDCS Workshops 2023: 43-48 - [c20]AoXuan Li, Su-Kit Tang, Gabriele D'Angelo:
Implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi. ICDCS Workshops 2023: 49-54 - [c19]Vai-Kei Ian, Rita Tse, Su-Kit Tang, Giovanni Pau:
Transforming from Mathematical Model to ML Model for Meteorology in Macao's Smart City Planning. ICEEG 2023: 72-78 - 2022
- [j3]Lorenzo Monti, Rita Tse, Su-Kit Tang, Silvia Mirri, Giovanni Delnevo, Vittorio Maniezzo, Paola Salomoni:
Edge-Based Transfer Learning for Classroom Occupancy Detection in a Smart Campus Context. Sensors 22(10): 3692 (2022) - [c18]AoXuan Li, Luca Serena, Mirko Zichichi, Su-Kit Tang, Gabriele D'Angelo, Stefano Ferretti:
Modelling of the Internet Computer Protocol Architecture: The Next Generation Blockchain. BLOCKCHAIN 2022: 3-12 - [c17]Luca Serena, AoXuan Li, Mirko Zichichi, Gabriele D'Angelo, Stefano Ferretti, Su-Kit Tang:
Simulation of the Internet Computer Protocol: the Next Generation Multi-Blockchain Architecture. DS-RT 2022: 119-126 - [c16]Sai Man Cheok, Lap-Man Hoi, Su-Kit Tang, Rita Tse:
Constructing High Quality Bilingual Corpus using Parallel Data from the Web. IoTBDS 2022: 127-132 - [c15]Vai-Kei Ian, Rita Tse, Su-Kit Tang, Giovanni Pau:
Performance Analysis of Machine Learning Algorithms in Storm Surge Prediction. IoTBDS 2022: 297-303 - 2021
- [c14]Hong Lin, Rita Tse, Su-Kit Tang, Yanbing Chen, Wei Ke, Giovanni Pau:
Near-Realtime Face Mask Wearing Recognition Based on Deep Learning. CCNC 2021: 1-7 - [c13]Qingle Wu, Su-Kit Tang, Yuanhui Liang, Chan-Tong Lam, Yan Ma:
A Low Complexity Model-Driven Deep Learning LDPC Decoding Algorithm. ICCCS 2021: 558-563 - [c12]Sai Man Cheok, Lap-Man Hoi, Su-Kit Tang, Rita Tse:
Crawling Parallel Data for Bilingual Corpus Using Hybrid Crawling Architecture. EUSPN/ICTH 2021: 122-127 - [c11]Rita Tse, Silvia Mirri, Su-Kit Tang, Giovanni Pau, Paola Salomoni:
Modelling and Visualizing People Flow in Smart Buildings: a Case Study in a University Campus. GoodIT 2021: 309-312 - [c10]Chiara Ceccarini, Ka Kei Chan, I Lei Lok, Rita Tse, Su-Kit Tang, Catia Prandi:
Fostering user's awareness about indoor air quality through an IoT-enabled home garden system. ICCCN 2021: 1-4 - 2020
- [c9]In-San Lei, Su-Kit Tang, Rita Tse:
Integrating consortium blockchain into edge server to defense against ransomware attack. EUSPN/ICTH 2020: 120-127 - [c8]Rita Tse, Silvia Mirri, Su-Kit Tang, Giovanni Pau, Paola Salomoni:
Building an Italian-Chinese Parallel Corpus for Machine Translation from the Web. GOODTECHS 2020: 265-268 - [c7]Rita Tse, Philip Lei, Su-Kit Tang, Giovanni Pau:
Enhancing Computing Curriculum with Collaborative Engagement Model to Enrich Undergraduate Research Experience. ICEIT 2020: 32-37 - [c6]Rita Tse, Marcus Im, Su-Kit Tang, Luís Filipe Menezes, Alfredo Manuel Pereira Geraldes Dias, Giovanni Pau:
Self-adaptive Sensing IoT Platform for Conserving Historic Buildings and Collections in Museums. IoTBDS 2020: 392-398 - [c5]In-San Lei, Su-Kit Tang, Ion-Kun Chao, Rita Tse:
Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. IoTBDS 2020: 399-404 - [c4]Su-Kit Tang, Philip Lei, Rita Tse, Chan-Tong Lam, Christy Weng-Lam Cheong:
Overcoming the Sudden Conversion to Online Education During the COVID-19 Pandemic: A Case Study in Computing Education. TALE 2020: 17-22
2010 – 2019
- 2019
- [c3]Su-Kit Tang, Rita Tse Tan Sim, In Man Song:
The Smart Green Tool for the Government: The Electronic Vehicle Identification in Management of Public Bus Services. ICEGOV 2019: 254-258 - 2018
- [c2]Rita Tse, Davide Aguiari, Ka-Seng Chou, Su-Kit Tang, Daniele D. Giusto, Giovanni Pau:
Monitoring cultural heritage buildings via low-cost edge computing/sensing platforms: the Biblioteca Joanina de Coimbra case study. GOODTECHS 2018: 148-152 - 2014
- [j2]Kaze Wong, Angus K. Y. Wong, Alan Kai-Hau Yeung, Wei Fan, Su-Kit Tang:
Trust and Privacy Exploitation in Online Social Networks. IT Prof. 16(5): 28-33 (2014) - 2013
- [j1]Su-Kit Tang, Dongyang Long:
Network Coding in Multicast Routing for Wireless Link Breakage Problem. Wirel. Pers. Commun. 69(2): 665-672 (2013)
2000 – 2009
- 2005
- [c1]Su-Kit Tang, Kin Yeung Wong, Kai-Hau Yeung:
Path Analysis: Detection of Triangle Routing Attacks in IPv6. ICPADS (2) 2005: 250-254
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint