default search action
Xi Tan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xi Tan 0001 — Fudan University, Shanghai, China
- Xi Tan 0002 — University of Colorado, Colorado Springs, CO, USA
- Xi Tan 0003 — Peking University, Shenzhen, China
- Xi Tan 0004 — Hunan University of Technology, Zhuzhou, China
- Xi Tan 0005 — Zunyi Normal University, China
- Xi Tan 0006 — Guangdong University of Technology, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Li Yan, Hai-Tao Zhang, Jorge M. Gonçalves, Yang Xiao, Maolin Wang, Yuqi Guo, Chuan Sun, Xiuchuan Tang, Liang Jing, Mingyang Zhang, Xiang Huang, Ying Xiao, Haosen Cao, Yanyan Chen, Tongxin Ren, Fang Wang, Yaru Xiao, Sufang Huang, Xi Tan, Niannian Huang, Bo Jiao, Cheng Cheng, Yong Zhang, Ailin Luo, Laurent Mombaerts, Junyang Jin, Zhiguo Cao, Shusheng Li, Hui Xu, Ye Yuan:
An interpretable mortality prediction model for COVID-19 patients. Nat. Mach. Intell. 2(5): 283-288 (2020) - [j3]Qing-Kui Li, Hai Lin, Xi Tan, Shengli Du:
H∞ Consensus for Multiagent-Based Supply Chain Systems Under Switching Topology and Uncertain Demands. IEEE Trans. Syst. Man Cybern. Syst. 50(12): 4905-4918 (2020)
2010 – 2019
- 2018
- [b1]Xi Tan:
Bayesian Nonparametrics to Model Content, User, and Latent Structure in Hawkes Processes. Purdue University, USA, 2018 - [c14]Xi Tan, Vinayak A. Rao, Jennifer Neville:
Nested CRP with Hawkes-Gaussian Processes. AISTATS 2018: 1289-1298 - [c13]Xi Tan, Vinayak A. Rao, Jennifer Neville:
The Indian Buffet Hawkes Process to Model Evolving Latent Influences. UAI 2018: 795-804 - [c12]Florin Constantin, Christopher Harris, Samuel Ieong, Aranyak Mehta, Xi Tan:
Optimizing Ad Refresh In Mobile App Advertising. WWW 2018: 1399-1408 - 2016
- [c11]Xi Tan, Syed A. Z. Naqvi, Yuan (Alan) Qi, Katherine A. Heller, Vinayak A. Rao:
Content-based Modeling of Reciprocal Relationships using Hawkes and Gaussian Processes. UAI 2016 - 2013
- [j2]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. J. Syst. Softw. 86(3): 664-676 (2013) - 2012
- [c10]Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj:
SCUTA: a server-side access control system for web applications. SACMAT 2012: 71-82 - 2011
- [j1]Jack L. Lancaster, David Reese McKay, Matthew D. Cykowski, Michael J. Martinez, Xi Tan, Sunil Valaparla, Yi Zhang, Peter T. Fox:
Automated Analysis of Fundamental Features of Brain Structures. Neuroinformatics 9(4): 371-380 (2011) - [c9]Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu:
Re-designing the Web's Access Control System - (Extended Abstract). DBSec 2011: 4-11 - [c8]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Iterative context-aware feature location. ICSE 2011: 900-903 - [c7]Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin:
Position paper: why are there so many vulnerabilities in web applications? NSPW 2011: 83-94 - [c6]Xi Tan, Xin Peng, Sen Pan, Wenyun Zhao:
Assessing Software Quality by Program Clustering and Defect Prediction. WCRE 2011: 244-248 - [c5]Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen:
Cryptographic link signatures for spectrum usage authentication in cognitive radio. WISEC 2011: 79-90
2000 – 2009
- 2008
- [c4]Lei Xie, Xi Tan:
A Heuristic Approach to Caption Enhancement for Effective Video OCR. ICIC (1) 2008: 347-355 - [c3]Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma:
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. ICYCS 2008: 2260-2265 - 2007
- [c2]Xi Tan, Hong He:
Image Denoising Based on the Ridgelet Frame Using the Generalized Cross Validation Technique. ICIAR 2007: 38-45 - [c1]Xi Tan:
Ingredient Separation of Natural Images: A Multiple Transform Domain Method Based on Sparse Coding Strategy. ICIAR 2007: 752-760
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint