Monthly Archives: December 2015

2015(3)

  1. Musical examination to bridge audio data and sheet music
    X Pan, TJ Cross, L Xiao, X Hei. “Musical examination to bridge audio data and sheet music.” IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2015.
    BibTeX
    @inproceedings{pan2015musical,
    title={Musical examination to bridge audio data and sheet music},
    author={Pan, Xunyu and Cross, Timothy J and Xiao, Liangliang and Hei, Xiali},
    booktitle={IS\&T/SPIE Electronic Imaging},
    pages={94080J--94080J},
    year={2015},
    organization={International Society for Optics and Photonics}
    }
  2. Energy-aware real-time scheduling on Heterogeneous Multi-Processor
    G Wang, W Li, X Hei “Energy-aware real-time scheduling on Heterogeneous Multi-Processor”, Information Sciences and Systems (CISS), 2015 49th, 2015
    BibTeX
    @inproceedings{wang2015energy,
    title={Energy-aware real-time scheduling on Heterogeneous Multi-Processor},
    author={Wang, Gang and Li, Wenming and Hei, Xiali},
    booktitle={Information Sciences and Systems (CISS), 2015 49th Annual Conference on},
    pages={1--7},
    year={2015},
    organization={IEEE}
    }

2013(6)

  1. Emerging security Issues in wireless implantable medical devices
    Xiali Hei and Xiaojiang Du. Emerging Security Issues in Wireless Implantable Medical Devices.
  2. PIPAC Patient Infusion Pattern based Access Control Scheme for Wireless Insulin Pump System
    X. Hei, X. Du, S. Lin, and I. Lee, “PIPAC: Patient Infusion Pattern based Access Control Scheme for Wireless Insulin Pump System,” to appear in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013.
  3. Two Vulnerabilities in Android OS Kernel
    X.Hei, X.Du and S.Lin, “Two Vulnerabilities in Android OS Kernel,” to appear in Proc. of IEEE ICC 2013, Budapest, Hungry, June. 2013.
  4. Chapter: Implantable Medical Device Security
    Xiaojiang Du · Xiali Hei · Alexandru Samachisa · Marcin Lukowiak · Dong Zhang · Shuhui Li · Jie Wu · Daniel Phillips
    No preview · Chapter · Apr 2013
  5. PIPAC Patient Infusion Pattern based Access Control Scheme
  6. vulnerabilities2