default search action
Pei Cao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Pei Cao, Yu Li, Xinlu Li:
Cross-language few-shot intent recognition via prompt-based tuning. Appl. Intell. 55(1): 60 (2025) - 2024
- [j28]Pei Cao, Jinru Chen:
An extended nonconforming finite element method for the coupled Darcy-Stokes problem. J. Comput. Appl. Math. 451: 116092 (2024) - [j27]Tengfei Wang, Chi Zhang, Xiaolin Zhang, Dawu Gu, Pei Cao:
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 99-135 (2024) - [c36]Yanqing Lu, Pei Cao, Wenhui Zhang, Tengfei Li:
Fault Diagnosis Method for Temperature Rise of Tulip Contact in High Voltage Switchgear Based on Digital Twin Technology. CMLDS 2024: 31:1-31:6 - 2023
- [j26]Caimei Wang, Jianhao Lu, Xinlu Li, Pei Cao, Zijian Zhou, Qilue Wen:
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains. IEEE Access 11: 82989-83003 (2023) - [j25]Chi Zhang, Xiangjun Lu, Pei Cao, Dawu Gu, Zheng Guo, Sen Xu:
A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Sci. China Inf. Sci. 66(1) (2023) - [j24]Pei Cao, Chi Zhang, Xiangjun Lu, Hai-Ning Lu, Dawu Gu:
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy. J. Comput. Sci. Technol. 38(5): 1132-1148 (2023) - [j23]Yongzhen Li, Pei Cao, Peng Zhang, Hua Yang, Xiaofeng Zhu, Ruihua Guo:
Design and Development of a Hair-like Sensor with Bridge-Type Flexible Amplification Mechanisms. Sensors 23(17): 7354 (2023) - [j22]Xinlu Li, Liang-Kuan Fang, Le-Xuan Zhang, Pei Cao:
An Interactive Framework of Cross-Lingual NLU for In-Vehicle Dialogue. Sensors 23(20): 8501 (2023) - [c35]Chenglong Cao, Huaijin Chen, Mingjian Chen, Pei Cao, Haiyan Zhang:
Radar Signal Recognition Method based on Transfer Learning. ISIA 2023: 7:1-7:6 - 2022
- [j21]Yayu Xie, Pei Cao, Yuan Qin, Xiru Wu, Bingyao Huang, Kai Li, Yonghong Liu:
Catalytic activity in vitro of the human protein kinase ASK1 mutants: Experimental and molecular simulation study. Comput. Biol. Chem. 99: 107712 (2022) - [j20]Pei Cao, Jinru Chen, Feng Wang:
An extended mixed finite element method for elliptic interface problems. Comput. Math. Appl. 113: 148-159 (2022) - [j19]Yanbin Hao, Shuo Wang, Pei Cao, Xinjian Gao, Tong Xu, Jinmeng Wu, Xiangnan He:
Attention in Attention: Modeling Context Correlation for Efficient Video Classification. IEEE Trans. Circuits Syst. Video Technol. 32(10): 7120-7132 (2022) - [j18]Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. IEEE Trans. Inf. Forensics Secur. 17: 3863-3876 (2022) - [j17]Tengfei Wang, Chi Zhang, Pei Cao, Dawu Gu:
Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform. IEEE Trans. Very Large Scale Integr. Syst. 30(9): 1158-1171 (2022) - [c34]Pei Cao, Hongyi Zhang, Dawu Gu, Yan Lu, Yidong Yuan:
AL-PA: cross-device profiled side-channel attack using adversarial learning. DAC 2022: 691-696 - [i10]Pei Cao, Jinru Chen, Feng Wang:
An extended mixed finite element method for elliptic interface problems. CoRR abs/2203.05941 (2022) - [i9]Yanbin Hao, Shuo Wang, Pei Cao, Xinjian Gao, Tong Xu, Jinmeng Wu, Xiangnan He:
Attention in Attention: Modeling Context Correlation for Efficient Video Classification. CoRR abs/2204.09303 (2022) - 2021
- [j16]Xiangjun Lu, Chi Zhang, Pei Cao, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 235-274 (2021) - [j15]Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 27-56 (2021) - [c33]Sukhdeep S. Sodhi, Ellie Ka In Chio, Ambarish Jash, Santiago Ontañón, Ajit Apte, Ankit Kumar, Ayooluwakunmi Jeje, Dima Kuzmin, Harry Fung, Heng-Tze Cheng, Jon Effrat, Tarush Bali, Nitin Jindal, Pei Cao, Sarvjeet Singh, Senqiang Zhou, Tameen Khan, Amol Wankhede, Moustafa Alzantot, Allen Wu, Tushar Chandra:
Mondegreen: A Post-Processing Solution to Speech Recognition Error Correction for Voice Search Queries. KDD 2021: 3569-3575 - [i8]Sukhdeep S. Sodhi, Ellie Ka In Chio, Ambarish Jash, Santiago Ontañón, Ajit Apte, Ankit Kumar, Ayooluwakunmi Jeje, Dima Kuzmin, Harry Fung, Heng-Tze Cheng, Jon Effrat, Tarush Bali, Nitin Jindal, Pei Cao, Sarvjeet Singh, Senqiang Zhou, Tameen Khan, Amol Wankhede, Moustafa Alzantot, Allen Wu, Tushar Chandra:
Mondegreen: A Post-Processing Solution to Speech Recognition Error Correction for Voice Search Queries. CoRR abs/2105.09930 (2021) - 2020
- [c32]Tao Wu, Ellie Ka In Chio, Heng-Tze Cheng, Yu Du, Steffen Rendle, Dima Kuzmin, Ritesh Agarwal, Li Zhang, John R. Anderson, Sarvjeet Singh, Tushar Chandra, Ed H. Chi, Wen Li, Ankit Kumar, Xiang Ma, Alex Soares, Nitin Jindal, Pei Cao:
Zero-Shot Heterogeneous Transfer Learning from Recommender Systems to Cold-Start Search Retrieval. CIKM 2020: 2821-2828 - [c31]Jyun-Yu Jiang, Tao Wu, Georgios Roumpos, Heng-Tze Cheng, Xinyang Yi, Ed H. Chi, Harish Ganapathy, Nitin Jindal, Pei Cao, Wei Wang:
End-to-End Deep Attentive Personalized Item Retrieval for Online Content-sharing Platforms. WWW 2020: 2870-2877 - [i7]Tao Wu, Ellie Ka In Chio, Heng-Tze Cheng, Yu Du, Steffen Rendle, Dima Kuzmin, Ritesh Agarwal, Li Zhang, John R. Anderson, Sarvjeet Singh, Tushar Chandra, Ed H. Chi, Wen Li, Ankit Kumar, Xiang Ma, Alex Soares, Nitin Jindal, Pei Cao:
Zero-Shot Heterogeneous Transfer Learning from Recommender Systems to Cold-Start Search Retrieval. CoRR abs/2008.02930 (2020)
2010 – 2019
- 2019
- [j14]Pei Cao, Qi Shuai, Jiong Tang:
Leveraging Gaussian Process Regression and Many-Objective Optimization Through Voting Scores for Fault Identification. IEEE Access 7: 94481-94496 (2019) - [c30]Pei Cao, Hao Chen, Ye Zhang, Gang Wang:
Multi-View Frustum Pointnet for Object Detection in Autonomous Driving. ICIP 2019: 3896-3899 - 2018
- [j13]Pei Cao, Shengli Zhang, Jiong Tang:
Preprocessing-Free Gear Fault Diagnosis Using Small Datasets With Deep Convolutional Neural Network-Based Transfer Learning. IEEE Access 6: 26241-26253 (2018) - [i6]Pei Cao, Qi Shuai, Jiong Tang:
Leveraging Gaussian Process and Voting-Empowered Many-Objective Evaluation for Fault Identification. CoRR abs/1810.12228 (2018) - [i5]Pei Cao, Jiong Tang:
A Reinforcement Learning Hyper-Heuristic in Multi-Objective Single Point Search with Application to Structural Fault Identification. CoRR abs/1812.07958 (2018) - 2017
- [i4]Pei Cao, Zhaoyan Fan, Robert X. Gao, Jiong Tang:
Solving Configuration Optimization Problem with Multiple Hard Constraints: An Enhanced Multi-Objective Simulated Annealing Approach. CoRR abs/1706.03141 (2017) - [i3]Pei Cao, Zhaoyan Fan, Robert X. Gao, Jiong Tang:
A Focal Any-Angle Path-finding Algorithm Based on A* on Visibility Graphs. CoRR abs/1706.03144 (2017) - [i2]Pei Cao, Qi Shuai, Jiong Tang:
A Multi-Objective DIRECT Algorithm Towards Structural Damage Identification with Limited Dynamic Response Information. CoRR abs/1710.03575 (2017) - [i1]Pei Cao, Shengli Zhang, Jiong Tang:
Pre-Processing-Free Gear Fault Diagnosis Using Small Datasets with Deep Convolutional Neural Network-Based Transfer Learning. CoRR abs/1710.08904 (2017) - 2016
- [j12]Yefang Chen, Zhipeng Huang, Pei Cao, Ming Jin, Chengtou Du, Jiangbo Qian:
Subscription Aggregation Query Processing Based on Matrix Summation over DTN. IEICE Trans. Commun. 99-B(4): 812-819 (2016) - [c29]Rong Yang, Sarvjeet Singh, Pei Cao, Ed H. Chi, Bo Fu:
Video Watch Time and Comment Sentiment: Experiences from YouTube. HotWeb 2016: 26-28 - 2015
- [c28]Pei Cao:
Opportunities and Challenges for Caching and Prefetching on Mobile Devices. HotWeb 2015: 49-53 - 2014
- [c27]Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker:
Author retrospective for search and replication in unstructured peer-to-peer networks. ICS 25th Anniversary 2014: 64-82
2000 – 2009
- 2008
- [j11]Zhijia Chen, Chuang Lin, Yang Chen, Vaibhav Nivargi, Pei Cao:
An Analytical and Experimental Study of Super-Seeding in BitTorrent-Like P2P Networks. IEICE Trans. Commun. 91-B(12): 3842-3850 (2008) - [c26]Zhijia Chen, Yang Chen, Chuang Lin, Vaibhav Nivargi, Pei Cao:
Experimental Analysis of Super-Seeding in BitTorrent. ICC 2008: 65-69 - 2007
- [j10]Ozgun Erdogan, Pei Cao:
Hash-AV: fast virus signature scanning by cache-resident filters. Int. J. Secur. Networks 2(1/2): 50-59 (2007) - [c25]David X. Wei, Pei Cao, Steven H. Low:
Packet Loss Burstiness: Measurements and Implications for Distributed Applications. IPDPS 2007: 1-8 - [c24]Stewart Yang, Hongjun Zhu, Ariel Apostoli, Pei Cao:
N-gram Statistics in English and Chinese: Similarities and Differences. ICSC 2007: 454-460 - 2006
- [j9]Ruchir Bindal, Pei Cao:
Can self-organizing P2P file distribution provide QoS guarantees? ACM SIGOPS Oper. Syst. Rev. 40(3): 22-30 (2006) - [c23]Ruchir Bindal, Pei Cao, William Chan, Jan Medved, George Suwala, Tony Bates, Amy Zhang:
Improving Traffic Locality in BitTorrent via Biased Neighbor Selection. ICDCS 2006: 66 - [c22]Martín Casado, Pei Cao, Aditya Akella, Niels Provos:
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. IWQoS 2006: 286-287 - [c21]Martín Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker:
Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection. SRUTI 2006 - 2005
- [c20]Ozgun Erdogan, Pei Cao:
Hash-AV: fast virus signature scanning by cache-resident filters. GLOBECOM 2005: 6 - 2004
- [c19]Qingbo Zhu, Francis M. David, Christo Frank Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao:
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. HPCA 2004: 118-129 - [c18]Pei Cao, Zhe Wang:
Efficient top-K query calculation in distributed networks. PODC 2004: 206-215 - 2003
- [c17]Jonathan Lemon, Zhe Wang, Zheng Yang, Pei Cao:
Stream Engine: A New Kernel Interface for High-Performance Internet Streaming Servers. WCW 2003: 159-170 - 2002
- [c16]Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker:
Search and replication in unstructured peer-to-peer networks. ICS 2002: 84-95 - [c15]Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker:
Search and replication in unstructured peer-to-peer networks. SIGMETRICS 2002: 258-259 - 2001
- [j8]Pei Cao:
5th International Web Caching and Content Delivery Workshop, Lisbon, Portugal, 22-24 May 2000. Comput. Commun. 24(2): 129 (2001) - 2000
- [j7]Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Broder:
Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Trans. Netw. 8(3): 281-293 (2000) - [c14]Qiong Luo, Jeffrey F. Naughton, Rajasekar Krishnamurthy, Pei Cao, Yunrui Li:
Active Query Caching for Database Web Servers. WebDB (Informal Proceedings) 2000: 29-34 - [c13]Qiong Luo, Jeffrey F. Naughton, Rajasekar Krishnamurthy, Pei Cao, Yunrui Li:
Active Query Caching for Database Web Servers. WebDB (Selected Papers) 2000: 92-104
1990 – 1999
- 1999
- [j6]Pei Cao, Jin Zhang, Kevin Beach:
Active Cache: caching dynamic contents on the Web. Distributed Syst. Eng. 6(1): 43-50 (1999) - [c12]Lee Breslau, Pei Cao, Li Fan, Graham Phillips, Scott Shenker:
Web Caching and Zipf-like Distributions: Evidence and Implications. INFOCOM 1999: 126-134 - [c11]Li Fan, Pei Cao, Wei Lin, Quinn Jacobson:
Web Prefetching Between Low-Bandwidth Clients and Proxies: Potential and Performance. SIGMETRICS 1999: 178-187 - 1998
- [j5]Jussara M. Almeida, Pei Cao:
Measuring Proxy Performance with the Wisconsin Proxy Benchmark. Comput. Networks 30(22-23): 2179-2192 (1998) - [j4]Pei Cao, Sekhar R. Sarukkai:
Guest Editors' Introduction. SIGMETRICS Perform. Evaluation Rev. 26(3): 10 (1998) - [j3]Pei Cao, Chengjie Liu:
Maintaining Strong Cache Consistency in the World Wide Web. IEEE Trans. Computers 47(4): 445-457 (1998) - [c10]Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Broder:
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. SIGCOMM 1998: 254-265 - 1997
- [c9]Chengjie Liu, Pei Cao:
Maintaining Strong Cache Consistency in the World-Wide Web. ICDCS 1997: 12-21 - [c8]Gideon Glass, Pei Cao:
Adaptive Page Replacement Based on Memory Reference Behavior. SIGMETRICS 1997: 115-126 - [c7]Pei Cao, Sandy Irani:
Cost-Aware WWW Proxy Caching Algorithms. USENIX Symposium on Internet Technologies and Systems 1997 - 1996
- [j2]Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. ACM Trans. Comput. Syst. 14(4): 311-343 (1996) - [c6]Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, Brian N. Bershad, Pei Cao, Edward W. Felten, Garth A. Gibson, Anna R. Karlin, Kai Li:
A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. OSDI 1996: 19-34 - [c5]Tracy Kimbrel, Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
Integrating Parallel Prefetching and Caching. SIGMETRICS 1996: 262-263 - 1995
- [c4]Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
A Study of Integrated Prefetching and Caching Strategies. SIGMETRICS 1995: 188-197 - 1994
- [j1]Pei Cao, Swee Boon Lim, Shivakumar Venkataraman, John Wilkes:
The TickerTAIP Parallel RAID Architecture. ACM Trans. Comput. Syst. 12(3): 236-269 (1994) - [c3]Pei Cao, Edward W. Felten, Kai Li:
Implementation and Performance of Application-Controlled File Caching. OSDI 1994: 165-177 - [c2]Pei Cao, Edward W. Felten, Kai Li:
Application-Controlled File Caching Policies. USENIX Summer 1994: 171-182 - 1993
- [c1]Pei Cao, Swee Boon Lim, Shivakumar Venkataraman, John Wilkes:
The TickerTAIP Parallel RAID Architecture. ISCA 1993: 52-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint