Conference papers

[29] V.W Zheng, H. Cao, S. Gao, A. Adhikari, M. Lin, K. C.-C. Chang, "Cold-Start Heterogeneous-Device Wireless Localization," Proc. AAAI Conference on Artificial Intelligence, 2016 (PDF)

[28] A. Adhikari, V.W. Zheng, H. Cao, M. Lin, Y. Fang, K. C.-C Chang, "IntelligShop: Enabling Intelligent Shopping in Malls through Location-based Augmented Reality," Proc. IEEE international Conference on Data Mining (ICDM), 2015 (Press, Demo, PDF)

[27] H.-L. Nguyen, J.B. Gomes, M. Wu, H. Cao, J. Cao and S. P. Krishnaswamy, "Active learning for accurate analysis of streaming partial discharge data," Proc. PHM, pp. 1-5, 2015

[26] M. Wu, H. Cao, H.-L. Nguyen, K. Surmacz and C. Hargrove, "Modeling perceived stress via HRV and accelerometer sensor streams," Proc. EMBC, pp. 1625-1628, 2015

[25] M. Lin, H. Cao, V. Zheng, K.C.C. Chang and S. P. Krishnaswamy, "Mobility Profiling for User Verification with Anonymized Location Data," in Proc. IJCAI, pp. 960-966, 2015

[24] M. Lin, H. Cao, V. Zheng, K. C.C. Chang and S. P. Krishnaswamy, "Mobile User Verification/Identification using Statistical Mobility Profile," in Proc. BigComp, pp. 15-18, 2015

[23] H. Cao, C. Bao, X.-L. Li and Y.-K. Wong, "Class Augmented Active Learning," in Proc. SIAM International Conference on Data Mining (SDM), pp. 1-9, 2014 (Details)

[22] M. Dash, H.-L. Nguyen, H. Cao, G.-E. Yap, M. N. Nguyen, Xiao-Li Li, S. Krishnaswamy, J. Decraene, S. Antonatos, Y. Wang, D. T. Anh and A. Shi-Nash, "Home and Work Place Prediction for Urban Planning Using Mobile Network Data,” Proc. IEEE Mobile Data Management (MDM), vol. 2, pp. 37-42, 2014

[21] M. Dash, G. G. Chua, H.-L. Nguyen, G.-E. Yap, H. Cao, X.-L. Li, S. Krishnaswamy, J. Decraene and A. Shi-Nash, "An Interactive Analytics Tool for Understanding Location Semantics and Mobility of Users Using Mobile Network Data”, Proc. IEEE MDM (Demo), 2014

[20] J.Z.F. Pang, H. Cao and V. Y. F. Tan, “MOGT: Oversampling with a Parsimonious Mixture of Gaussian Trees Model for Imbalanced Time-Series Classification,” in Proc. MLSP, pp. 1-6, 2013 (Student best paper candidate)

[19] H. Cao and A.C. Kot, “EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication,” in Proc. APSIPA ASC, pp. 1-6, 2012 (Image Data, Software).

[18] C. Phua, H. Cao, J.B. Gomes and M.N. Nguyen, “Predicting Near-Future Churners and Win-Backs in the Telecommunications Industry,” in arXiv preprint arXiv:1210.6891, 2012.

[17] H. Cao, M.-N. Nguyen, C. Phua, S. Krishnaswamy and X.-L. Li, “An Integrated Framework for Human Activity Classification,” in Proc. Ubicomp, pp. 331-340, 2012 (PDF, PPT).

[16] C.C. Teck, X. Li, J.-H. Zhou, X.-L. Li, H. Cao and Y.-K. Wong, "Hybrid Rebalancing Approach to Handle Imbalanced Dataset for Fault Diagnosis in Manufacturing Systems", in Proc. ICIEA, pp. 1211-1216, 2012.

[15] H. Cao, M.-N. Nguyen, C. Phua, S. Krishnaswamy, and X.-L. Li, "An Integrated Framework for Human Activity Recognition", in Proc. ACM International Conference on Ubiquitous Computing (Poster) Ubicomp, 2012.

[14] H. Cao and A.C. Kot, “Similar DSLR Processor Identification using Compact Model Templates,” in Proc. APSIPA ASC, 2011 (PDF) .

[13] H. Cao, X.-L. Li, Y.-K. Woon and S.-K. Ng, “SPO: Structure Preserving Oversampling for Imbalanced Time Series Classification,” Proc. IEEE Int. Conf. on Data Mining ICDM, pp. 1008-1013, 2011 (PDF, PPT, Data, Code).

[12] J. Fan, A.C. Kot, H. Cao and F. Sattar, “Modeling the EXIF-Image Correlation for Image Manipulation Detection,” Proc. Int. Conf. on Image Processing ICIP, pp. 1945-1948, 2011 (PDF) .

[11] H. Cao and A.C. Kot, “ Mobile Camera Identification Using Demosaicing Features,” in Proc. of ISCAS (invited paper), pp. 1683-1686, 2010, (Student best paper finalist) (PDF, Demosaicing Feature Tool).

[10] H. Cao and A.C. Kot, “Identification of Recaptured Photographs on LCD Screens,” in Proc. of ICASSP, pp. 1790-1793, 2010 (PDF).

[9] H. Cao and A.C. Kot, “RAW-Tool Identification through Detected Demosaicing Regularity,” in Proc. of ICIP, pp. 2885-2888, 2009 (PDF).

[8] H. Cao and A.C. Kot, “Accurate Detection of Demosaicing Regularity from Output Images,” in Proc. of ISCAS (invited paper), pp. 497-500, 2009 (PDF, Demosaicing Feature Tool).

[7] H. Cao and A.C. Kot, “Lossless Data Hiding for Electronic Ink,” in Proc. of ICASSP, pp. 1381-1384, 2009 (PDF).

[6] H. Cao and A.C. Kot, “A Generalized Model for Detection of Demosaicing Characteristics,” in Proc. of ICME, pp. 1513-1516, 2008 (PDF).

[5] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Detection of Data Hiding in Binary Text Images,” in Proc. of ICIP, vol. 3, pp. III-73-76, 2005 (PDF).

[4] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Steganalysis of Data Hiding in Binary Text Images,” in Proc. of ISCAS, vol. 5, pp. 4405 – 4408, 2005 (PDF).

[3] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Steganalysis of Binary Text Images”, in Proc. of ICASSP, vol. 4, pp. 689-692, 2005 (PDF).

[2] H. Cao and A.C. Kot, “Online Structure Based Chinese Character Pre-Classification,” in Proc. of ICPR, vol. 2, pp. 395-398, 2004 (PDF).

[1] H. Cao and A.C. Kot, “Modified Kohonen Learning Network and its Application in Chinese Character Recognition,” in Proc. of TENCON, vol. 2, pp. 136-139, 2004 (PDF) .