Aixin Zhang

According to our database1, Aixin Zhang authored at least 28 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Separation of Temperature-Induced Response for Bridge Long-Term Monitoring Data Using Local Outlier Correction and Savitzky-Golay Convolution Smoothing.
Sensors, March, 2023

2022
Association Rule Mining Based on Hybrid Whale Optimization Algorithm.
Int. J. Data Warehous. Min., 2022

Interaction Guided Hand-Held Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022

Speed up Object Detection on Gigapixel-level Images with Patch Arrangement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2020
Feature Extraction For Visual Speaker Authentication Against Computer-Generated Video Attacks.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
An Image Thresholding Method Based on Differential Evolution Algorithm and Genetic Algorithm.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

An Image Enhancement Optimization Method Based on Differential Evolution Algorithm and Cuckoo Search Through Serial Coupled Mode.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Image Segmentation Using Fuzzy C-means Optimized by Ant Lion Optimization.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

2018
Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

An Effective Verifiable Database Protocol in Severe Untrusted Environment.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
A lightweight authentication scheme based on self-updating strategy for space information network.
Int. J. Satell. Commun. Netw., 2017

2016
Analysis and design of an authentication protocol for space information network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An anonymous distributed key management system based on CL-PKC for space information network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
A Layered and Componentized Security Architecture for Linux Based Mobile Network Elements.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
DCT fingerprint classifier based group fingerprint.
Proceedings of the International Conference on Audio, 2014

The DWT Group Fingerprinting Scheme.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2012
Impact of Feedback on Trust in P2P Networks.
J. Networks, 2012

An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Perceptual Compressive Sensing Scheme Based on Human Vision System.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

An efficient angle-based shape matching approach towards object recognition.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Authentication Tests Based on Test Type Matrix.
Proceedings of IEEE International Conference on Communications, 2009

2008
A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Dynamic Scheme For Authenticated Group Key Agreement Protocol.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008


  Loading...