Chunxiao Ye

Orcid: 0000-0002-6736-1025

According to our database1, Chunxiao Ye authored at least 28 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
De-redundancy in wireless capsule endoscopy video sequences using correspondence matching and motion analysis.
Multim. Tools Appl., 2024

2022
Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

DIVE: Make Online Learning Diversified, Interactive, Versatile, and Engaging.
Proceedings of the IEEE International Conference on Teaching, 2022

One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
Recurrent generative adversarial networks for unsupervised WCE video summarization.
Knowl. Based Syst., 2021

2019
Deep Convolutional Neural Networks for WCE Abnormality Detection: CNN Architecture, Region Proposal and Transfer Learning.
IEEE Access, 2019

Improving Security Data Access Control for Multi-Authority Cloud Storage.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Dynamic Data Access Control for Multi-Authority Cloud Storage.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2016
Approaches to access control policy comparison and the inter-domain role mapping problem.
Inf. Technol. Control., 2016

2011
Towards Secure Delegation with Chinese Wall Security Policy (CWSP).
J. Networks, 2011

Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies.
IET Commun., 2011

Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases.
Proceedings of the WOSIS 2011, 2011

2010
An Auto-revocation Supported Delegation Model.
J. Comput., 2010

An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification.
Frontiers Comput. Sci. China, 2010

2009
An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Web Text Classifier.
Proceedings of the Advances in Neural Networks, 2009

Dynamic Replica Selection Services Based on State Evaluation Strategy.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

2008
Intrusion Detection Based on Density Level Sets Estimation.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Revocation in an Attribute-Based Delegation Model.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Detection Classifier.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008

2007
Network Anomaly Detection Based on DSOM and ACO Clustering.
Proceedings of the Advances in Neural Networks, 2007

Artificial Immune Networks Based Radial Basic Function Neural Networks Construction Algorithm and Application.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Attribute-Based Delegation Model and Its Extension.
J. Res. Pract. Inf. Technol., 2006

Neuron Selection for RBF Neural Network Classifier Based on Multiple Granularities Immune Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Intrusion Detection Based on Adaptive RBF Neural Network.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Clustering based on Self-Organizing Ant Colony Networks with Application to Intrusion Detection.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2005
Using XML and XACML to Support Attribute Based Delegation.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
An attribute-based-delegation-model.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...