Hong Xiang

Orcid: 0000-0001-6012-2921

According to our database1, Hong Xiang authored at least 34 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An efficient access control scheme for smart campus.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

Stress Monitoring of Concrete via Uniaxial Piezoelectric Sensor.
Sensors, 2022

Optimal control of TB transmission based on an age structured HIV-TB co-infection model.
J. Frankl. Inst., 2022

Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Access control encryption without sanitizers for Internet of Energy.
Inf. Sci., 2021

2020
Public key encryption with conjunctive keyword search on lattice.
J. Inf. Secur. Appl., 2020

Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in Networks.
IEEE Access, 2020

2019
Success factors influencing requirements change management process in global software development.
J. Comput. Lang., 2019

Multi-Scale Vehicle Detection for Foreground-Background Class Imbalance with Improved YOLOv2.
Sensors, 2019

Reversible data hiding in compressed and encrypted images by using Kd-tree.
Multim. Tools Appl., 2019

Dynamics for an SIRS epidemic model with infection age and relapse on a scale-free network.
J. Frankl. Inst., 2019

Improved Crowd Counting Method Based on Scale-Adaptive Convolutional Neural Network.
IEEE Access, 2019

Forward Engineering Completeness for Software by Using Requirements Validation Framework (S).
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
An Improved YOLOv2 for Vehicle Detection.
Sensors, 2018

An efficient quantum circuits optimizing scheme compared with QISKit.
CoRR, 2018

Improving the Quality of Software Development Process by Introducing a New Methodology-AZ-Model.
IEEE Access, 2018

Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model.
IEEE Access, 2018

An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Hopf bifurcation for a delayed predator-prey diffusion system with Dirichlet boundary condition.
Appl. Math. Comput., 2017

2016
Approaches to access control policy comparison and the inter-domain role mapping problem.
Inf. Technol. Control., 2016

2015
Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm.
Sensors, 2015

Semantic modelling and automated reasoning of non-functional requirement conflicts in the context of softgoal interdependencies.
IET Softw., 2015

Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
Finite Fields Their Appl., 2015

2014
Protection profile for the smartphone operating system.
Int. J. Embed. Syst., 2014

Dynamics of the deterministic and stochastic SIQS epidemic model with non-linear incidence.
Appl. Math. Comput., 2014

Stability in a predator-prey model with Crowley-Martin function and stage structure for prey.
Appl. Math. Comput., 2014

2011
Towards Secure Delegation with Chinese Wall Security Policy (CWSP).
J. Networks, 2011

Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies.
IET Commun., 2011

A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology.
J. Res. Pract. Inf. Technol., 2011

Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases.
Proceedings of the WOSIS 2011, 2011

2007
Query decomposition based on ontology mapping in data integration system.
Proceedings of the Third International Conference on Natural Computation, 2007

1994
Fuzzy Irrigation Decision Support System.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994


  Loading...