Kan Zhang

According to our database1, Kan Zhang authored at least 54 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Finite Element Calculation with Experimental Verification for a Free-Flooded Transducer Based on Fluid Cavity Structure.
Sensors, 2018

Structural Brain Network Mining Based on Core Theory.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Greater Heart Rate Responses to Acute Stress is Correlated with Worse Performance of Visual Search in Special Police Cadets.
Proceedings of the Engineering Psychology and Cognitive Ergonomics: Performance, Emotion and Situation Awareness, 2017

A Personalized Next-Song Recommendation System Using Community Detection and Markov Model.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Core Theory Based Algorithm for Influence Maximization in Social Networks.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Residents' numeric inputting error in computerized physician order entry prescription.
I. J. Medical Informatics, 2016

The effects of the self and social identity on the intention to microblog: An extension of the theory of planned behavior.
Computers in Human Behavior, 2016

Using Structural Features to Characterize Social Ties.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Structural Vulnerability Analysis in Complex Networks Based on Core Theory.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Cortisol awakening response predicts intrinsic functional connectivity of the medial prefrontal cortex in the afternoon of the same day.
NeuroImage, 2015

Interactive Browsing System of 3D Lunar Model with Texture and Labels on Mobile Device.
Proceedings of the Image and Graphics - 8th International Conference, 2015

2014
The crossmodal spatial attention affects face processing.
Proceedings of the 10th International Conference on Natural Computation, 2014

Long-Term Psychosocial Stress Attenuates Attention Resource of Post-Error.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2014

Two Types of Cell Phone Conversation Have Differential Effect on Driving.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2014

The Time Course of Selective Consolidation on Visual Working Memory.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2014

2013
Modeling and Analyzing Method for CPS Software Architecture Energy Consumption.
JSW, 2013

A novel bartering exchange ring based incentive mechanism for peer-to-peer systems.
Future Generation Comp. Syst., 2013

The Effects of Spatial Attention on Face Processing: An ERPs Study.
Proceedings of the Foundations of Augmented Cognition, 2013

Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management. Healthcare and Safety of the Environment and Transport, 2013

2012
Future Computer-aided Decision-making Support Systems: Concerning more about the Mechanism of Human Behavior.
JSW, 2012

Affective priming with subliminal auditory stimulus exposure.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

More cooperative, or more uncooperative: decision-making after subliminal priming with emotional faces.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
Driving Distraction Analysis by ECG Signals: An Entropy Analysis.
Proceedings of the Internationalization, Design and Global Development, 2011

The Number of Trials with Target Affects the Low Prevalence Effect.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2011

Believe What You Hear, Not What You See - Vision Interferes with Auditory Route Guidance in Complex Environment.
Proceedings of the Human-Computer Interaction. Towards Mobile and Intelligent Interaction Environments, 2011

2010
A Lightweight Reputation System for Bartering Exchange Based Incentive Mechanisms in Peer-to-Peer Systems.
Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems, 2010

2009
Spatial Categorization and Computation - Empirical Evidence from Artificial Label.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Towards a Cluster Based Incentive Mechanism for P2P Networks.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Effects of Attention on Dynamic Emotional Expressions Processing.
Proceedings of the Brain Informatics, International Conference, BI 2009, 2009

A Review of Incentive Mechanism in Peer-to-Peer Systems.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Firewalks: Discovery Mechanism for Non-Replicable Reusable Resources.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data.
Proceedings of the Human-Computer Interaction. HCI Intelligent Multimodal Interaction Environments, 2007

Voice Alarm System in Emergency Evacuation.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2007

The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2007

Chinese Color Preference in Software Design.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2007

2006
Saving Face or Sharing Personal Information? A Cross-Cultural Study on Knowledge Sharing.
JIKM, 2006

2005
Connectivity exploration with structural equation modeling: an fMRI study of bimanual motor coordination.
NeuroImage, 2005

2004
Controlling Who Tracks Me.
Proceedings of the Security Protocols, 2004

2003
Human performance modeling in temporary segmentation Chinese character handwriting recognizers.
Int. J. Hum.-Comput. Stud., 2003

Validating and Securing Spontaneous Associations between Wireless Devices.
Proceedings of the Information Security, 6th International Conference, 2003

Secure Spontaneous Device Association.
Proceedings of the UbiComp 2003: Ubiquitous Computing, 2003

2002
Your 80211 wireless network has no clothes.
IEEE Wireless Commun., 2002

Context Authentication Using Constrained Channels.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

An authorization infrastructure for nomadic computing.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Authentication and Authorization of Mobile Clients in Public Data Networks.
Proceedings of the Infrastructure Security, International Conference, 2002

1998
WebGroup: A Secure Group Access Control Tool for the World-Wide Web.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Efficient Protocols for Signing Routing Messages.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
Threshold Proxy Signature Schemes.
Proceedings of the Information Security, First International Workshop, 1997

On Rough Sets and Inference Analysis.
Proceedings of the Information Security, First International Workshop, 1997

IRI: A Quantitative Approach to Inference Analysis in Relational Databases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Theory for System Security.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997


  Loading...