Shixiong Wang

Orcid: 0000-0002-4272-1864

According to our database1, Shixiong Wang authored at least 45 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Distributionally Robust State Estimation for Jump Linear Systems.
IEEE Trans. Signal Process., 2023

Learning Against Distributional Uncertainty: On the Trade-off Between Robustness and Specificity.
CoRR, 2023

Privacy Preserving Outsourced K-means Clustering Using Kd-tree.
Proceedings of the Provable and Practical Security, 2023

Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data.
Proceedings of the Network and System Security - 17th International Conference, 2023

2022
Distributionally Robust State Estimation for Linear Systems Subject to Uncertainty and Outlier.
IEEE Trans. Signal Process., 2022

Distributionally Robust State Estimation for Nonlinear Systems.
IEEE Trans. Signal Process., 2022

ROPHS: Determine Real-Time Status of a Multi-Carriage Logistics Train at Airport.
IEEE Trans. Intell. Transp. Syst., 2022

Robot Cooking With Stir-Fry: Bimanual Non-Prehensile Manipulation of Semi-Fluid Objects.
IEEE Robotics Autom. Lett., 2022

Mechanical design and wheel-leg-body cooperation control of a step-climbing robot.
J. Field Robotics, 2022

Distributional Robustness Bounds Generalization Errors.
CoRR, 2022

2021
Robust State Estimation for Linear Systems Under Distributional Uncertainty.
IEEE Trans. Signal Process., 2021

A Theoretical Revisit to Linear Convergence for Saddle Point Problems.
ACM Trans. Intell. Syst. Technol., 2021

Denoising, Outlier/Dropout Correction, and Sensor Selection in Range-Based Positioning.
IEEE Trans. Instrum. Meas., 2021

A Model for Non-Stationary Time Series and its Applications in Filtering and Anomaly Detection.
IEEE Trans. Instrum. Meas., 2021

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021

Accurate Tracking, Collision Detection, and Optimal Scheduling of Airport Ground Support Equipment.
IEEE Internet Things J., 2021

ANINet: a deep neural network for skull ancestry estimation.
BMC Bioinform., 2021

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.
Adv. Math. Commun., 2021

2020
The Arm Planning with Dynamic Movement Primitive for Humanoid Service Robot.
Proceedings of the 5th International Conference on Advanced Robotics and Mechatronics, 2020

2019
Optimal joint estimation and identification theorem to linear Gaussian system with unknown inputs.
Signal Process., 2019

Chinese online public opinions on the Two-Child Policy.
Online Inf. Rev., 2019

基于统计形状模型的颅骨自动性别识别 (Automatic Sex Determination of Skulls Based on Statistical Shape Model).
计算机科学, 2019

Identifying target audience on enterprise social network.
Ind. Manag. Data Syst., 2019

Simplified Revocable Hierarchical Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2019

Online Non-stationary Time Series Analysis and Processing.
CoRR, 2019

Why Are the ARIMA and SARIMA not Sufficient.
CoRR, 2019

Improved cluster collaboration algorithm based on wolf pack behavior.
Clust. Comput., 2019

Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.
Adv. Math. Commun., 2019

Research on a New-Style Under-Actuated Omnidirectional Mobile Robot Based on Special Coupling Drive System.
IEEE Access, 2019

Attention-Based Character-Word Hybrid Neural Networks With Semantic and Structural Information for Identifying of Urgent Posts in MOOC Discussion Forums.
IEEE Access, 2019

Similarity Measurement Between Reconstructed 3D Face and 2D Face Based on Deep Learning.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

Reconstructed Face Recognition.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

2018
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018

The Definition and Numerical Method of Final Value Problem and Arbitrary Value Problem.
Comput. Syst. Sci. Eng., 2018

A better bound for implicit factorization problem with shared middle bits.
Sci. China Inf. Sci., 2018

Skull Gender Identification Based on Skull Contour and Convolutional Neural Network.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Technology implementation of TPN on air-to-ground stationary target attack.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2016
Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots.
Int. J. Networked Distributed Comput., 2016

A novel fuzzy omni-directional gait planning algorithm for biped robot.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Opinion dynamics on online-offline interacting networks: media influence and antagonistic interaction.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

Cooperative task assignment of uninhabited combat air vehicles based on improved MOSFLA algorithm.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

2015
A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Humanoid robot's omnidirectional walking.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2007
Approaches to Context-Based Knowledge Share and Reuse.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...