Xi Sun

Orcid: 0000-0001-7649-8018

According to our database1, Xi Sun authored at least 54 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding.
Appl. Intell., December, 2023

Exploring nonlinear spatiotemporal effects for personalized next point-of-interest recommendation.
Frontiers Inf. Technol. Electron. Eng., September, 2023

Dynamical analysis of four-dimensional chaotic system and its application in image encryption.
Multim. Tools Appl., 2023

A four-dimensional chaotic system with coexisting attractors and its backstepping control and synchronization.
Integr., 2023

3DFusion, A real-time 3D object reconstruction pipeline based on streamed instance segmented data.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

RFT: Toward Highly Reliable Flow Data Transmission in Network Measurement.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

2022
The Comparison, Analysis and Circuit Implementation of the Chaotic Systems.
J. Circuits Syst. Comput., 2022

A memristive chaotic system with rich dynamical behavior and circuit implementation.
Integr., 2022

A Novel Memristor-Based Dynamical System with Chaotic Attractor and Periodic Bursting.
Int. J. Bifurc. Chaos, 2022

Visual Localization Through Virtual Views.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022

A Breast Ultrasound Tumor Detection Framework Using Convolutional Neural Networks.
Proceedings of the BIC 2022: 2nd International Conference on Bioinformatics and Intelligent Computing, Harbin, China, January 21, 2022

2021
Incorporating Memory-Based Preferences and Point-of-Interest Stickiness into Recommendations in Location-Based Social Networks.
ISPRS Int. J. Geo Inf., 2021

Substring-searchable attribute-based encryption and its application for IoT devices.
Digit. Commun. Networks, 2021

Real-Time Mission Planning Simulations from Geospatial Data.
Proceedings of the 25th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2021

2020
Analysis of Clinical Features and Endoscopic Ultrasonography in the Diagnosis of Gastric Submucosal Tumors.
J. Medical Imaging Health Informatics, 2020

Location-based data access control scheme for Internet of Vehicles.
Comput. Electr. Eng., 2020

BUDI: Building Urban Designs Interactively Can Spatial-Based Collaboration be Seamless?
Proceedings of the SUI '20: Symposium on Spatial User Interaction, Virtual Event, Canada, October 31, 2020

When We First Met: Visual-Inertial Person Localization for Co-Robot Rendezvous.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

2019
Modular architecture of metabolic brain network and its effects on the spread of perturbation impact.
NeuroImage, 2019

2018
Which gray level should be given the smallest cost for adaptive steganography?
Multim. Tools Appl., 2018

Incorporating Description Embeddings into Medical Knowledge Graphs Representation Learning.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

2017
Understanding the Impact of Employing Relay Node on Wireless Networks.
IEEE Trans. Veh. Technol., 2017

Robust Face Recognition With Kernelized Locality-Sensitive Group Sparsity Representation.
IEEE Trans. Image Process., 2017

2015
Robust Face Recognition with Locality-Sensitive Sparsity and Group Sparsity Constraints.
Proceedings of the Image and Graphics - 8th International Conference, 2015

2014
Toward quantum-resistant strong designated verifier signature.
Int. J. Grid Util. Comput., 2014

Versatile identity-based signatures for authentication in multi-user settings.
Int. J. Grid Util. Comput., 2014

Improving the Load Balance of MapReduce Operations based on the Key Distribution of Pairs.
CoRR, 2014

2012
On constructing 1-cheating immune secret-sharing functions.
Int. J. Comput. Math., 2012

Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Cost-Effective Approach to Delivering Analytics as a Service.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

2011
Towards Delivering Analytical Solutions in Cloud: Business Models and Technical Challenges.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Deliver Bioinformatics Services in Public Cloud: Challenges and Research Framework.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

A Non-intrusive Multi-tenant Database Software for Large Scale SaaS Application.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

2010
Self-Adaptive Resource Management for Large-Scale Shared Clusters.
J. Comput. Sci. Technol., 2010

Model-assisted face reconstruction based on binocular stereo.
Proceedings of the Visual Communications and Image Processing 2010, 2010

2009
An Approach to Constructing High-Available Decentralized Systems via Self-Adaptive Components.
Int. J. Softw. Eng. Knowl. Eng., 2009

A Robust Algorithm for Color Correction between Two Stereo Images.
Proceedings of the Computer Vision, 2009

Performance analysis and tuning of variable-structure PID controllers for level process.
Proceedings of the IEEE International Conference on Control Applications, 2009

2008
A new blowdown compensation scheme for boiler leak detection.
Proceedings of the American Control Conference, 2008

Variable-structure PI controller for tank level process.
Proceedings of the American Control Conference, 2008

2007
A New Public-Key Encryption Scheme.
J. Comput. Sci. Technol., 2007

The security analyses of RosettaNet in Grid.
Comput. Stand. Interfaces, 2007

Towards Constructing High-available Decentralized Systems via Self-adaptive Components.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

2006
An agent-based approach to composing web services to support adaptable business processes.
Multiagent Grid Syst., 2006

2005
Security analysis and improvement of a double-trapdoor encryption scheme.
Appl. Math. Comput., 2005

Towards a unified formal model for supporting mechanisms of dynamic component update.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

A Virtual Bridge Certificate Authority Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2003
Squeezing branch and bound algorithm for the machine-fixed, machining-assembly flowshop scheduling problem.
Int. J. Manuf. Technol. Manag., 2003

Powerful heuristics to minimize makespan in fixed, 3-machine, assembly-type flowshop scheduling.
Eur. J. Oper. Res., 2003

2001
Detecting leaks and sensor biases by recursive identification with forgetting factors.
Proceedings of the 40th IEEE Conference on Decision and Control, 2001

2000
A multivariable bilinear adaptive controller with decoupling design.
IEEE Trans. Autom. Control., 2000

1998
Intelligent multivariable fault tolerant control systems.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

1994
Adaptive stabilization of bilinear systems.
IEEE Trans. Autom. Control., 1994


  Loading...