Xiao Yi

According to our database1, Xiao Yi authored at least 31 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
No-reference quality assessment of underwater image enhancement.
Displays, January, 2024

Social media user information security encryption method based on chaotic algorithm.
Int. J. Web Based Communities, 2024

2023
DPHL v.2: An updated and comprehensive DIA pan-human assay library for quantifying more than 14,000 proteins.
Patterns, July, 2023

A Method for Autonomous Generation of High-Precision Time Scales for Navigation Constellations.
Sensors, February, 2023

Linear building pattern recognition via spatial knowledge graph.
CoRR, 2023

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

A Hybrid Kernel Pruning Approach for Efficient and Accurate CNNs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
A novel systolic array processor with dynamic dataflows.
Integr., 2022

A node screening algorithm for wireless sensor network based on threshold measurement.
Int. J. Inf. Comput. Secur., 2022

iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition.
CoRR, 2022

An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

SparG: A Sparse GEMM Accelerator for Deep Learning Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR, 2021

AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets.
CoRR, 2021

2020
Enhanced Darknet53 Combine MLFPN Based Real-Time Defect Detection in Steel Surface.
Proceedings of the Pattern Recognition and Computer Vision, Third Chinese Conference, 2020

2019
Improvements on Correlation Coefficients of Hesitant Fuzzy Sets and Their Applications.
Cogn. Comput., 2019

2018
Multi-Attribute Decision Making with Interval-Valued Hesitant Fuzzy Information, a Novel Synthetic Grey Relational Degree Method.
Informatica, 2018

Belief intervals aggregation.
Int. J. Intell. Syst., 2018

Synthetic Correlation Coefficient Between Hesitant Fuzzy Sets with Applications.
Int. J. Fuzzy Syst., 2018

Grey relational analysis between hesitant fuzzy sets with applications to pattern recognition.
Expert Syst. Appl., 2018

An innovative TOPSIS approach based on hesitant fuzzy correlation coefficient and its applications.
Appl. Soft Comput., 2018

Conflict Evidence Measurement Based on the Weighted Separate Union Kernel Correlation Coefficient.
IEEE Access, 2018

2017
Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2015
An achievability scheme for downlink multicell processing with finite backhaul capacity: The general case.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

2012
A Novel Centroid Localization for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

2011
The application research of virtual reality technology in emergency evacuation simulation of sports stadium.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
A novel environment self-adaptive localization algorithm based on RSSI for wireless sensor networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Generating 3D architectural models based on hand motion and gesture.
Comput. Ind., 2009

2008
Model Analyses on Message Stream Transmission in P2P-SIP.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2005
Attribute measure recognition approach and its applications to emitter recognition.
Sci. China Ser. F Inf. Sci., 2005


  Loading...