Xiao Zhong

Orcid: 0000-0002-5089-6269

According to our database1, Xiao Zhong authored at least 25 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Automatic identification of suspicious bone metastatic lesions in bone scintigraphy using convolutional neural network.
BMC Medical Imaging, 2021

2019
Real-time frequency regulation using aggregated electric vehicles in smart grid.
Comput. Ind. Eng., 2019

2018
Optimal scheduling of manufacturing and onsite generation systems in over-generation mitigation oriented electricity demand response program.
Comput. Ind. Eng., 2018

2017
A comprehensive cluster and classification mining procedure for daily stock market return forecasting.
Neurocomputing, 2017

Forecasting daily stock market return using dimensionality reduction.
Expert Syst. Appl., 2017

2015
Stackelberg Game Modeling of Pricing for Mobile Virtual Network Operators.
EAI Endorsed Trans. Future Intell. Educ. Environ., 2015

2014
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A new direct torque controller to reduce torque ripple for permanent magnet synchronous motor drives.
Proceedings of the IECON 2013, 2013

2012
An Inverse Problem for the p-Laplacian: Boundary Determination.
SIAM J. Math. Anal., 2012

Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions.
IACR Cryptol. ePrint Arch., 2012

2011
A novel heuristic algorithm for QoS-aware end-to-end service composition.
Comput. Commun., 2011

Restrictive mechanism of flow control among non-cooperative Internet users.
Sci. China Inf. Sci., 2011

2010
THOR: A performance analysis tool for Java applications running on multicore systems.
IBM J. Res. Dev., 2010

A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010

Using the middle tier to understand cross-tier delay in a multi-tier application.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Power Management in Heterogeneous Multi-tier Web Clusters.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Correlation Based File Prefetching Approach for Hadoop.
Proceedings of the Cloud Computing, Second International Conference, 2010

A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: A Case Study by PowerPoint Files.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Understanding cross-tier delay of multi-tier application using selective invocation context extraction.
Proceedings of the Middleware 2008, 2009

A Mixed Software Rejuvenation Policy for Multiple Degradations Software System.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Performance Implications of Next-Generation Multi-processing Platforms on e-Business Server Applications.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008


  Loading...