Xiaojun Zhang

According to our database1, Xiaojun Zhang authored at least 159 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Event-triggered consensus strategy for uncertain topological fractional-order multiagent systems based on Takagi-Sugeno fuzzy models.
Inf. Sci., 2021

Investigation and Evaluation of Glottal Flow Waveform for Voice Pathology Detection.
IEEE Access, 2021

2020
Self-Calibrated Absolute Thickness Measurement of Opaque Specimen Based on Differential White Light Interferometry.
IEEE Trans. Instrum. Meas., 2020

Delay-Dependent Fuzzy Sampled-Data Synchronization of T-S Fuzzy Complex Networks With Multiple Couplings.
IEEE Trans. Fuzzy Syst., 2020

Optimization Design and Flexible Detection Method of Wall-Climbing Robot System with Multiple Sensors Integration for Magnetic Particle Testing.
Sensors, 2020

Disturbance Recognition and Collision Detection of Manipulator Based on Momentum Observer.
Sensors, 2020

Further results on finite-time synchronization of delayed inertial memristive neural networks via a novel analysis method.
Neural Networks, 2020

ICT for Development in Rural India: A Longitudinal Study of Women's Health Outcomes.
MIS Q., 2020

Predictive analysis of impact hazard level of coal rock mass based on fuzzy inference network.
J. Intell. Fuzzy Syst., 2020

Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems.
J. Inf. Secur. Appl., 2020

Efficient light-weight private auditing scheme for cloud-based wireless body area networks.
Int. J. Electron. Secur. Digit. Forensics, 2020

Discriminant analysis of mine quake type and intensity based on a deep neural network.
Int. J. Comput. Integr. Manuf., 2020

Vocal cord abnormal voice flow field study by modeling a bionic vocal system.
Adv. Robotics, 2020

Finite-time stability for fractional-order complex-valued neural networks with time delay.
Appl. Math. Comput., 2020

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs.
IEEE Access, 2020

Corpora for Document-Level Neural Machine Translation.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

Application and Evaluation of NovaSurfacing Technology.
Proceedings of the 5th IEEE International Conference on Intelligent Transportation Engineering, 2020

Influence of Microcultural Information Flow on the Value Education in American Universities and its Countermeasures.
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020

2019
Training, Enhancing, Evaluating and Using MT Systems with Comparable Data.
Proceedings of the Using Comparable Corpora for Under-Resourced Areas of Machine Translation, 2019

A new publicly verifiable data possession on remote storage.
J. Supercomput., 2019

Distributed Measurement of Polarization Characteristics for a Multifunctional Integrated Optical Chip: A Review.
IEEE Trans. Instrum. Meas., 2019

Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive Mob. Comput., 2019

Experimental Study on the Aperture of Geomagnetic Location Arrays.
J. Sensors, 2019

A Risk Mitigation Framework for Information Technology Projects: A Cultural Contingency Perspective.
J. Manag. Inf. Syst., 2019

DSTL: Solution to Limitation of Small Corpus in Speech Emotion Recognition.
J. Artif. Intell. Res., 2019

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

Novel results on dissipativity analysis for generalized delayed neural networks.
Neurocomputing, 2019

Global synchronization of time-invariant uncertainty fractional-order neural networks with time delay.
Neurocomputing, 2019

Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS.
Int. J. Electron. Secur. Digit. Forensics, 2019

New reliable nonuniform sampling control for uncertain chaotic neural networks under Markov switching topologies.
Appl. Math. Comput., 2019

New Stability Criteria of Discrete Systems With Time-Varying Delays.
IEEE Access, 2019

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System.
IEEE Access, 2019

Co-Channel Multi-Signal Modulation Classification Based on Convolution Neural Network.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

A Puncturing Algorithm for Mixing 2-Kernel and 3-Kernel Polar Codes.
Proceedings of the Wireless and Satellite Systems, 2019

Acoustic Characteristics of Normal and Pathological Voices Analysis and Recognition.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wirel. Pers. Commun., 2018

High-Throughput Fast-SSC Polar Decoder for Wireless Communications.
Wirel. Commun. Mob. Comput., 2018

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Secur. Commun. Networks, 2018

Reliability design of battery management system for power battery.
Microelectron. Reliab., 2018

Lattice-based searchable public-key encryption scheme for secure cloud storage.
Int. J. Web Grid Serv., 2018

Global asymptotic synchronization of nonidentical fractional-order neural networks.
Neurocomputing, 2018

Efficient multi-receiver identity-based signcryption from lattice assumption.
Int. J. Electron. Secur. Digit. Forensics, 2018

An improved authentication protocol-based dynamic identity for multi-server environments.
Int. J. Distributed Sens. Networks, 2018

From Design Principles to Impacts: A Theoretical Framework and Research Agenda.
AIS Trans. Hum. Comput. Interact., 2018

Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes.
IEEE Access, 2018

Active Disturbance Rejection Control of a Flying-Wing Tailsitter in Hover Flight.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Simplified Early Stopping Criterion for Polar Codes.
Proceedings of the 2018 IEEE International Conference on Signal Processing, 2018

A Hybrid Coding Strategy to Improve Auditory Perception of Cochlear Implant.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

A Biometrics-Based Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Three-Factor Remote Authentication Scheme for Multi-server Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Control System Design of Reactor Robot for Object Salvaging Underwater.
Proceedings of the Communications, Signal Processing, and Systems, 2018

A High-Performance Synchronous Energy-Saving Algorithm for Wireless Sensor Networks.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

A novel and robust approach for pro-drop language translation.
Mach. Transl., 2017

A Nomological Network of Knowledge Management System Use: Antecedents and Consequences.
MIS Q., 2017

Knowledge Management System Use and Job Performance: A Multilevel Contingency Model.
MIS Q., 2017

Exponential response electrical pole-changing method for a five-phase induction machine with a current sliding mode control strategy.
Frontiers Inf. Technol. Electron. Eng., 2017

A Method to Remotely Track a Magnetic Target Using a Scalar Magnetometer Array.
J. Sensors, 2017

Experimental Study on the Localization of Moving Object by Total Geomagnetic Field.
J. Sensors, 2017

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017

Spee-Navi: An Indoor Navigation System via Speech Crowdsourcing.
Proceedings of the First International Workshop on Human-centered Sensing, 2017

Kinematics and singularity analysis of a 3-RPS parallel mechanism.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Performance analysis of 3-(HS)S/S parallel ankle rehabilitation robot.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Pathological voice recognition by deep neural network.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Identification of vocal nodules and laryngitis by Gauss mixture model.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Subdividing of pathological voice based on vocal tract area.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Is Socializing Loyalty Programs a Good Idea? - Empirical Evidence from a Large Quick Service Restaurant Chain.
Proceedings of the International Conference on Information Systems, 2017

A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

A Security and Efficiency Authentication Scheme Based on Human-Memorable Password.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
An efficient designated verifier signature scheme with pairing-free and low cost.
Secur. Commun. Networks, 2016

智能主体的等级BDI(信念、愿望和意图)模型 (Graded Belief-Desire-Intention (BDI) Models for Agent Architectures).
计算机科学, 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016

An Efficient Dynamic Group Signature with Non-frameability.
KSII Trans. Internet Inf. Syst., 2016

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
Inf., 2016

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
Int. J. Netw. Secur., 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016

A new group signature scheme for dynamic membership.
Int. J. Electron. Secur. Digit. Forensics, 2016

Semi-automatic Simultaneous Interpreting Quality Evaluation.
CoRR, 2016

Foot end trajectory with small oscillation generation method of the adjustable stiffness active flexible joint robot.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

A Novel Approach to Dropped Pronoun Translation.
Proceedings of the NAACL HLT 2016, 2016

Automatic Construction of Discourse Corpora for Dialogue Translation.
Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, 2016

Perception auditory factor for speaker recognition in noisy environment.
Proceedings of the 12th International Conference on Natural Computation, 2016

Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

Dropped pronoun generation for dialogue machine translation.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Speech endpoint detection in noisy environment using Spectrogram Boundary Factor.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
MIMO Radar Transmit Beampattern Matching Design.
IEEE Trans. Signal Process., 2015

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

Do Temporary Increases in Information Asymmetry Affect the Cost of Equity?
Manag. Sci., 2015

一种基于像素梯度信息的背景减除法 (Background Subtraction Based on Local Gradient Feature).
计算机科学, 2015

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

The visible foreign matter visual detecting algorithm research in oral liquid.
J. Comput. Methods Sci. Eng., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015

Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability.
Eur. J. Inf. Syst., 2015

Track modeling and an optimization method for tracked robots.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

The DCU Discourse Parser for Connective, Argument Identification and Explicit Sense Classification.
Proceedings of the 19th Conference on Computational Natural Language Learning: Shared Task, 2015

A Context-Aware Approach for Dynamic GUI Testing of Android Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Chengqing Zong: Statistical natural language processing (second edition) - Tsinghua University Press, 2013, xxxv+570pp.
Mach. Transl., 2014

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2014

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Efficient forward secure identity-based shorter signature from lattice.
Comput. Electr. Eng., 2014

Development of a lower limb rehabilitation robot based on free gait and virtual reality.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014

Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Explaining Employee Job Performance: The Role of Online and Offline Workplace Communication Networks.
MIS Q., 2013

A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013

Development of an underwater robot for nuclear reactor vessel.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Rehabilitative motion planning for upper limb rehabilitation robot based on virtual reality.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Simulation analysis of passive adaptive robot's tip-over stability.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Free gait generation based on discretization for a hexapod robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

The research on data processing method of the underwater micro range finder.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Reconstruction of bidirectional predicted residual for stereoscopic video based on compressed sensing.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic Logic.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Patients' perceptions of web self-service applications in primary healthcare.
Proceedings of the Health Informatics: Building a Healthcare Future Through Trusted Information, 2012

2011
Designing Collaborative Systems to Enhance Team Performance.
J. Assoc. Inf. Syst., 2011

"Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation.
Inf. Syst. Res., 2011

Michael W. Berry and Jacob Kogan (eds.): Text mining: applications and theory - John Wiley and Sons, Ltd, 2010, xiv + 207 pp, £55.00/€66.00, hardcover, ISBN: 978-0-470-74982-1.
Inf. Retr., 2011

DFKI Hybrid Machine Translation System for WMT 2011 - On the Integration of SMT and RBMT.
Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011

'Just What the Doctor Ordered': A Revised UTAUT for EMR System Adoption and Use by Doctors.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Secure DHCPv6 that uses RSA authentication integrated with Self-Certified Address.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Host Proteome Research in HIV Infection.
Genom. Proteom. Bioinform., 2010

Transcriptomics and Proteomics in the Study of H1N1 2009.
Genom. Proteom. Bioinform., 2010

Basing on the olfaction and vision information fusion for robot's odor source localization.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Research on the walking gait coordinations of the lower limb rehabilitation robot.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Research on the mobile robot's odor source localization by biomimetics.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Constructing Performance Management Information System for Academic Staff: A Model for Research-intensive Universities.
Proceedings of the International Conference on E-Business and E-Government, 2010

Designing Collaborative Systems for Better Knowledge Management and Team Performance.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The fuzzy integrated evaluate method of translation quality.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Role of collective ownership and coding standards in coordinating expertise in software project teams.
Eur. J. Inf. Syst., 2009

Noise Effect Analysis on a Spatial Ecosystem.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Autocorrelation Smooth Method for Stochastic Media Tomography.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A More Strict Definition of Steady State Degree Distribution.
Proceedings of the Complex Sciences, 2009

Numerical Simulation of Blood Flow in Internal Carotid Artery Aneurysm.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values.
Inf. Syst. Frontiers, 2008

A WSD Model for Corpus Construction.
Int. J. Comput. Process. Orient. Lang., 2008

Design of a Modular Bionic Olfaction System for Robot.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Biologically-Inspired Search Strategy for Locating Odor Source.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Students Interactions and Course Performance: Impacts of Online and Offline Networks.
Proceedings of the International Conference on Information Systems, 2008

Fuzzy-Set Based Fast Edge Detection of Medical Image.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

The Fourier Spectrum Analysis of Optical Feedback Self-Mixing Signal under Weak and Moderate Feedback.
Proceedings of the 4th IEEE International Symposium on Electronic Design, 2008

2007
Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes.
Proceedings of the Knowledge Science, 2007

The application of region-ecological-economy theory in western China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Urban environmental evaluation in Beijings residential districts and communities.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

2006
HuaZhong University of Science and Technology at TRECVID 2006.
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006

Design and Kinematics Analysis of Parallel Robots for Ankle Rehabilitation.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

The Study on the Re-constructing Poor Spots in Beijing.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

The Research on Evaluation Beijings Residential Environment by 8000 Questionnaires.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

An Improved Real-Time Natural Feature Tracking Algorithm for AR Application.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

2005
Dingxi prefecture of Gansu Province's development of rainwater collection and water-saving irrigation to combat the arid environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Research on the effects of land use change on ecosystem services value of Loess Plateau - a case study of Longxi County.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A study on remote sensing key technologies of national monitoring resource, ecological and environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
Early Validation of Deployment and Scheduling Constraints for MSC Specifications.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

2003
From MSC to SDL: Overview and an Application to the Autonomous Shuttle Transport System.
Proceedings of the Scenarios: Models, 2003


  Loading...