Xiaojun Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Long-time adaptive coherent detection of small targets in sea clutter by fast inversion algorithm of block tridiagonal speckle covariance matrices.
Signal Process., April, 2024

A real-time framework for HD video defogging using modified dark channel prior.
J. Real Time Image Process., April, 2024

A depthwise separable CNN-based interpretable feature extraction network for automatic pathological voice detection.
Biomed. Signal Process. Control., February, 2024

Compound-Gaussian Model with Nakagami-Distributed Textures for High-Resolution Sea Clutter at Medium/High Grazing Angles.
Remote. Sens., January, 2024

Meaning-making in virtual learning environment enabled educational innovations: a 13-year longitudinal case study.
Interact. Learn. Environ., January, 2024

IFAN: An Icosahedral Feature Attention Network for Sound Source Localization.
IEEE Trans. Instrum. Meas., 2024

Disturbance-observer-based control for non-homogeneous semi-Markov jump systems with time-varying delays.
J. Frankl. Inst., 2024

Gradable ChatGPT Translation Evaluation.
CoRR, 2024

2023
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation.
Peer Peer Netw. Appl., November, 2023

<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023

A country's national culture affects virtual learning environment adoption in higher education: a systematic review (2001-2020).
Interact. Learn. Environ., October, 2023

Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things.
IEEE Syst. J., September, 2023

LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023

Optimization Design and Parameter Analysis of a Wheel with Array Magnets.
Symmetry, April, 2023

Design and Analysis of a Wheel-Leg Hybrid Robot with Passive Transformable Wheels.
Symmetry, March, 2023

BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023

Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023

Similar or Unknown Fault Mode Detection of Aircraft Fuel Pump Using Transfer Learning With Subdomain Adaption.
IEEE Trans. Instrum. Meas., 2023

KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government.
J. Syst. Archit., 2023

Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems.
J. Syst. Archit., 2023

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023

Predicting possible antiviral drugs against COVID-19 based on Laplacian regularised least squares and similarity kernel fusion.
Int. J. Comput. Sci. Eng., 2023

Alternative Telescopic Displacement: An Efficient Multimodal Alignment Method.
CoRR, 2023

Torque-Type Backlash Inverse Control for an Electromechanical Actuator With Active Disturbance Rejection.
IEEE Access, 2023

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

BFT Consensus Algorithms.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Practical Attribute-Based Multi-keyword Search Scheme with Sensitive Information Hiding for Cloud Storage Systems.
Proceedings of the Combinatorial Optimization and Applications, 2023

A Low-complexity Max Unpooling Achitecture for CNNs.
Proceedings of the 15th IEEE International Conference on ASIC, 2023

2022
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022

New Infinite Family of Sequences Almost Over Q<sub>8</sub> With Ideal Autocorrelation.
IEEE Trans. Inf. Theory, 2022

Metrological Traceability of High Polarization Extinction Ratio (PER) Based on Precision Coaxial Rotating Polarization-Maintaining Fiber.
IEEE Trans. Instrum. Meas., 2022

Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2022

Hybrid Event-Triggered and Impulsive Control Strategy for Multiagent Systems With Switching Topologies.
IEEE Trans. Cybern., 2022

Magnetic Circuit Analysis of Halbach Array and Improvement of Permanent Magnetic Adsorption Device for Wall-Climbing Robot.
Symmetry, 2022

Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme With Reward Mechanism.
IEEE Syst. J., 2022

Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022

Target Enclosing and Coverage Control for Quadrotors with Constraints and Time-Varying Delays: A Neural Adaptive Fault-Tolerant Formation Control Approach.
Sensors, 2022

Frenemies: Corporate Advertising Under Common Ownership.
Manag. Sci., 2022

Adaptive Magnetic Anomaly Detection Method Using Support Vector Machine.
IEEE Geosci. Remote. Sens. Lett., 2022

Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022

Adaptive fuzzy control for quasi-synchronization of uncertain complex dynamical networks with time-varying topology via event-triggered communication strategy.
Inf. Sci., 2022

Fixed-time synchronization of fractional-order complex-valued neural networks with time-varying delay via sliding mode control.
Neurocomputing, 2022

Implementation of fitness and health management system utilising deep learning neural network and internet of things technology.
Int. J. Grid Util. Comput., 2022

An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder.
IEEE Commun. Lett., 2022

An Enhanced Belief Propagation Flipping Decoder for Polar Codes with Stepping Strategy.
Entropy, 2022

The Analysis of the Power Law Feature in Complex Networks.
Entropy, 2022

Role of perceived self-efficacy in automated project allocation: Measuring university students' perceptions of justice in interdisciplinary project-based learning.
Comput. Hum. Behav., 2022

Self-Compliant Track-Type Wall-Climbing Robot for Variable Curvature Facade.
IEEE Access, 2022

Robust Secure Aggregation with Lightweight Verification for Federated Learning.
Proceedings of the IEEE International Conference on Trust, 2022

Design and Development of a Medicine Box Recognition System Based on Machine Vision.
Proceedings of the 8th International Conference on Systems and Informatics, 2022

Reliability analysis of electric hydraulic servo system of large-caliber naval gun based on GO-FLOW methodology.
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022

Research on fault type diagnosis method of transmission line based on multi-source information fusion of operation inspection and control platform.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

A Surface-Ship Trajectory Data Compression Algorithm based on Douglas-Peucker Algorithm.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

The Influence of Threshold on Sliding Window Algorithm for Surface-Ship Trajectory Compression.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

BP Flip Decoding Algorithm of Polar Code Based on Convolutional Neural Network.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Lightweight Many-to-Many Anonymous Authenticated Key Agreement Scheme for Intelligent Vehicular Ad-hoc Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks.
Wirel. Pers. Commun., 2021

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021

Person Re-Identification over Encrypted Outsourced Surveillance Videos.
IEEE Trans. Dependable Secur. Comput., 2021

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021

Application of human motion recognition utilizing deep learning and smart wearable device in sports.
Int. J. Syst. Assur. Eng. Manag., 2021

ICAS: Two-factor identity-concealed authentication scheme for remote-servers.
J. Syst. Archit., 2021

Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective.
J. Manag. Inf. Syst., 2021

New fractional-order integral inequalities: Application to fractional-order systems with time-varying delay.
J. Frankl. Inst., 2021

Event-triggered consensus strategy for uncertain topological fractional-order multiagent systems based on Takagi-Sugeno fuzzy models.
Inf. Sci., 2021

Delay-dependent consensus criteria for fractional-order Takagi-Sugeno fuzzy multi-agent systems with time delay.
Inf. Sci., 2021

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021

DLSTM-Based Successive Cancellation Flipping Decoder for Short Polar Codes.
Entropy, 2021

Robust Control of Winding-Based DC-Bus Capacitor Discharge for PMSM Drives in Electric Vehicles.
IEEE Access, 2021

A New Decomposition-Based Many-Objective Algorithm Based on Adaptive Reference Vectors and Fractional Dominance Relation.
IEEE Access, 2021

DC-Bus Capacitor Maximum Power Discharge Strategy for EV-PMSM Drive System With Small Safe Current.
IEEE Access, 2021

Resilient Security Filtering for Networked Switched Systems With Event-Driven Measurements.
IEEE Access, 2021

Investigation and Evaluation of Glottal Flow Waveform for Voice Pathology Detection.
IEEE Access, 2021

Design of Quadruped robot single-leg system by Ionic polymer metal composites actuators array.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

Topological and Optimal Design of Grasping Manipulator for Obstacle Crossing Vehicle with Foldable Operating Arm.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

Research and application of internal malicious code threat detection system.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Reliability analysis and calculation of large caliber naval gun recoil process based on GO methodology and multi-state combination.
Proceedings of the 3rd International Conference on Artificial Intelligence and Advanced Manufacture, 2021

Short Term Load Forecasting Method of Smart Grid Based on RB XGboost Algorithm.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Self-Calibrated Absolute Thickness Measurement of Opaque Specimen Based on Differential White Light Interferometry.
IEEE Trans. Instrum. Meas., 2020

Delay-Dependent Fuzzy Sampled-Data Synchronization of T-S Fuzzy Complex Networks With Multiple Couplings.
IEEE Trans. Fuzzy Syst., 2020

Optimization Design and Flexible Detection Method of Wall-Climbing Robot System with Multiple Sensors Integration for Magnetic Particle Testing.
Sensors, 2020

Disturbance Recognition and Collision Detection of Manipulator Based on Momentum Observer.
Sensors, 2020

Further results on finite-time synchronization of delayed inertial memristive neural networks via a novel analysis method.
Neural Networks, 2020

ICT for Development in Rural India: A Longitudinal Study of Women's Health Outcomes.
MIS Q., 2020

Predictive analysis of impact hazard level of coal rock mass based on fuzzy inference network.
J. Intell. Fuzzy Syst., 2020

Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems.
J. Inf. Secur. Appl., 2020

Efficient light-weight private auditing scheme for cloud-based wireless body area networks.
Int. J. Electron. Secur. Digit. Forensics, 2020

Discriminant analysis of mine quake type and intensity based on a deep neural network.
Int. J. Comput. Integr. Manuf., 2020

Vocal cord abnormal voice flow field study by modeling a bionic vocal system.
Adv. Robotics, 2020

Finite-time stability for fractional-order complex-valued neural networks with time delay.
Appl. Math. Comput., 2020

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs.
IEEE Access, 2020

Corpora for Document-Level Neural Machine Translation.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

Application and Evaluation of NovaSurfacing Technology.
Proceedings of the 5th IEEE International Conference on Intelligent Transportation Engineering, 2020

Influence of Microcultural Information Flow on the Value Education in American Universities and its Countermeasures.
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020

2019
Training, Enhancing, Evaluating and Using MT Systems with Comparable Data.
Proceedings of the Using Comparable Corpora for Under-Resourced Areas of Machine Translation, 2019

A new publicly verifiable data possession on remote storage.
J. Supercomput., 2019

Distributed Measurement of Polarization Characteristics for a Multifunctional Integrated Optical Chip: A Review.
IEEE Trans. Instrum. Meas., 2019

Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive Mob. Comput., 2019

Experimental Study on the Aperture of Geomagnetic Location Arrays.
J. Sensors, 2019

A Risk Mitigation Framework for Information Technology Projects: A Cultural Contingency Perspective.
J. Manag. Inf. Syst., 2019

DSTL: Solution to Limitation of Small Corpus in Speech Emotion Recognition.
J. Artif. Intell. Res., 2019

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

Novel results on dissipativity analysis for generalized delayed neural networks.
Neurocomputing, 2019

Global synchronization of time-invariant uncertainty fractional-order neural networks with time delay.
Neurocomputing, 2019

Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS.
Int. J. Electron. Secur. Digit. Forensics, 2019

New reliable nonuniform sampling control for uncertain chaotic neural networks under Markov switching topologies.
Appl. Math. Comput., 2019

New Stability Criteria of Discrete Systems With Time-Varying Delays.
IEEE Access, 2019

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System.
IEEE Access, 2019

Co-Channel Multi-Signal Modulation Classification Based on Convolution Neural Network.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

A Puncturing Algorithm for Mixing 2-Kernel and 3-Kernel Polar Codes.
Proceedings of the Wireless and Satellite Systems, 2019

Acoustic Characteristics of Normal and Pathological Voices Analysis and Recognition.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Direct Adaptive Fault-tolerant Control of Satellite Attitude based on Back-stepping and Neural Network.
Proceedings of the CAA Symposium on Fault Detection, 2019

Robust Fault Tolerant Control of Airship Residence Based on Lossless Separation Operator<sup>*</sup>.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wirel. Pers. Commun., 2018

High-Throughput Fast-SSC Polar Decoder for Wireless Communications.
Wirel. Commun. Mob. Comput., 2018

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Secur. Commun. Networks, 2018

Reliability design of battery management system for power battery.
Microelectron. Reliab., 2018

Lattice-based searchable public-key encryption scheme for secure cloud storage.
Int. J. Web Grid Serv., 2018

Global asymptotic synchronization of nonidentical fractional-order neural networks.
Neurocomputing, 2018

Efficient multi-receiver identity-based signcryption from lattice assumption.
Int. J. Electron. Secur. Digit. Forensics, 2018

An improved authentication protocol-based dynamic identity for multi-server environments.
Int. J. Distributed Sens. Networks, 2018

From Design Principles to Impacts: A Theoretical Framework and Research Agenda.
AIS Trans. Hum. Comput. Interact., 2018

Efficient Sorting Architecture for List-Fast-SSC Decoding of Polar Codes.
IEEE Access, 2018

Active Disturbance Rejection Control of a Flying-Wing Tailsitter in Hover Flight.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Simplified Early Stopping Criterion for Polar Codes.
Proceedings of the 2018 IEEE International Conference on Signal Processing, 2018

A Hybrid Coding Strategy to Improve Auditory Perception of Cochlear Implant.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

A Biometrics-Based Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Three-Factor Remote Authentication Scheme for Multi-server Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Control System Design of Reactor Robot for Object Salvaging Underwater.
Proceedings of the Communications, Signal Processing, and Systems, 2018

A High-Performance Synchronous Energy-Saving Algorithm for Wireless Sensor Networks.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

A novel and robust approach for pro-drop language translation.
Mach. Transl., 2017

A Nomological Network of Knowledge Management System Use: Antecedents and Consequences.
MIS Q., 2017

Knowledge Management System Use and Job Performance: A Multilevel Contingency Model.
MIS Q., 2017

Exponential response electrical pole-changing method for a five-phase induction machine with a current sliding mode control strategy.
Frontiers Inf. Technol. Electron. Eng., 2017

A Method to Remotely Track a Magnetic Target Using a Scalar Magnetometer Array.
J. Sensors, 2017

Experimental Study on the Localization of Moving Object by Total Geomagnetic Field.
J. Sensors, 2017

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017

Spee-Navi: An Indoor Navigation System via Speech Crowdsourcing.
Proceedings of the First International Workshop on Human-centered Sensing, 2017

Kinematics and singularity analysis of a 3-RPS parallel mechanism.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Performance analysis of 3-(HS)S/S parallel ankle rehabilitation robot.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Pathological voice recognition by deep neural network.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Identification of vocal nodules and laryngitis by Gauss mixture model.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Subdividing of pathological voice based on vocal tract area.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Is Socializing Loyalty Programs a Good Idea? - Empirical Evidence from a Large Quick Service Restaurant Chain.
Proceedings of the International Conference on Information Systems, 2017

A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

A Security and Efficiency Authentication Scheme Based on Human-Memorable Password.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
An efficient designated verifier signature scheme with pairing-free and low cost.
Secur. Commun. Networks, 2016

智能主体的等级BDI(信念、愿望和意图)模型 (Graded Belief-Desire-Intention (BDI) Models for Agent Architectures).
计算机科学, 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016

An Efficient Dynamic Group Signature with Non-frameability.
KSII Trans. Internet Inf. Syst., 2016

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
Inf., 2016

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
Int. J. Netw. Secur., 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016

A new group signature scheme for dynamic membership.
Int. J. Electron. Secur. Digit. Forensics, 2016

Semi-automatic Simultaneous Interpreting Quality Evaluation.
CoRR, 2016

Foot end trajectory with small oscillation generation method of the adjustable stiffness active flexible joint robot.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

A Novel Approach to Dropped Pronoun Translation.
Proceedings of the NAACL HLT 2016, 2016

Automatic Construction of Discourse Corpora for Dialogue Translation.
Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, 2016

A Cross-Corpus Recognition of Emotional Speech.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Perception auditory factor for speaker recognition in noisy environment.
Proceedings of the 12th International Conference on Natural Computation, 2016

Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

Dropped pronoun generation for dialogue machine translation.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Speech endpoint detection in noisy environment using Spectrogram Boundary Factor.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
MIMO Radar Transmit Beampattern Matching Design.
IEEE Trans. Signal Process., 2015

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

Do Temporary Increases in Information Asymmetry Affect the Cost of Equity?
Manag. Sci., 2015

一种基于像素梯度信息的背景减除法 (Background Subtraction Based on Local Gradient Feature).
计算机科学, 2015

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

The visible foreign matter visual detecting algorithm research in oral liquid.
J. Comput. Methods Sci. Eng., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015

Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability.
Eur. J. Inf. Syst., 2015

Track modeling and an optimization method for tracked robots.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

The DCU Discourse Parser for Connective, Argument Identification and Explicit Sense Classification.
Proceedings of the 19th Conference on Computational Natural Language Learning: Shared Task, 2015

A Context-Aware Approach for Dynamic GUI Testing of Android Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Chengqing Zong: Statistical natural language processing (second edition) - Tsinghua University Press, 2013, xxxv+570pp.
Mach. Transl., 2014

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2014

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Efficient forward secure identity-based shorter signature from lattice.
Comput. Electr. Eng., 2014

Development of a lower limb rehabilitation robot based on free gait and virtual reality.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014

Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Explaining Employee Job Performance: The Role of Online and Offline Workplace Communication Networks.
MIS Q., 2013

A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013

Development of an underwater robot for nuclear reactor vessel.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Rehabilitative motion planning for upper limb rehabilitation robot based on virtual reality.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Simulation analysis of passive adaptive robot's tip-over stability.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Free gait generation based on discretization for a hexapod robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

The research on data processing method of the underwater micro range finder.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Reconstruction of bidirectional predicted residual for stereoscopic video based on compressed sensing.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic Logic.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Patients' perceptions of web self-service applications in primary healthcare.
Proceedings of the Health Informatics: Building a Healthcare Future Through Trusted Information, 2012

2011
Designing Collaborative Systems to Enhance Team Performance.
J. Assoc. Inf. Syst., 2011

"Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation.
Inf. Syst. Res., 2011

Michael W. Berry and Jacob Kogan (eds.): Text mining: applications and theory - John Wiley and Sons, Ltd, 2010, xiv + 207 pp, £55.00/€66.00, hardcover, ISBN: 978-0-470-74982-1.
Inf. Retr., 2011

DFKI Hybrid Machine Translation System for WMT 2011 - On the Integration of SMT and RBMT.
Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011

'Just What the Doctor Ordered': A Revised UTAUT for EMR System Adoption and Use by Doctors.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Secure DHCPv6 that uses RSA authentication integrated with Self-Certified Address.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Host Proteome Research in HIV Infection.
Genom. Proteom. Bioinform., 2010

Transcriptomics and Proteomics in the Study of H1N1 2009.
Genom. Proteom. Bioinform., 2010

Basing on the olfaction and vision information fusion for robot's odor source localization.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Research on the walking gait coordinations of the lower limb rehabilitation robot.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Research on the mobile robot's odor source localization by biomimetics.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Constructing Performance Management Information System for Academic Staff: A Model for Research-intensive Universities.
Proceedings of the International Conference on E-Business and E-Government, 2010

Designing Collaborative Systems for Better Knowledge Management and Team Performance.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The fuzzy integrated evaluate method of translation quality.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Role of collective ownership and coding standards in coordinating expertise in software project teams.
Eur. J. Inf. Syst., 2009

Noise Effect Analysis on a Spatial Ecosystem.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Autocorrelation Smooth Method for Stochastic Media Tomography.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A More Strict Definition of Steady State Degree Distribution.
Proceedings of the Complex Sciences, 2009

Numerical Simulation of Blood Flow in Internal Carotid Artery Aneurysm.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values.
Inf. Syst. Frontiers, 2008

A WSD Model for Corpus Construction.
Int. J. Comput. Process. Orient. Lang., 2008

Design of a Modular Bionic Olfaction System for Robot.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Biologically-Inspired Search Strategy for Locating Odor Source.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Students Interactions and Course Performance: Impacts of Online and Offline Networks.
Proceedings of the International Conference on Information Systems, 2008

Fuzzy-Set Based Fast Edge Detection of Medical Image.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

The Fourier Spectrum Analysis of Optical Feedback Self-Mixing Signal under Weak and Moderate Feedback.
Proceedings of the 4th IEEE International Symposium on Electronic Design, 2008

2007
Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes.
Proceedings of the Knowledge Science, 2007

The application of region-ecological-economy theory in western China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Urban environmental evaluation in Beijings residential districts and communities.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

2006
HuaZhong University of Science and Technology at TRECVID 2006.
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006

Design and Kinematics Analysis of Parallel Robots for Ankle Rehabilitation.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

The Study on the Re-constructing Poor Spots in Beijing.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

The Research on Evaluation Beijings Residential Environment by 8000 Questionnaires.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

An Improved Real-Time Natural Feature Tracking Algorithm for AR Application.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

2005
Dingxi prefecture of Gansu Province's development of rainwater collection and water-saving irrigation to combat the arid environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Research on the effects of land use change on ecosystem services value of Loess Plateau - a case study of Longxi County.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A study on remote sensing key technologies of national monitoring resource, ecological and environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
Early Validation of Deployment and Scheduling Constraints for MSC Specifications.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

2003
From MSC to SDL: Overview and an Application to the Autonomous Shuttle Transport System.
Proceedings of the Scenarios: Models, 2003


  Loading...