Xiaowei Li

According to our database1, Xiaowei Li authored at least 58 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Inspection of Mine Wire Rope Using Magnetic Aggregation Bridge Based on Magnetic Resistance Sensor Array.
IEEE Trans. Instrum. Meas., 2020

Sub-Gaussian Matrices on Sets: Optimal Tail Dependence and Applications.
CoRR, 2020

Trajectory Tracking Based on Adaptive Sliding Mode Control for Agricultural Tractor.
IEEE Access, 2020

Set-Membership Filtering for Nonlinear Dynamic Systems With Quadratic Inequality Constraints.
IEEE Access, 2020

A functional network study of patients with mild depression based on source location.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

EEG Based Depression Recognition by Combining Functional Brain Network and Traditional Biomarkers.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

2019
A Near-Optimal UAV-Aided Radio Coverage Strategy for Dense Urban Areas.
IEEE Trans. Veh. Technol., 2019

Copyright Protection for Holographic Video Using Spatiotemporal Consistent Embedding Strategy.
IEEE Trans. Ind. Informatics, 2019

Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model".
IEEE Trans. Inf. Forensics Secur., 2019

一种基于CSI的非合作式人体行为识别方法 (Non-cooperative Human Behavior Recognition Method Based on CSI).
计算机科学, 2019

Rechargeable Multi-UAV Aided Seamless Coverage for QoS-Guaranteed IoT Networks.
IEEE Internet Things J., 2019

An Adaptive and Secure Holographic Image Watermarking Scheme.
Entropy, 2019

Fast Code Clone Detection Based on Weighted Recursive Autoencoders.
IEEE Access, 2019

Deep Learning for Improving the Robustness of Image Encryption.
IEEE Access, 2019

Joint Node Assignment and Trajectory Optimization for Rechargeable Multi-UAV Aided IoT Systems.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Set-Membership Filtering with Quadratic Inequality Constraints.
Proceedings of the 2019 International Conference on Control, 2019

An Energy-Efficient UAV Recharging and Reshuffling Strategy for Seamless Coverage.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

JCallGraph: Tracing Microservices in Very Large Scale Container Cloud Platforms.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

3D Segmentation of Mice Gland Based on Ensemble Learning.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2018
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach.
Secur. Commun. Networks, 2018

Hierarchically controlled remote preparation of an arbitrary single-qubit state by using a four-qubit \(|\chi \rangle \) entangled state.
Quantum Inf. Process., 2018

基于数据规范化的co-location模式挖掘算法 (Co-location Pattern Mining Algorithm Based on Data Normalization).
计算机科学, 2018

Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm.
CoRR, 2018

Natural Scene Text Detection Based on Deep Supervised Fully Convolutional Network.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

An estimation method for the parameters of elliptic cone surface.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

2017
Nash Equilibrium of an Energy Saving Strategy with Dual Rate Transmission in Wireless Regional Area Network.
Wirel. Commun. Mob. Comput., 2017

Asymmetric bidirectional controlled remote preparation of an arbitrary four-qubit cluster-type state and a single-qubit state.
Quantum Inf. Process., 2017

Designing Three-Dimensional Cellular Automata Based Video Authentication With an Optical Integral Imaging Generated Memory-Distributed Watermark.
IEEE J. Sel. Top. Signal Process., 2017

Fast Background Removal Method for 3D Multi-channel Deep Tissue Fluorescence Imaging.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

An Enhanced Transportation Mode Detection Method Based on GPS Data.
Proceedings of the Data Science, 2017

2016
Chaotic image encryption using pseudo-random masks and pixel mapping.
Signal Process., 2016

Wide Operational Range Processor Power Delivery Design for Both Super-Threshold Voltage and Near-Threshold Voltage Computing.
J. Comput. Sci. Technol., 2016

One-round Secure Key Exchange Protocol With Strong Forward Secrecy.
KSII Trans. Internet Inf. Syst., 2016

Monitoring fatigue cracks of a metal structure using an eddy current sensor.
EURASIP J. Wirel. Commun. Netw., 2016

2015
Optimization of Chemical Fungicide Combinations Targeting the Maize Fungal Pathogen, Bipolaris maydis: A Systematic Quantitative Approach.
IEEE Trans. Biomed. Eng., 2015

A privacy preserving authentication scheme for roaming services in global mobility networks.
Secur. Commun. Networks, 2015

Multi-objective optimization of urban bus network using cumulative prospect theory.
J. Syst. Sci. Complex., 2015

An optical image encryption scheme based on depth-conversion integral imaging and chaotic maps.
CoRR, 2015

Genetic Algorithm for Multiple Bus Line Coordination on Urban Arterial.
Comput. Intell. Neurosci., 2015

A highly accurate protein structural class prediction approach using auto cross covariance transformation and recursive feature elimination.
Comput. Biol. Chem., 2015

MOST: a software environment for constraint-based metabolic modeling and strain design.
Bioinform., 2015

2014
Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata.
Multidimens. Syst. Signal Process., 2014

Power Cable Fault Recognition Based on an Annealed Chaotic Competitive Learning Network.
Algorithms, 2014

2013
A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Secur. Commun. Networks, 2013

A simple and robust anonymous two-factor authenticated key exchange protocol.
Secur. Commun. Networks, 2013

A New Roaming Authentication Framework For Wireless Communication.
KSII Trans. Internet Inf. Syst., 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013

IDPKC-to-TPKC Construction of Multi-receiver Signcryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An approach for secure-communication between XEN virtual machines.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Watermarking Based on Complemented MLCA and 2D CAT.
J. Inform. and Commun. Convergence Engineering, 2011

Cellular Automata Transform based Invisible Digital Watermarking in Middle Domain for Gray Images.
J. Inform. and Commun. Convergence Engineering, 2011

New Methodologies for Parallel Architecture.
J. Comput. Sci. Technol., 2011

2010
Semi-Supervised Learning for Personalized Web Recommender System.
Comput. Informatics, 2010

Adaptive pf scheduling algorithm in LTE cellular system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

The uncertainty evaluation of mid-infrared spectra for tea.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Influence of pretreating methods on the score result of principal component analysis of tea.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2008
Cooperation Radio Resource Management and Adaptive Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the Fourth International Conference on Natural Computation, 2008


  Loading...