Xiaowen Zhang

According to our database1, Xiaowen Zhang
  • authored at least 43 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Adaptive Waveform Design for Cognitive Radar in Multiple Targets Situation.
Entropy, 2018

2017
A flexible waveform optimization method for cognitive radar.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Optimal cognitive radar transmit-receiver design for extended target with unknown target impulse response.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A New Bloom Filter Structure for Searchable Encryption Schemes.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
Finding partial hash collisions by brute force parallel programming.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

User density and spatial cloaking algorithm selection: Improving privacy protection of mobile users.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

2015
A Model-based Feature Optimization Approach to Chinese Language Processing.
Journal of Quantitative Linguistics, 2015

Cutting tool operational reliability prediction based on acoustic emission and logistic regression model.
J. Intelligent Manufacturing, 2015

Simultaneous Blind Estimation of Antenna Mutual Coupling and Direction of Arrival.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Research of Knee Infrared Image Noise Reduction and Enhancement.
Proceedings of the International Conference on Identification, 2015

2014
Periodic Sweep Coverage Scheme Based on Periodic Vehicle Routing Problem.
JNW, 2014

Simulations of levelled RFID localisation for indoor moving objects.
IJRFITA, 2014

Implementation of randomize-then-combine constructed hash function.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Experiments for Leveled RFID Localization for Indoor Stationary Objects.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2013
Hash function-based secret sharing scheme designs.
Security and Communication Networks, 2013

2012
Geometrically Invariant Watermarking Scheme Based on Local Feature Points.
Journal of Multimedia, 2012

Exploring effects of rainfall intensity on soil erosion at the catchment scale using modified semmed model at the Zuli River Basin, western of loess Plateau, China.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Response of NDVI of spring wheat to climate warming in Minqin of China.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2011
An Improved Lightweight RFID Authentication Protocol.
IJAL, 2011

Efficient co-doped white organic light-emitting diodes with high color stability and color rendering index.
Displays, 2011

Hash function based secret sharing scheme designs
CoRR, 2011

2010
Looking at a class of RFID APs through GNY logic.
IJSN, 2010

The Latin squares and the secret sharing schemes.
Groups Complexity Cryptology, 2010

A New Scheme for Hash Function Construction.
Proceedings of the 2010 International Conference on Security & Management, 2010

Applying Hash Functions in the Latin Square Based Secret Sharing Schemes.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Improved Latin Square based Secret Sharing Scheme
CoRR, 2009

RANC: Relay-aided network coding in multi-hop wireless networks.
Computer Communications, 2009

Evaluation of Glacier Runoff in Tailan Basin by Monthly Degree-day Model.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Research and Application on Transaction Processing in Workflow Management System.
Proceedings of the International Forum on Information Technology and Applications, 2009

Enhancements to a Lightweight RFID Authentication Protocol.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Enhancements to A Lightweight RFID Authentication Protocol
CoRR, 2008

Multi-Map Orbit Hopping Chaotic Cipher.
Proceedings of the 2008 International Conference on Security & Management, 2008

The Multi-Map Orbit Hopping Mechanism.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Two-Tier Load Balancing in OSPF Wireless Back-Hauls.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
A Chaotic Cipher Mmohocc and Its Security Analysis
CoRR, 2006

A Chaotic Cipher Mmohocc and Its Randomness Evaluation
CoRR, 2006

Multi-Map Orbit Hopping Chaotic Stream Cipher
CoRR, 2006

2005
Comparing hydrological characters of ungauged area via RS, GIS and observation.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

GIS & RS assisted precipitation-flow generation simulation in a typical watershed of Chinese Loess Plateau.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
Scale effects of DEM on erosion potentials in the western Chinese Loess Plateau.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Estimation potential consequences of climate change for water resource via RS, GIS and hydrology model.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2001
Designing ballistic flipping gait for a one-legged robot.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2001


  Loading...