Xiaoyan Zhu

According to our database1, Xiaoyan Zhu authored at least 165 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data.
IEEE Trans. Cloud Computing, 2019

Reliability assessment of a continuous-state fuel cell stack system with multiple degrading components.
Rel. Eng. & Sys. Safety, 2019

Recognition Of Surface Defects On Steel Sheet Using Transfer Learning.
CoRR, 2019

Verification Code Recognition Based on Active and Deep Learning.
CoRR, 2019

A new unsupervised feature selection algorithm using similarity-based feature clustering.
Computational Intelligence, 2019

Verification Code Recognition Based on Active and Deep Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

RecEvent: Multiple Features Hybrid Event Recommendation in Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Underestimates of Grassland Gross Primary Production in MODIS Standard Products.
Remote Sensing, 2018

Optimal design of sales and maintenance under the renewable warranty.
RAIRO - Operations Research, 2018

A new classification algorithm recommendation method based on link prediction.
Knowl.-Based Syst., 2018

Sentiment Analysis by Capsules.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Scale Adjustable Interaction Group Identification.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

Spectral Graph Wavelet based Component Clustering for System Reliability Analysis.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018

The Aftermath of Broken Links: Resilience of IoT Systems from a Networking Perspective.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
IEEE Access, 2017

Predicting Bugs in Software Code Changes Using Isolation Forest.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
Proceedings of the 20th IEEE International Symposium on Real-Time Distributed Computing, 2017

Time Distribution of Software Stage Effort.
Proceedings of the 24th Asia-Pacific Software Engineering Conference Workshops, 2017

2016
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.
IEEE Trans. Intelligent Transportation Systems, 2016

A Bayesian approach to degradation-based burn-in optimization for display products exhibiting two-phase degradation patterns.
Rel. Eng. & Sys. Safety, 2016

A machine learning based software process model recommendation method.
Journal of Systems and Software, 2016

Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
IJGUC, 2016

Balanced loop retiming to effectively architect STT-RAM-based hybrid cache for VLIW processors.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

UM-BUS: An online fault-tolerant bus for embedded systems.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016

Sliding Window Network Coding for Free Viewpoint Multimedia Streaming in MANETs.
Proceedings of the Social Computing, 2016

A Chinese text paraphrase detection method based on dependency tree.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Context-aware location recommendations with tensor factorization.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Integrated feature preprocessing for classification based on neural incremental attribute learning.
Proceedings of the 19th International Conference on Information Fusion, 2016

Single Classifier Selection for Ensemble Learning.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

Performance Analysis of Sliding Window Network Coding in MANET.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

2015
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Generation Comp. Syst., 2015

Margin-Based Feed-Forward Neural Network Classifiers.
CoRR, 2015

Max-Entropy Feed-Forward Clustering Neural Network.
CoRR, 2015

An improved data characterization method and its application in classification algorithm recommendation.
Appl. Intell., 2015

A Question Answering System Built on Domain Knowledge Base.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Regression based on neural incremental attribute learning with correlation-based feature ordering.
Proceedings of the 7th International Conference on Cybernetics and Intelligent Systems, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Tackling Data Sparseness in Recommendation using Social Media based Topic Hierarchy Modeling.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

G2G: Privacy-preserving group matching for proximity-based mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Efficient private matching based on blind signature for proximity-based mobile social networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Publicly Verifiable Boolean Query over Outsourced Encrypted Data.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Heterogeneous energy-efficient cache design in warehouse scale computers.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

Optimizing the Bayesian Inference of Phylogeny on Graphic Processors.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Importance measures in reliability and mathematical programming.
Annals OR, 2014

A Birnbaum-importance based genetic local search algorithm for component assignment problems.
Annals OR, 2014

Sampling dilemma: towards effective data sampling for click prediction in sponsored search.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

A Chinese Question Answering System for Specific Domain.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Contextual Combinatorial Bandit and its Application on Diversified Online Recommendation.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

QOS Performance Analysis for Flexible Workflow Supporting Exception Handling.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Customized Organization of Social Media Contents using Focused Topic Hierarchy.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Implementation of a three-stage approach for the dynamic resource-constrained shortest-path sub-problem in branch-and-price.
Computers & OR, 2013

Information distance between what I said and what it heard.
Commun. ACM, 2013

An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Topic hierarchy construction for the organization of multi-source user generated contents.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Promoting Diversity in Recommendation by Entropy Regularizer.
Proceedings of the IJCAI 2013, 2013

An Introduction to String Re-Writing Kernel.
Proceedings of the IJCAI 2013, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Functional dirichlet process.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
Wireless Networks, 2012

Relations and Generalizations of Importance Measures in Reliability.
IEEE Trans. Reliability, 2012

Some Recent Advances on Importance Measures in Reliability.
IEEE Trans. Reliability, 2012

A three-stage approach for the resource-constrained shortest path as a sub-problem in column generation.
Computers & OR, 2012

Entity Disambiguation with Freebase.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Cross-Domain Co-Extraction of Sentiment and Topic Lexicons.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

String Re-writing Kernel.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

QA: from Turing Test to Intelligent Information Service.
Proceedings of the Second CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2012

2011
Semantic Aspect Retrieval for Encyclopedia.
Polibits, 2011

Covering models and optimization techniques for emergency response facility location and planning: a review.
Math. Meth. of OR, 2011

RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE Journal on Selected Areas in Communications, 2011

A New Multiword Expression Metric and Its Applications.
J. Comput. Sci. Technol., 2011

Minimal-cost network flow problems with variable lower bounds on arc flows.
Computers & OR, 2011

Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

C4: A new paradigm for providing incentives in multi-hop wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

K2Q: Generating Natural Language Questions from Keywords with User Refinements.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011

Incorporating Reviewer and Product Information for Review Rating Prediction.
Proceedings of the IJCAI 2011, 2011

Semantic Relationship Discovery with Wikipedia Structure.
Proceedings of the IJCAI 2011, 2011

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks.
Proceedings of the Global Communications Conference, 2011

Study for speed management technology of national road.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Concepts of village roads safety facilities construction.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
How to secure multi-domain wireless mesh networks.
Wireless Networks, 2010

Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wireless Commun., 2010

Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs.
IEEE Trans. Wireless Communications, 2010

MABS: Multicast Authentication Based on Batch Signature.
IEEE Trans. Mob. Comput., 2010

Privacy and security for online social networks: challenges and opportunities.
IEEE Network, 2010

Discovering breast cancer drug candidates from biomedical literature.
IJDMB, 2010

A Weighted Voting-Based Associative Classification Algorithm.
Comput. J., 2010

A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Function-Based Question Classification for General QA.
Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, 2010

A Review Selection Approach for Accurate Feature Rating Estimation.
Proceedings of the COLING 2010, 2010

Measuring the Non-compositionality of Multiword Expressions.
Proceedings of the COLING 2010, 2010

2009
A batched network coding scheme for wireless networks.
Wireless Networks, 2009

Securing resource-constrained wireless ad hoc networks.
IEEE Wireless Commun., 2009

Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Vehicular Technology, 2009

Building Disease-Specific Drug-Protein Connectivity Maps from Molecular Interaction Networks and PubMed Abstracts.
PLoS Computational Biology, 2009

On the improvement of scaling laws for large-scale MANETs with network coding.
IEEE Journal on Selected Areas in Communications, 2009

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Comments on "A Hierarchy of Importance Indices".
IEEE Trans. Reliability, 2008

New Information Distance Measure and Its Application in Question Answering System.
J. Comput. Sci. Technol., 2008

Detrended fluctuation analysis of traffic data
CoRR, 2008

Mining disease-specific molecular association profiles from biomedical literature: a case study.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Classifying What-Type Questions by Head Noun Tagging.
Proceedings of the COLING 2008, 2008

Information shared by many objects.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Using Conditional Random Fields to Extract Contexts and Answers of Questions from Online Forums.
Proceedings of the ACL 2008, 2008

2007
Three-stage approaches for optimizing some variations of the resource constrained shortest-path sub-problem in a column generation context.
European Journal of Operational Research, 2007

Information distance from a question to an answer.
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007

A New Type of Feature - Loose N-Gram Feature in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

2006
Automatic Extraction of Genomic Glossary Triggered by Query.
Proceedings of the Data Mining for Biomedical Applications, PAKDD 2006 Workshop, 2006

A Hybrid Handwritten Chinese Address Recognition Approach.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Movie review mining and summarization.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

2005
An OCR Post-processing Approach Based on Multi-knowledge.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Various Features with Integrated Strategies for Protein Name Classification.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Extended Bi-gram Features in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

A New Algorithm for Pattern Optimization in Protein-Protein Interaction Extraction System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

An Utterance Verification Algorithm in Keyword Spotting System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

2004
THUIR at TREC 2004: Genomics Track.
Proceedings of the Thirteenth Text REtrieval Conference, 2004

A Chinese OCR spelling check approach based on statistical language models.
Proceedings of the IEEE International Conference on Systems, 2004

Utterance Verification Based on Support Vector Machine.
Proceedings of the International Conference on Artificial Intelligence, 2004

PathwayFinder: Paving the Way Towards Automatic Pathway Extraction.
Proceedings of the Second Asia-Pacific Bioinformatics Conference (APBC 2004), 2004

2003
Continuous speech recognition and verification based on a combination score.
Proceedings of the 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003, 2003

2002
A fast learning algorithm for time-delay neural networks.
Inf. Sci., 2002

Braille to print translations for Chinese.
Information & Software Technology, 2002

A New Textual/Non-Textual Classifier for Document Skew Correction.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
An effective result-feedback neural algorithm for handwritten character recognition.
Neural Parallel & Scientific Comp., 2001

A Chinese spoken dialog system for blind men.
Proceedings of the IEEE International Conference on Systems, 2001

A new algorithm for handwritten character recognition.
Proceedings of the 2001 International Conference on Image Processing, 2001

A Handwritten Character Recognition Method with ANN Feedback.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

2000
A novel text-independent speaker verification method based on the global speaker model.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2000

A New Speaker Verification Method with Global Speaker Model and Likelihood Score Normalization.
J. Comput. Sci. Technol., 2000

A criterion based on Fourier transform for segmentation of connected digits.
IJDAR, 2000

Semi-continuous segmental probability model for speech signals.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

Reliability evaluation of speech recognition in acoustic modeling.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

1999
Utterance verification using modified segmental probability model.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

A robust learning algorithm for the extended AM neural network.
Proceedings of the International Joint Conference Neural Networks, 1999

A novel fast learning algorithms for time-delay neural networks.
Proceedings of the International Joint Conference Neural Networks, 1999

A New Distinguishing Algorithm of Connected Character Image based on Fourier Transform.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1998
A novel text-independent speaker verification method using the global speaker model.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

A New Model of Recurrent Neural Networks for Speech Recognition.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998

1996
Multiple experts recognition system based on neural network.
Proceedings of the 13th International Conference on Pattern Recognition, 1996


  Loading...