Xinxin Zhao

According to our database1, Xinxin Zhao authored at least 38 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthetic-to-realistic domain adaptation for cold-start of rail inspection systems.
Comput. Aided Civ. Infrastructure Eng., February, 2024

2023
Research on Calibration Method of Rail Profile Measurement System.
J. Circuits Syst. Comput., August, 2023

Observing Human Mobility Internationally During COVID-19.
Computer, March, 2023

2022
Geolocation Error Estimation Method for the Wide Swath Polarized Scanning Atmospheric Corrector Onboard HJ-2 A/B Satellites.
IEEE Trans. Geosci. Remote. Sens., 2022

Dynamic Bayesian network for predicting physiological changes, organ dysfunctions and mortality risk in critical trauma patients.
BMC Medical Informatics Decis. Mak., 2022

Large Kernel Attention Hashing for Efficient Image Retrieval.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

LSTM-based adaptive energy management of connected hybrid mining trucks for improving fuel efficiency.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

Post-Training Quantization for Longformer with Chunkwise Quantization Granularity and Optimized Percentile.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
Abnormal Driving Detection Based on Human Pose Estimation and Facial Key Points Detection.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Analyzing Worldwide Social Distancing through Large-Scale Computer Vision.
CoRR, 2020

2019
3D texture analyses within the substantia nigra of Parkinson's disease patients on quantitative susceptibility maps and R2<sup>∗</sup> maps.
NeuroImage, 2019

2018
Efficient Anonymous Message Submission.
IEEE Trans. Dependable Secur. Comput., 2018

2016
A Proximity Authentication System for Smartphones.
IEEE Trans. Dependable Secur. Comput., 2016

2015
A CZT-based continuous varying PRF polar format algorithm for highly squinted spotlight SAR.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

The Power of Whispering: Near Field Assertions via Acoustic Communications.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
RemindU: A secure and efficient location based reminder system.
Proceedings of the IEEE International Conference on Communications, 2014

An efficient privacy preserving location based service system.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Unobservable Re-authentication for Smartphones.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Checking in without worries: Location privacy in location based social networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Near field authentication for smart devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A lightweight system to authenticate smartphones in the near field without NFC chips.
Proceedings of IEEE International Conference on Communications, 2013

Secure cloud-assisted location based reminder.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Efficient anonymous message submission.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Privacy Preserving Group Ranking.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Searching in the dark: A framework for authenticating unknown users in online social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Relationship between marrow perfusion and bone mineral density: A pharmacokinetic study of DCE-MRI.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

Keeping identity secret in online social networks.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

An identity authentication protocol in online social networks.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Authenticating strangers in Online Social Networks.
Int. J. Secur. Networks, 2011

Authenticating Strangers in Fast Mixing Online Social Networks.
Proceedings of the Global Communications Conference, 2011

Spectral analysis of brain function network for the classification of motor imagery tasks.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
Control system design of a small-scale unmanned helicopter.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

2009
Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Maritime information engine.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2008
Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...