Xiujie Zhang

Orcid: 0000-0001-6257-5967

According to our database1, Xiujie Zhang authored at least 16 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Multiway dynamic mask attention networks for natural language inference.
J. Comput. Methods Sci. Eng., 2021

2020
Omnichannel operations with ship-from-store.
Oper. Res. Lett., 2020

A neural joint model for rating prediction recommendation.
J. Comput. Methods Sci. Eng., 2020

Quick response and omnichannel retail operations with the ship-to-store program.
Int. Trans. Oper. Res., 2020

Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network.
Int. J. Distributed Sens. Networks, 2020

2017
An affinity propagation-based multiobjective evolutionary algorithm for selecting optimal aiming points of missiles.
Soft Comput., 2017

EGIP: An efficient group identification protocol in roaming network.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
Self-organizing multiobjective optimization based on decomposition with neighborhood ensemble.
Neurocomputing, 2016

Bilinear-pairing based two-party identification protocol in wireless sensor network.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

2015
A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update.
Int. J. Netw. Secur., 2015

2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2011
A new hybrid method for nonlinear complementarity problems.
Comput. Optim. Appl., 2011

2010
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010


  Loading...