Xiuying Li

Orcid: 0000-0002-7025-6306

According to our database1, Xiuying Li authored at least 32 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption.
Sensors, October, 2023

2022
Fractional Order System Identification With Occupation Kernel Regression.
IEEE Control. Syst. Lett., 2022

A kernel regression approach for identification of first order differential equations based on functional data.
Appl. Math. Lett., 2022

Ultrannel: Ultrasound based Covert Communication Channel.
Proceedings of the IEEE Smartworld, 2022

2021
A Remote Sensor System Based on TDLAS Technique for Ammonia Leakage Monitoring.
Sensors, 2021

Occupation Kernel Hilbert Spaces and the Spectral Analysis of Nonlocal Operators.
CoRR, 2021

Mobile Device Fingerprint Identification Using Gyroscope Resonance.
IEEE Access, 2021

Research of CPA Attack Methods Based on Ant Colony Algorithm.
Proceedings of the Security and Privacy in Communication Networks, 2021

Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Research and Implementation on Power Analysis Attacks for Unbalanced Data.
Secur. Commun. Networks, 2020

H<sub>∞</sub> filtering for a class of networked control systems with redundant channels subject to randomly occurred packet dropouts and cyber attacks.
Int. J. Model. Identif. Control., 2020

A new kernel functions based approach for solving 1-D interface problems.
Appl. Math. Comput., 2020

Distributed H<sub>∞</sub> Filtering Over Sensor Networks Subject to Randomly Occurred Nonlinearity and Time-Varying Topology.
IEEE Access, 2020

2019
Piecewise reproducing kernel method for linear impulsive delay differential equations with piecewise constant arguments.
Appl. Math. Comput., 2019

2018
A new reproducing kernel collocation method for nonlocal fractional boundary value problems with non-smooth solutions.
Appl. Math. Lett., 2018

2017
A new reproducing kernel method for variable order fractional boundary value problems for functional differential equations.
J. Comput. Appl. Math., 2017

Multi-sensor distributed fusion estimation with applications in networked systems: A review paper.
Inf. Fusion, 2017

A new numerical method for variable order fractional functional differential equations.
Appl. Math. Lett., 2017

2015
A numerical technique for variable fractional functional boundary value problems.
Appl. Math. Lett., 2015

2011
Second-order two-point boundary value problems using the variational iteration algorithm-II.
Int. J. Comput. Math., 2011

DBS analysis of Chinese noun phrases.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

DBS Application to Chinese Adjectives.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Corpus-based Extraction of Chinese Historical Term Translation Equivalents.
Int. J. Asian Lang. Process., 2010

Two algorithms for minimum 2-connected r-hop dominating set.
Inf. Process. Lett., 2010

Iterative reproducing kernel method for nonlinear oscillator with discontinuity.
Appl. Math. Lett., 2010

Application of reproducing kernel method to third order three-point boundary value problems.
Appl. Math. Comput., 2010

DLUT Question Answering System at NTCIR-8 CCLQA.
Proceedings of the 8th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2010

2009
Variational iteration method for nonlinear age-structured population models.
Comput. Math. Appl., 2009

Extracting historical terms based on aligned Chinese-English parallel corpora.
Proceedings of the 5th International Conference on Natural Language Processing and Knowledge Engineering, 2009

RAM-Based Reconfigurable Implementation of the MD6 Hash Function.
Proceedings of the International Conference on Embedded Software and Systems, 2009

2008
Identity-Based Conference Key Distribution Scheme Using Sealed Lock.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...