Xuefeng Zheng

According to our database1, Xuefeng Zheng authored at least 32 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Unidirectional p-GaN gate HEMT with composite source-drain field plates.
Sci. China Inf. Sci., 2022

2020
Injury analysis of vehicle-pedestrian collision based on orthogonal experiments.
Comput. Syst. Sci. Eng., 2020

Evolution of Defect in AlGaN-based Deep Ultraviolet Light Emitting Diodes During Electrical Stress.
Proceedings of the 2020 IEEE International Reliability Physics Symposium, 2020

2019
User stateless privacy-preserving TPA auditing scheme for cloud storage.
J. Netw. Comput. Appl., 2019

Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage.
Int. J. Netw. Secur., 2019

2016
基于不确定理论的不确定性数据Top-k查询计算 (Top-k Query Calculation of Uncertain Data Based on Uncertainty Theory).
计算机科学, 2016

2015
一种基于信息粒度的动态属性约简求解算法 (Dynamic Algorithm for Computing Attribute Reduction Based on Information Granularity).
计算机科学, 2015

A Survey on the Integrity Checking of Outsourced Data in Cloud Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A survey of semantic similarity and its application to social network analysis.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
An Efficient BP-Neural Network Classification Model Based on Attribute Reduction.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

A dynamic rule extraction based on information granularity model for complete data.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

Feature subset selection approach based on fuzzy rough set for high-dimensional data.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing
CoRR, 2013

Cloud Computing Research Challenges
CoRR, 2013

TCLOUD: Challenges and Best Practices for Cloud Computing
CoRR, 2013

Cloud Computing: a Prologue
CoRR, 2013

2011
An Identity Based Aggregate Signature from Pairings.
J. Networks, 2011

SVM Based MLP Neural Network Algorithm and Application in Intrusion Detection.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
P2PKMM: A Hybrid Clustering Algorithm over P2P Network.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

2009
Multi-strategy Ontology Mapping Based on Stacking Method.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Research on Model of Trust Degrees for PKI.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Identity-Based Authentication Model for Mobile Agent.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Hexagon-based Key Pre-distribution Scheme for Large Scale Static Wireless Sensor Networks.
J. Commun., 2008

A Secure Routing Scheme Based on Multiple Criteria Decision Making in Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008

A Secure Routing Scheme for Static Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008

Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Mechanism for P2P Traffic Control.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Coordination Framework Based Software Development Approach and Its Applications.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Applying Multiple Classifier Systems to SoftMan's Perception System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Application of Clustering and Multi-cluster Selection in SoftMan's Perception System.
Proceedings of the Third International Conference on Natural Computation, 2007

DWT-Based Audio Watermarking Resistant to Desynchronization.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007


  Loading...