Xuejiao Liu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:


Genetic Quantization-Aware Approximation for Non-Linear Operations in Transformers.
CoRR, 2024

An End-to-End Deep-Learning-Based Indirect Time-of-Flight Image Signal Processor.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

A Tiny Accelerator for Mixed-Bit Sparse CNN Based on Efficient Fetch Method of SIMO SPad.
IEEE Trans. Circuits Syst. II Express Briefs, August, 2023

A 137.5 TOPS/W SRAM Compute-in-Memory Macro with 9-b Memory Cell-Embedded ADCs and Signal Margin Enhancement Techniques for AI Edge Applications.
CoRR, 2023

BIOS: A 40nm Bionic Sensor-defined 0.47pJ/SOP, 268.7TSOPs/W Configurable Spiking Neuron-in-Memory Processor for Wearable Healthcare.
Proceedings of the 49th IEEE European Solid State Circuits Conference, 2023

Research on Big Data Empowering Ecological Governance.
Proceedings of the Big Data - BigData 2023, 2023

ReAAP: A Reconfigurable and Algorithm-Oriented Array Processor With Compiler-Architecture Co-Design.
IEEE Trans. Computers, 2022

An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy.
Peer-to-Peer Netw. Appl., 2022

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability.
J. Cloud Comput., 2022

The Application of the Metaverse in Ecological Education.
Proceedings of the Metaverse - METAVERSE 2022, 2022

TAC-RAM: A 65nm 4Kb SRAM Computing-in-Memory Design with 57.55 TOPS/W supporting Multibit Matrix-Vector Multiplication for Binarized Neural Network.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

A Security Wireless Monitoring and Automatic Protection System for CCEL.
Wirel. Commun. Mob. Comput., 2021

Optimize FPGA-Based Neural Network Accelerator with Bit-Shift Quantization.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Study on fault diagnosis algorithm in WSN nodes based on RPCA model and SVDD for multi-class classification.
Clust. Comput., 2019

Automatically Capturing and Reproducing Android Application Crashes.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Interference Suppression Under Allocation of Intensive Spectrum Resource with Time-Varying Filter Application.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Analysis of Timing Performance of Zadoff-Chu Sequence in WFRFT Domain under Frequency Offset Effect.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Research and Application of Wireless Security Monitoring System in Chemistry and Chemical Engineering Laboratory.
Wirel. Pers. Commun., 2017

Research and Application of a Fault Self-Diagnosis Method for Roots Flowmeter Based on WSN Node.
Wirel. Pers. Commun., 2017

A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Sensors, 2017

Retrain-free fully connected layer optimization using matrix factorization.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Malware detection on android smartphones using keywords vector and SVM.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

An efficient message access quality model in vehicular communication networks.
Signal Process., 2016

Identifying Android malware with system call co-occurrence matrices.
Trans. Emerg. Telecommun. Technol., 2016

Efficient distributed access control for big data in clouds.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

The key role of psychological empowerment in boundary employee units based on gray preference.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Intrusion diagnosis and prediction with expert system.
Secur. Commun. Networks, 2011

Individual and Group Dynamics in Purchasing Activity
CoRR, 2010

A Scalable, Vulnerability Modeling and Correlating Method for Network Security.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Towards a Collaborative and Systematic Approach to Alert Verification.
J. Softw., 2008

Applying Data Fusion in Collaborative Alerts Correlation.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An adaptive architecture of applying vulnerability analysis to IDS alerts.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

A Novel Tone Reservation Scheme with Fast Convergence for PAPR Reduction in OFDM Systems.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008