Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaona Zhang
@article{DBLP:journals/csse/ZhangZZSMS23, author = {Xiang Zhang and Xiaona Zhang and Xiaorui Zhang and Wei Sun and Ruohan Meng and Xingming Sun}, title = {A Derivative Matrix-Based Covert Communication Method in Blockchain}, journal = {Comput. Syst. Sci. Eng.}, volume = {46}, number = {1}, pages = {225--239}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.034915}, doi = {10.32604/CSSE.2023.034915}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ZhangZZSMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ZhangFHR22, author = {Xiaona Zhang and Jie Feng and Zhen Hong and Xiaona Rui}, title = {Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model}, journal = {Comput. Syst. Sci. Eng.}, volume = {42}, number = {2}, pages = {677--688}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.023136}, doi = {10.32604/CSSE.2022.023136}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ZhangFHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/WanZFQM22, author = {Yong Wan and Xiaona Zhang and Chenqing Fan and Ruozhao Qu and Ennan Ma}, title = {A Joint Method for Wave and Wind Field Parameter Inversion Combining {SAR} with Wave Spectrometer Data}, journal = {Remote. Sens.}, volume = {14}, number = {15}, pages = {3601}, year = {2022}, url = {https://doi.org/10.3390/rs14153601}, doi = {10.3390/RS14153601}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/WanZFQM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/XuZCLW22, author = {Bo Xu and Xiaona Zhang and Heyang Cao and Yu Li and Li{-}Ping Wang}, editor = {Claudio Agostino Ardagna and Hongyi Bian and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Schahram Dustdar and Jordi Marco and Munindar P. Singh and Ernest Teniente and Robert Ward and Zhongjie Wang and Fatos Xhafa and Jia Zhang}, title = {{HERMS:} {A} Hierarchical Electronic Records Management System Based on Blockchain with Distributed Key Generation}, booktitle = {{IEEE} International Conference on Services Computing, {SCC} 2022, Barcelona, Spain, July 10-16, 2022}, pages = {295--304}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SCC55611.2022.00050}, doi = {10.1109/SCC55611.2022.00050}, timestamp = {Fri, 23 Jun 2023 11:36:46 +0200}, biburl = {https://dblp.org/rec/conf/IEEEscc/XuZCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/ZhangZH21, author = {Xiaona Zhang and Shufang Zhang and Shuaiheng Huai}, title = {Low-Power Indoor Positioning Algorithm Based on iBeacon Network}, journal = {Complex.}, volume = {2021}, pages = {8475339:1--8475339:10}, year = {2021}, url = {https://doi.org/10.1155/2021/8475339}, doi = {10.1155/2021/8475339}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/ZhangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ZhangLC21, author = {Xiaona Zhang and Yang Liu and Yu Chen}, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Attack on the Common Prime Version of Murru and Saettone's {RSA} Cryptosystem}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, pages = {32--45}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-17510-7\_3}, doi = {10.1007/978-3-031-17510-7\_3}, timestamp = {Fri, 21 Oct 2022 16:47:32 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ZhangLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuLZLLLM20, author = {Shaohua Liu and Minghao Li and Xiaona Zhang and Shuang Liu and Zhaoxin Li and Jing Liu and Tianlu Mao}, title = {Image-Based Rendering for Large-Scale Outdoor Scenes With Fusion of Monocular and Multi-View Stereo Depth}, journal = {{IEEE} Access}, volume = {8}, pages = {117551--117565}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3004431}, doi = {10.1109/ACCESS.2020.3004431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuLZLLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/LiuZLM20, author = {Jing Liu and Xiaona Zhang and Zhaoxin Li and Tianlu Mao}, title = {Multi-Scale Residual Pyramid Attention Network for Monocular Depth Estimation}, booktitle = {25th International Conference on Pattern Recognition, {ICPR} 2020, Virtual Event / Milan, Italy, January 10-15, 2021}, pages = {5137--5144}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICPR48806.2021.9412670}, doi = {10.1109/ICPR48806.2021.9412670}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/LiuZLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangWX19, author = {Xiaona Zhang and Li{-}Ping Wang and Jun Xu}, title = {Certifying multi-power {RSA}}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {4}, pages = {330--335}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5178}, doi = {10.1049/IET-IFS.2018.5178}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ShenZZS19, author = {Weiqiang Shen and Chuanlin Zhang and Xiaona Zhang and Jinglun Shi}, title = {A fully distributed deployment algorithm for underwater strong \emph{k}-barrier coverage using mobile sensors}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {4}, year = {2019}, url = {https://doi.org/10.1177/1550147719838196}, doi = {10.1177/1550147719838196}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ShenZZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotaas/ShenZSZW18, author = {Weiqiang Shen and Chuanlin Zhang and Jinglun Shi and Xiaona Zhang and Zhihong Wang}, editor = {Bo Li and Mao Yang and Hui Yuan and Zhongjiang Yan}, title = {A Distributed Algorithm for Constructing Underwater Strong k-Barrier Coverage}, booktitle = {IoT as a Service - 4th {EAI} International Conference, IoTaaS 2018, Xi'an, China, November 17-18, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {271}, pages = {179--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14657-3\_18}, doi = {10.1007/978-3-030-14657-3\_18}, timestamp = {Wed, 09 Mar 2022 12:38:32 +0100}, biburl = {https://dblp.org/rec/conf/iotaas/ShenZSZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/LiJZCH17, author = {Zhengpeng Li and Ming Jiang and Xiaona Zhang and Xianyu Chen and Weikun Hou}, title = {Space-Time-Multiplexed Multi-Image Visible Light Positioning System Exploiting Pseudo-Miller-Coding for Smart Phones}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {16}, number = {12}, pages = {8261--8274}, year = {2017}, url = {https://doi.org/10.1109/TWC.2017.2759763}, doi = {10.1109/TWC.2017.2759763}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/LiJZCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiJZCH17, author = {Zhengpeng Li and Ming Jiang and Xiaona Zhang and Xianyu Chen and Weikun Hou}, title = {Miller-Coded Asynchronous Visible Light Positioning System for Smart Phones}, booktitle = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney, Australia, June 4-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCSpring.2017.8108348}, doi = {10.1109/VTCSPRING.2017.8108348}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/LiJZCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmaa/WangZLZG16, author = {Congcong Wang and Yingying Zhang and Zhuoqun Li and Xiaona Zhang and You Gao}, title = {The construction of {LDPC} codes based on the subspaces of singular linear space over finite field}, journal = {Discret. Math. Algorithms Appl.}, volume = {8}, number = {4}, pages = {1650073:1--1650073:10}, year = {2016}, url = {https://doi.org/10.1142/S1793830916500737}, doi = {10.1142/S1793830916500737}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dmaa/WangZLZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/ZhangW16, author = {Xiaona Zhang and Fayin Wang}, title = {Research on the Uncertainty Decision Model of the Regional Collaborative Innovation System Based on an Improved Ant Colony Algorithm}, journal = {Sci. Program.}, volume = {2016}, pages = {2402037:1--2402037:10}, year = {2016}, url = {https://doi.org/10.1155/2016/2402037}, doi = {10.1155/2016/2402037}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sp/ZhangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangW16, author = {Xiaona Zhang and Li{-}Ping Wang}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {357--366}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_22}, doi = {10.1007/978-3-319-54705-3\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHZPH16, author = {Jun Xu and Lei Hu and Xiaona Zhang and Liqiang Peng and Zhangjie Huang}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {48--58}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_4}, doi = {10.1007/978-3-319-45871-7\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/XuHZPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHSZHP16, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {440--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_26}, doi = {10.1007/978-3-319-45871-7\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/XuHSZHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuHSZHP16, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, title = {Cryptanalysis of Multi-Prime {\(\Phi\)}-Hiding Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2016}, url = {http://eprint.iacr.org/2016/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuHSZHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWXHPHL15, author = {Xiaona Zhang and Li{-}Ping Wang and Jun Xu and Lei Hu and Liqiang Peng and Zhangjie Huang and Zeyi Liu}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Recovering a Sum of Two Squares Decomposition Revisited}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {178--192}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_11}, doi = {10.1007/978-3-319-38898-4\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWXHPHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irob/ChenZZ13, author = {Gang Chen and Weigong Zhang and Xiaona Zhang}, title = {Fuzzy neural control for unmanned robot applied to automotive test}, journal = {Ind. Robot}, volume = {40}, number = {5}, pages = {450--461}, year = {2013}, url = {https://doi.org/10.1108/IR-08-2012-398}, doi = {10.1108/IR-08-2012-398}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irob/ChenZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangWZL08, author = {Yunjie Zhang and Weina Wang and Xiaona Zhang and Yi Li}, title = {A cluster validity index for fuzzy clustering}, journal = {Inf. Sci.}, volume = {178}, number = {4}, pages = {1205--1218}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2007.10.004}, doi = {10.1016/J.INS.2007.10.004}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangWZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfie/ZhangZWL07, author = {Xiaona Zhang and Yunjie Zhang and Weina Wang and Yi Li}, editor = {Bing{-}yuan Cao}, title = {A Novel Approach for Fuzzy Connected Image Segmentation}, booktitle = {Fuzzy Information and Engineering, Proceedings of the Second International Conference of Fuzzy Information and Engineering, {ICFIE} 2007, May 13-16, 2007, Guangzhou, China}, series = {Advances in Soft Computing}, volume = {40}, pages = {89--97}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71441-5\_11}, doi = {10.1007/978-3-540-71441-5\_11}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfie/ZhangZWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.