default search action
Xu Huang 0001
Person information
- affiliation: University of Canberra, ESTEM Faculty, ACT, Australia
Other persons with the same name
- Xu Huang — disambiguation page
- Xu Huang 0002 — Huzhou University, School of Information Engineering, China (and 1 more)
- Xu Huang 0003 — National University of Defense Technology, College of Aerospace Science and Engineering, Changsha, China
- Xu Huang 0004 — Hong Kong Polytechnic University, Department of Management and Marketing, Hong Kong
- Xu Huang 0005 — Ohio State University, Department of Civil, Environmental and Geodetic Engineering, Columbus, OH, USA (and 1 more)
- Xu Huang 0006 — Bournemouth University, Faculty of Managemen, Poole, UK
- Xu Huang 0007 — Northeast Forestry University, Department of Forest Management, Harbin, China
- Xu Huang 0008 — University of Science and Technology of China, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j3]Raul Fernandez Rojas, Mingyu Liao, Julio Romero, Xu Huang, Keng-Liang Ou:
Cortical Network Response to Acupuncture and the Effect of the Hegu Point: An fNIRS Study. Sensors 19(2): 394 (2019) - [e1]Li Ma, Xu Huang:
Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2019, Beijing, China, August 16-18, 2019. ACM 2019, ISBN 978-1-4503-7229-9 [contents] - 2017
- [c87]Raul Fernandez Rojas, Xu Huang, Jesus Hernandez-Juarez, Keng-Liang Ou:
Physiological fluctuations show frequency-specific networks in fNIRS signals during resting state. EMBC 2017: 2550-2553 - [c86]Xu Huang, Raul Fernandez Rojas, Allan C. Madoc, Keng-Liang Ou, Sheikh Md. Rabiul Islam:
A Computational Investigation of an Active Region in Brain Network Based on Stimulations with Near-Infrared Spectroscopy. ICONIP (2) 2017: 728-738 - [c85]Raul Fernandez Rojas, Xu Huang, Julio Romero, Keng-Liang Ou:
fNIRS Approach to Pain Assessment for Non-verbal Patients. ICONIP (4) 2017: 778-787 - [c84]Raul Fernandez Rojas, Xu Huang, Keng-Liang Ou, Jesus Hernandez-Juarez:
Exploring the use of optical flow for the study of functional NIRS signals. Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging 2017: 101372K - 2016
- [c83]Xu Huang, Muhammad R. Ahmed, Raul Fernandez Rojas, Hongyan Cui, Mohammed A. Aseeri:
Effective algorithm for protecting WSNs from internal attacks in real-time. ACSW 2016: 40 - [c82]Xu Huang, Raul Fernandez Rojas, Keng-Liang Ou:
Cortical activation investigation by optical flow and wavelet analysis using near-infrared spectroscopy. BioRob 2016: 1307-1312 - 2015
- [c81]Pritam Gajkumar Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde:
Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform. ICETET 2015: 51-55 - [c80]Sheikh Md. Rabiul Islam, Xu Huang, Keng-Liang Ou, Raul Fernandez Rojas, Hongyan Cui:
Novel Information Processing for Image De-noising Based on Sparse Basis. ICONIP (3) 2015: 443-451 - 2014
- [j2]Hongyan Cui, Mingzhi Xie, Yunlong Cai, Xu Huang, Yunjie Liu:
Cluster validity index for adaptive clustering algorithms. IET Commun. 8(13): 2256-2263 (2014) - [j1]Weirong Liu, Shutao Li, Xu Huang:
Extraction of lane markings using orientation and vanishing point constraints in structured road scenes. Int. J. Comput. Math. 91(11): 2359-2373 (2014) - [c79]Sheikh Md. Rabiul Islam, Xu Huang, Kim Le:
Novel Evaluation Index for Image Quality. DICTA 2014: 1-8 - [c78]Sheikh Md. Rabiul Islam, Xu Huang, Kim Le:
A Novel Adaptive Shrinkage Threshold on Shearlet Transform for Image Denoising. ICONIP (3) 2014: 127-134 - [c77]Phuoc Nguyen, Dat Tran, Xu Huang, Wanli Ma:
A Novel Sphere-Based Maximum Margin Classification Method. ICPR 2014: 620-624 - [c76]Muhammad R. Ahmed, Hongyan Cui, Xu Huang:
Smart integration of cloud computing and MCMC based secured WSN to monitor environment. VITAE 2014: 1-5 - 2013
- [c75]Tuan Hoang, Dat Tran, Xu Huang:
Approximation-based Common Principal Component for feature extraction in multi-class Brain-Computer Interfaces. EMBC 2013: 5061-5064 - [c74]Hongyan Cui, Shaohua Tang, Xu Huang, Jianya Chen, Yunjie Liu:
A novel method of virtual network embedding based on topology convergence-degree. ICC Workshops 2013: 246-250 - [c73]Sheikh Md. Rabiul Islam, Xu Huang, Kim Le:
A Novel Image Quality Index for Image Quality Assessment. ICONIP (3) 2013: 549-556 - [c72]Phuoc Nguyen, Dat Tran, Tan Vo, Xu Huang, Wanli Ma, Dinh Q. Phung:
EEG-Based Age and Gender Recognition Using Tensor Decomposition and Speech Features. ICONIP (2) 2013: 632-639 - [c71]Tuan Hoang, Dat Tran, Xu Huang, Wanli Ma:
A general aggregate model for improving multi-class brain-computer interface systems' performance. IJCNN 2013: 1-5 - [c70]Phuoc Nguyen, Dat Tran, Xu Huang, Wanli Ma:
Parallel Support Vector Data Description. IWANN (1) 2013: 280-290 - [c69]Phuoc Nguyen, Dat Tran, Xu Huang, Wanli Ma:
Motor Imagery EEG-Based Person Verification. IWANN (2) 2013: 430-438 - [c68]Xu Huang, Salahiddin Altahat, Dat Tran, Shutao Li:
Human Identification with Electroencephalogram (EEG) for the Future Network Security. NSS 2013: 575-581 - [c67]Phuoc Nguyen, Dat Tran, Trung Le, Xu Huang, Wanli Ma:
EEG-Based Person Verification Using Multi-Sphere SVDD and UBM. PAKDD (1) 2013: 289-300 - [c66]Muhammad R. Ahmed, Xu Huang, Hongyan Cui:
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN. TrustCom/ISPA/IUCC 2013: 688-693 - [c65]Xu Huang, Muhammad R. Ahmed, Dharmendra Sharma, Hongyan Cui:
Protecting wireless sensor networks from internal attacks based on uncertain decisions. WCNC 2013: 1854-1859 - [c64]Hongyan Cui, Kuo Zhang, Xu Huang, Yunjie Liu:
A cluster validity index based on frequent pattern. WPMC 2013: 1-5 - [c63]Xu Huang, Muhammad R. Ahmed, Hongyan Cui, Shutao Li:
Malicious node detection for the future network security from epistemic uncertainties. WPMC 2013: 1-6 - [c62]Xu Huang, Sheikh Md. Rabiul Islam, Mingyu Liao, Shutao Li:
Higher quality of infrared images for future network security systems. WPMC 2013: 1-6 - 2012
- [c61]Xu Huang, Dharmendra Sharma, Muhammad Ahmed:
Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. ICA3PP (1) 2012: 16-29 - [c60]Muhammad Ahmed, Xu Huang, Dharmendra Sharma, Shutao Li:
Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory. ICA3PP (2) 2012: 255-263 - [c59]Salahiddin Altahat, Xu Huang, Dat Tran, Dharmendra Sharma:
People Identification with RMS-Based Spatial Pattern of EEG Signal. ICA3PP (2) 2012: 310-318 - [c58]Xu Huang, Muhammad Ahmed, Dharmendra Sharma:
Timing control for protecting from internal attacks in wireless sensor networks. ICOIN 2012: 7-12 - [c57]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Quantum cryptography based key distribution in WiFi networks. ICOIN 2012: 251-256 - [c56]Xu Huang, Dharmendra Sharma, Hongyan Cui:
Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. ICOIN 2012: 312-317 - [c55]Xu Huang, Dharmendra Sharma, Muhammad Ahmed, Hongyan Cui:
Protecting an WSN from internal attack based on epistemic uncertainties. ICON 2012: 389-394 - [c54]Tuan Hoang, Dat Tran, Khoa Truong, Trung Le, Xu Huang, Dharmendra Sharma, Toi Vo:
Time Domain Parameters for Online Feedback fNIRS-Based Brain-Computer Interface Systems. ICONIP (2) 2012: 192-201 - [c53]Xu Huang, Dharmendra Sharma:
Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks. IPDPS Workshops 2012: 1256-1262 - [c52]Sheikh Md. Rabiul Islam, Xu Huang, Dharmendra Sharma:
Wavelet based denoising algorithm of the ECG signal corrupted by WGN and Poisson noise. ISCIT 2012: 165-168 - [c51]Hongyan Cui, Chen Feng, Ren Ping Liu, Xu Huang, Yunjie Liu:
Prolonging network lifetime in two-level heterogeneous Wireless Sensor Networks. ISCIT 2012: 871-876 - [c50]Xu Huang, Salahiddin Altahat, Dat Tran, Dharmendra Sharma:
Human identification with electroencephalogram (EEG) signal processing. ISCIT 2012: 1021-1026 - [c49]Muhammad R. Ahmed, Xu Huang, Dharmendra Sharma:
A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks. MobiHoc 2012: 259-260 - [c48]Muhammad Ahmed, Xu Huang, Dharmendra Sharma:
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. NPC 2012: 94-100 - 2011
- [c47]Len Bui, Dat Tran, Xu Huang, Girija Chetty:
Relation Learning - A New Approach to Face Recognition. ACIVS 2011: 566-575 - [c46]Xu Huang, Muhammad Ahmed, Dharmendra Sharma:
Protecting from Inside Attacks in Wireless Sensor Networks. DASC 2011: 186-191 - [c45]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks. EUC 2011: 338-343 - [c44]Xu Huang, Muhammad Ahmed, Dharmendra Sharma:
A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks. EUC 2011: 344-349 - [c43]Len Bui, Dat Tran, Xu Huang, Girija Chetty:
Face recognition based on Gabor features. EUVIP 2011: 264-268 - [c42]Len Bui, Dat Tran, Xu Huang, Girija Chetty:
Classification of gender and face based on gradient faces. EUVIP 2011: 269-272 - [c41]Xu Huang, Dharmendra Sharma, Pritam Gajkumar Shah:
Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography. FUZZ-IEEE 2011: 2342-2349 - [c40]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Investigations for the simulations of a quantum key distribution in WiFi. IWCMC 2011: 189-194 - [c39]Shirantha Wijesekera, Xu Huang, Dharmendra Sharma:
Quantum cryptography based Key Distribution in IEEE 802.11 networks - analysis on reconciliation phase. IWCMC 2011: 195-200 - [c38]Len Bui, Dat Tran, Xu Huang, Girija Chetty:
Novel Metrics for Face Recognition Using Local Binary Patterns. KES (1) 2011: 436-445 - [c37]Shirantha Wijesekera, Xu Huang, Dharmendra Sharma:
Performance analysis of QKD based key distribution for IEEE 802.11 networks. PST 2011: 246-251 - 2010
- [c36]Pritam Gajkumar Shah, Xu Huang, Dharmendra Sharma:
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. AINA Workshops 2010: 571-576 - [c35]Pritam Gajkumar Shah, Xu Huang, Dharmendra Sharma:
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. AINA Workshops 2010: 589-592 - [c34]Shirantha Wijesekera, Xu Huang, Dharmendra Sharma:
Quantum Cryptography based Key Distribution in Wi-Fi Networks - Protocol Modifications in IEEE 802.11. ICSOFT (1) 2010: 146-151 - [c33]Phuoc Nguyen, Trung Le, Dat Tran, Xu Huang, Dharmendra Sharma:
Fuzzy support vector machines for age and gender classification. INTERSPEECH 2010: 2806-2809 - [c32]Len Bui, Dat Tran, Xu Huang, Girija Chetty:
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. NSS 2010: 579-582 - [c31]Xu Huang, Pritam Gajkumar Shah, Dharmendra Sharma:
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange. NSS 2010: 588-593 - [c30]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. NSS 2010: 594-599 - [c29]Phuoc Nguyen, Dat Tran, Xu Huang, Dharmendra Sharma:
Automatic Speech-Based Classification of Gender, Age and Accent. PKAW 2010: 288-299 - [c28]Phuoc Nguyen, Dat Tran, Xu Huang, Dharmendra Sharma:
Australian Accent-Based Speaker Classification. WKDD 2010: 416-419
2000 – 2009
- 2009
- [c27]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. ACIS-ICIS 2009: 812-817 - [c26]Rossilawati Sulaiman, Xu Huang, Dharmendra Sharma:
E-health Services with Secure Mobile Agent. CNSR 2009: 270-277 - [c25]Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks. FSKD (3) 2009: 302-306 - [c24]Xu Huang, Dharmendra Sharma:
Multi-Agent Systems in Quantum Security for Modern Wireless Networks. KES (2) 2009: 119-126 - [c23]Shirantha Wijesekera, Xu Huang, Dharmendra Sharma:
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. KES-AMSTA 2009: 293-303 - [c22]Xu Huang, Dharmendra Sharma:
Fuzzy Switching Controller for the Security in 802.11 Networks. NetCoM 2009: 370-375 - 2008
- [c21]Mohammad Yamin, Masoud Mohammadian, Xu Huang, Dharmendra Sharma:
RFID Technology and Crowded Event Management. CIMCA/IAWTIC/ISE 2008: 1293-1297 - [c20]Xu Huang, Dharmendra Sharma:
An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks. KES (3) 2008: 218-226 - [c19]Xu Huang, Dharmendra Sharma:
An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. KES (3) 2008: 227-235 - 2007
- [c18]Xu Huang, Alexander Ridgewell, Dharmendra Sharma:
A Dynamic Adaptive Threshold Transmission for XML Data on Networks. CCNC 2007: 131-134 - [c17]Xu Huang, Dharmendra Sharma:
A New Efficient Transmission for XML Data on Networks. IMECS 2007: 1238-1241 - [c16]Son Le, Xu Huang, Dharmendra Sharma:
A Multi-agent Architecture for RFID Taxonomy. KES (3) 2007: 917-925 - [c15]Xu Huang, Dat Tran:
Adaptive Binary Splitting for a RFID Tag Collision Arbitration Via Multi-agent Systems. KES (3) 2007: 926-933 - [c14]Nazni Farooq, Xu Huang, Dharmendra Sharma:
Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. KES (3) 2007: 950-958 - 2006
- [c13]Xu Huang, Allan C. Madoc, Dharmendra Sharma:
Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator. DELTA 2006: 31-34 - [c12]Xu Huang, Dharmendra Sharma:
Investigating Security in Multi-tree Based Technique in RFID Systems. KES (3) 2006: 1150-1156 - [c11]Xu Huang:
An Improved ALOHA Algorithm for RFID Tag Identification. KES (3) 2006: 1157-1162 - [c10]Xu Huang, Alexander Ridgewell, Dharmendra Sharma:
A Dynamic Threshold Technique for XML Data Transmission on Networks. KES (3) 2006: 1163-1167 - 2005
- [c9]Xu Huang, Allan C. Madoc, Andrew D. Cheetham:
Image multi-noise removal by wavelet-based Bayesian estimator. ISCAS (3) 2005: 2699-2702 - [c8]Xu Huang, Allan C. Madoc:
Image Multi-noise Removal via Lévy Process Analysis. KES (4) 2005: 22-28 - [c7]Alexander Ridgewell, Xu Huang, Dharmendra Sharma:
Evaluating the Size of the SOAP for Integration in B2B. KES (4) 2005: 29-34 - [c6]Xu Huang, Allan C. Madoc:
Investigating the Transport Communicating Rates of Wireless Networks over Fading Channels. KES (1) 2005: 233-239 - 2004
- [c5]Xu Huang, Allan C. Madoc, M. Wagner:
Noises removal for images by wavelet-based Bayesian estimator via Levy process analysis. ICME 2004: 327-330 - [c4]Xu Huang, Allan C. Madoc, Andrew D. Cheetham:
Multi-noise removal from images by wavelet-based Bayesian estimator. ISMSE 2004: 258-264 - 2003
- [c3]Xu Huang, Allan C. Madoc, Andrew D. Cheetham:
Wavelet-based Bayesian estimator for Poisson noise removal from images. ICME 2003: 593-596 - [c2]Xu Huang, Allan C. Madoc:
Image noises removal on alpha-stable via Bayesian estimator. ISSPA (2) 2003: 165-168 - 2002
- [c1]Xu Huang, Allan C. Madoc:
Maximum likelihood for Bayesian estimator based on α-stable for image. ICME (1) 2002: 709-712
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint