default search action
Xuefeng Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Wen Hong, Chao Zhang, Fang Zhang, Xuefeng Zheng, Xiaohua Ma, Yue Hao:
Performance improvement of β-Ga2O3 SBD-based rectifier with embedded microchannels in ceramic substrate. Sci. China Inf. Sci. 67(5) (2024) - [c21]Min Zhou, Hong Zhou, Mengwei Si, Guangjie Gao, Xiaojin Chen, Xiaoxiao Zhu, Kui Dang, Peijun Ma, Xiaohua Ma, Xuefeng Zheng, Zhihong Liu, Jincheng Zhang, Yuhao Zhang, Yue Hao:
71 GHz-fmax β-Ga2O3-on-SiC RF Power MOSFETs with Record Pout=3.1 W/mm and PAE=50.8% at 2 GHz, Pout= 2.3 W/mm at 4 GHz, and Low Microwave Noise Figure. VLSI Technology and Circuits 2024: 1-2 - 2022
- [j8]Haiyong Wang, Wei Mao, Shenglei Zhao, Yuanhao He, Jiabo Chen, Ming Du, Xuefeng Zheng, Chong Wang, Chunfu Zhang, Jincheng Zhang, Yue Hao:
Unidirectional p-GaN gate HEMT with composite source-drain field plates. Sci. China Inf. Sci. 65(2) (2022) - 2020
- [j7]Yuan Min, Fengxiang Xu, Junhao Wu, Xuefeng Zheng:
Injury analysis of vehicle-pedestrian collision based on orthogonal experiments. Comput. Syst. Sci. Eng. 35(3) (2020) - [c20]Yingzhe Wang, Xuefeng Zheng, Jiaduo Zhu, Shengrui Xu, Xiaohua Ma, Jincheng Zhang, Yue Hao, Linlin Xu, Jiangnan Dai, Peixian Li:
Evolution of Defect in AlGaN-based Deep Ultraviolet Light Emitting Diodes During Electrical Stress. IRPS 2020: 1-4
2010 – 2019
- 2019
- [j6]Haichun Zhao, Xuanxia Yao, Xuefeng Zheng:
Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage. Int. J. Netw. Secur. 21(3): 451-461 (2019) - [j5]Haichun Zhao, Xuanxia Yao, Xuefeng Zheng, Tie Qiu, Huansheng Ning:
User stateless privacy-preserving TPA auditing scheme for cloud storage. J. Netw. Comput. Appl. 129: 62-70 (2019) - 2016
- [j4]Changyou Guo, Xuefeng Zheng, Xiulian Gao:
基于不确定理论的不确定性数据Top-k查询计算 (Top-k Query Calculation of Uncertain Data Based on Uncertainty Theory). 计算机科学 43(3): 225-230 (2016) - 2015
- [j3]Yongsheng Wang, Xuefeng Zheng, Yanfeng Suo:
一种基于信息粒度的动态属性约简求解算法 (Dynamic Algorithm for Computing Attribute Reduction Based on Information Granularity). 计算机科学 42(4): 213-216 (2015) - [c19]Shuang Zhang, Xuefeng Zheng, Changjun Hu:
A survey of semantic similarity and its application to social network analysis. IEEE BigData 2015: 2362-2367 - [c18]Haichun Zhao, Xuefeng Zheng:
A Survey on the Integrity Checking of Outsourced Data in Cloud Computing. UIC/ATC/ScalCom 2015: 1650-1656 - 2014
- [c17]Changyou Guo, Xuefeng Zheng:
Feature subset selection approach based on fuzzy rough set for high-dimensional data. GrC 2014: 72-75 - [c16]Yongsheng Wang, Xuefeng Zheng, Yanfeng Suo:
A dynamic rule extraction based on information granularity model for complete data. GrC 2014: 329-333 - [c15]Yongsheng Wang, Xuefeng Zheng:
An Efficient BP-Neural Network Classification Model Based on Attribute Reduction. RSKT 2014: 206-215 - 2013
- [i4]Sultan Ullah, Xuefeng Zheng:
Cloud Computing: a Prologue. CoRR abs/1304.2981 (2013) - [i3]Sultan Ullah, Xuefeng Zheng, Feng Zhou, Haichun Zhao:
TCLOUD: Challenges and Best Practices for Cloud Computing. CoRR abs/1304.3134 (2013) - [i2]Sultan Ullah, Xuefeng Zheng:
Cloud Computing Research Challenges. CoRR abs/1304.3203 (2013) - [i1]Sultan Ullah, Xuefeng Zheng, Feng Zhou:
TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing. CoRR abs/1305.2865 (2013) - 2011
- [j2]Yike Yu, Xuefeng Zheng, Hua Sun:
An Identity Based Aggregate Signature from Pairings. J. Networks 6(4): 631-637 (2011) - [c14]Yong Hou, Xuefeng Zheng:
SVM Based MLP Neural Network Algorithm and Application in Intrusion Detection. AICI (3) 2011: 340-345 - 2010
- [c13]Zhongjun Deng, Wei Song, Xuefeng Zheng:
P2PKMM: A Hybrid Clustering Algorithm over P2P Network. IITSI 2010: 450-454
2000 – 2009
- 2009
- [c12]Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang:
An Identity-Based Authentication Model for Mobile Agent. IAS 2009: 475-478 - [c11]Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang:
Research on Model of Trust Degrees for PKI. IAS 2009: 647-650 - [c10]Hongke Xia, Xuefeng Zheng, Xiang Hu, Ying'ai Tian:
Multi-strategy Ontology Mapping Based on Stacking Method. FSKD (2) 2009: 262-269 - 2008
- [j1]Xuanxia Yao, Xuefeng Zheng, Tao Wu:
A Hexagon-based Key Pre-distribution Scheme for Large Scale Static Wireless Sensor Networks. J. Commun. 3(6): 19-26 (2008) - [c9]Xuanxia Yao, Xuefeng Zheng:
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks. CIS (1) 2008: 436-441 - [c8]Chengyao Wang, Xuefeng Zheng, Xuyan Tu:
Coordination Framework Based Software Development Approach and Its Applications. CSSE (2) 2008: 537-540 - [c7]Zhen Yu, Xuefeng Zheng, Shao-jie Wang, Chao Wen:
A Mechanism for P2P Traffic Control. CSSE (4) 2008: 988-991 - [c6]Guicheng Shen, Xuefeng Zheng:
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. ISECS 2008: 288-291 - [c5]Xuanxia Yao, Xuefeng Zheng, Tao Wu:
A Secure Routing Scheme Based on Multiple Criteria Decision Making in Wireless Sensor Networks. PACIIA (2) 2008: 771-775 - [c4]Xuanxia Yao, Xuefeng Zheng:
A Secure Routing Scheme for Static Wireless Sensor Networks. PACIIA (2) 2008: 776-780 - 2007
- [c3]Haiyan Liu, Xuefeng Zheng, Ying Wang:
DWT-Based Audio Watermarking Resistant to Desynchronization. CIT 2007: 745-748 - [c2]Aizhong Mi, Xuefeng Zheng, Xuyan Tu:
Application of Clustering and Multi-cluster Selection in SoftMan's Perception System. ICNC (2) 2007: 134-138 - [c1]Aizhong Mi, Jiquan Shen, Xuefeng Zheng, Xuyan Tu:
Applying Multiple Classifier Systems to SoftMan's Perception System. SNPD (1) 2007: 315-320
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint