default search action
Xiaoyao Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Sicong Zhang, Yang Xu, Xinyu Zhang, Xiaoyao Xie:
Amplification methods to promote the attacks against machine learning-based intrusion detection systems. Appl. Intell. 54(4): 2941-2961 (2024) - [j16]Houfu Peng, Xing Lu, Lili Xu, Daoxun Xia, Xiaoyao Xie:
Parameter instance learning with enhanced vision transformers for aerial person re-identification. Concurr. Comput. Pract. Exp. 36(12) (2024) - 2023
- [j15]Heping Zhang, Sicong Zhang, Xiaoyao Xie, Taihua Zhang, Guojun Yu:
Identification of Key Nodes in Complex Networks Based on Network Representation Learning. IEEE Access 11: 128175-128186 (2023) - 2022
- [j14]Zhentao Liu, Zhengdong Zhang, Sheng Liang, Zhen Chen, Xiaoyao Xie, Tie Shen:
CeCaFLUX: the first web server for standardized and visual instationary 13C metabolic flux analysis. Bioinform. 38(13): 3481-3483 (2022) - 2021
- [j13]Guiyong Xu, Yang Xu, Sicong Zhang, Xiaoyao Xie:
SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block. Secur. Commun. Networks 2021: 3676720:1-3676720:11 (2021) - 2020
- [j12]Sicong Zhang, Xiaoyao Xie, Yang Xu:
A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity. IEEE Access 8: 128250-128263 (2020) - [j11]Yuanyuan Xiao, Xiaoyao Xie:
Application of Novel Gabor-DCNN into RGB-D Face Recognition. Int. J. Netw. Secur. 22(3): 532-539 (2020) - [j10]Linyong Zhou, Shanping You, Bimo Ren, Xuhong Yu, Xiaoyao Xie:
A novel image classification model based on adversarial training for pulsar candidate identification. J. Intell. Fuzzy Syst. 39(5): 7657-7669 (2020) - [j9]Yang Xu, Zixi Fu, Guiyong Xu, Sicong Zhang, Xiaoyao Xie:
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis. Secur. Commun. Networks 2020: 8847741:1-8847741:9 (2020)
2010 – 2019
- 2019
- [j8]Linyong Zhou, Zhijie Liu, Hongwei Tan, Xiaoyao Xie:
Semisupervised learning with adversarial training among joint distributions. J. Electronic Imaging 28(5): 053030 (2019) - [j7]Peijia Yu, Yong Zhao, Jing Zhang, Xiaoyao Xie:
Pedestrian detection using multi-channel visual feature fusion by learning deep quality model. J. Vis. Commun. Image Represent. 63 (2019) - 2018
- [j6]Yang Xu, Yi Chen, Lei Huang, Xiaoyao Xie:
基于多层BP神经网络和无参数微调的人群计数方法 (Crowd Counting Method Based on Multilayer BP Neural Networks and Non-parameter Tuning). 计算机科学 45(10): 235-239 (2018) - [c8]Yang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie:
Modeling and Analysis of a Hybrid Authentication Protocol for VANET. ICCCS (3) 2018: 123-137 - 2016
- [j5]Yang Xu, Dan Zhu, Huanguo Zhang, Xiaoyao Xie:
云环境下基于代数签名持有性审计的大数据安全存储方案 (Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment). 计算机科学 43(10): 172-176 (2016) - 2015
- [j4]Zhengdong Zhang, Tie Shen, Bin Rui, Wenwei Zhou, Xiangfei Zhou, Chuanyu Shang, Chenwei Xin, Xiaoguang Liu, Gang Li, Jiansi Jiang, Chao Li, Ruiyuan Li, Mengshu Han, Shanping You, Guojun Yu, Yin Yi, Han Wen, Zhijie Liu, Xiaoyao Xie:
CeCaFDB: a curated database for the documentation, visualization and comparative analysis of central carbon metabolic flux distributions explored by 13C-fluxomics. Nucleic Acids Res. 43(Database-Issue): 549-557 (2015) - 2011
- [j3]Ziyi You, Xiaoyao Xie:
A novel group key agreement protocol for wireless mesh network. Comput. Electr. Eng. 37(2): 218-239 (2011) - [j2]Yang Xu, Xiaoyao Xie:
Modeling and Analysis of Security Protocols Using Colored Petri Nets. J. Comput. 6(1): 19-27 (2011) - [j1]Yang Xu, Xiaoyao Xie, Huanguo Zhang:
Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets. J. Softw. 6(7): 1181-1187 (2011) - [c7]Song Liu, Xiaoyao Xie:
Research on algorithm of point cloud MapReduce registration. CCIS 2011: 338-341 - [c6]Qing Xie, Xiaoyao Xie:
Point cloud data reduction methods of octree-based coding and neighborhood search. EMEIT 2011: 3800-3803 - [c5]Liming Liu, Fengxuan Jing, Xiaoyao Xie, Xiaojie Liu:
Hybrid-based segmentation of massive three-dimensional point cloud data. EMEIT 2011: 4689-4692 - [c4]Jihui Chen, Xiaoyao Xie, Fengxuan Jing:
The security of shopping online. EMEIT 2011: 4693-4696
2000 – 2009
- 2008
- [c3]Yang Xu, Xiaoyao Xie:
Security analysis of routing protocol for MANET based on extended Rubin logic. ICNSC 2008: 1326-1331 - [c2]Yang Xu, Xiaoyao Xie:
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. ICYCS 2008: 2079-2084 - 2004
- [c1]Zhiqiang Wu, Carl R. Nassar, Xiaoyao Xie:
Narrowband interference rejection in OFDM via carrier interferometry spreading codes. GLOBECOM 2004: 2387-2392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 01:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint