default search action
Ke Xiao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j77]Guandong Gao, Ke Xiao, Hui Li, Shengzun Song:
An intelligent assessment method of criminal psychological attribution based on unbalance data. Comput. Hum. Behav. 158: 108286 (2024) - [j76]Ke Xiao, Anna Zhu, Brian Kenji Iwana, Cheng-Lin Liu:
Scene text recognition via dual character counting-aware visual and semantic modeling network. Sci. China Inf. Sci. 67(3) (2024) - [j75]Yunhua He, Shuang Wang, Zhihao Zhou, Ke Xiao, Anke Xie, Bin Wu:
A Blockchain-based carbon emission security accounting scheme. Comput. Networks 243: 110304 (2024) - [j74]Ke Xiao, Jiayang Li, Yunhua He, Xu Wang, Chao Wang:
A secure multi-party payment channel on-chain and off-chain supervisable scheme. Future Gener. Comput. Syst. 154: 330-343 (2024) - [j73]Chen Li, Shuai Zhao, Wei Song, Ke Xiao, Yanjie Wang:
Ubiquitous single-sample face recognition under occlusion based on sparse representation with dual features. J. Ambient Intell. Humaniz. Comput. 15(2): 1493-1503 (2024) - [j72]Jiawei Zhang, Guandong Gao, Ke Xiao, Shengzun Song:
Research on a hierarchical intervention algorithm for violent crime based on CLGA-Net. Int. J. Mach. Learn. Cybern. 15(3): 897-915 (2024) - [j71]Ke Xiao, Jie Hu, Chunlin Li, Wenjie Ji, Jinkun Xu, Huang Du:
Genetic Algorithm-Based Cooperative Coding and Caching Data Dissemination Scheme in Multi-UAV-Enabled Internet of Vehicles. Sensors 24(14): 4443 (2024) - [j70]Yu Xia, Ke Xiao, Yangang Yao, Zhibo Geng, Zsófia Lendek:
Fixed-Time Fuzzy Vibration Reduction for Stochastic MEMS Gyroscopes With Low Communication Resources. IEEE Trans. Fuzzy Syst. 32(8): 4220-4233 (2024) - [j69]Ke Xiao, Song Yang, Fan Li, Liehuang Zhu, Xu Chen, Xiaoming Fu:
Making Serverless Not So Cold in Edge Clouds: A Cost-Effective Online Approach. IEEE Trans. Mob. Comput. 23(9): 8789-8802 (2024) - [c42]Anna Zhu, Ke Xiao, Bo Zhou, Runmin Wang:
Trust Prophet or Not? Taking a Further Verification Step toward Accurate Scene Text Recognition. ACM Multimedia 2024: 1741-1750 - [c41]Ke Xiao, Jiaxin Wang, Chaofei Li, Zhenwei Yu, Feifei Gao:
Private Edge Computing Resource Allocation and Communication Optimization Based on Federated Learning. IFIP Networking 2024: 601-606 - [c40]Ke Xiao, Zhenwei Yu, Jiaxin Wang, Feifei Gao:
Proximal Policy Optimization Algorithm for Enhancing Energy Harvesting in UAV-Assisted Communications with RIS. WCNC 2024: 1-6 - 2023
- [j68]Ke Xiao, Kuiyuan Feng, Aofei Dong, Zhixin Mei:
Efficient Data Dissemination Strategy for UAV in UAV-Assisted VANETs. IEEE Access 11: 40809-40819 (2023) - [j67]Xue Chen, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain. Comput. Networks 224: 109595 (2023) - [j66]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE Internet Things J. 10(14): 12126-12139 (2023) - [j65]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j64]Hui Li, Guandong Gao, Ke Xiao, Shengzun Song:
Research on the psychological classification of violent crime based on a convolutional neural network. J. Ambient Intell. Humaniz. Comput. 14(12): 16397-16408 (2023) - [j63]Ke Xiao, Shuyong Li:
Exponential Stability of Impulsive Neutral Stochastic Functional Differential Equations with Markovian Switching. J. Syst. Sci. Complex. 36(4): 1560-1582 (2023) - [j62]Ping Fan, Ke Xiao:
Quantum image edge extraction based on difference of Gaussian operator. Quantum Inf. Process. 22(1): 46 (2023) - [j61]Chao Wang, Shuo Wang, Xiaoman Cheng, Yunhua He, Ke Xiao, Shujia Fan:
A Privacy and Efficiency-Oriented Data Sharing Mechanism for IoTs. IEEE Trans. Big Data 9(1): 174-185 (2023) - [j60]Yunhua He, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. IEEE/ACM Trans. Netw. 31(2): 485-496 (2023) - [c39]Yaokuan Wen, Yanan Li, Jiewen Li, Ke Xiao, Xin Yang, Ke Zheng:
Research on The Application of Artificial Intelligence Technology in Emergency Repair and Power Restoration of Residential Areas Under Heavy Rain Disaster Weather. AISNS 2023: 375-379 - [c38]Hualing Ren, Kai Liu, Yantao Li, Penglin Dai, Ke Xiao:
Cooperative Data Uploading and Task Offloading via Markov-Approximation in Heterogeneous Vehicular Networks. ITSC 2023: 3200-3206 - [c37]Ke Xiao, Erik G. Learned-Miller, Evangelos Kalogerakis, James Priest, Madalina Fiterau:
Machine Learning for Automated Mitral Regurgitation Detection from Cardiac Imaging. MICCAI (7) 2023: 236-246 - [c36]Yangkai Zhou, Hualing Ren, Ke Xiao, Kai Liu:
Joint Data Routing and Service Migration via Evolutionary Multitasking Optimization in Vehicular Networks. NCAA (2) 2023: 434-449 - [c35]Shiyuan Xu, Xue Chen, Weimin Kong, Yibo Cao, Yunhua He, Ke Xiao:
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET. VTC2023-Spring 2023: 1-6 - [i6]Ke Xiao, Erik G. Learned-Miller, Evangelos Kalogerakis, James Priest, Madalina Fiterau:
Machine Learning for Automated Mitral Regurgitation Detection from Cardiac Imaging. CoRR abs/2310.04871 (2023) - [i5]Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu:
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. IACR Cryptol. ePrint Arch. 2023: 349 (2023) - 2022
- [j59]Gang Xu, Yibo Cao, Shiyuan Xu, Ke Xiao, Xin Liu, Xiubo Chen, Mianxiong Dong:
A Novel Post-Quantum Blind Signature for Log System in Blockchain. Comput. Syst. Sci. Eng. 41(3): 945-958 (2022) - [j58]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE Internet Things J. 9(11): 7989-8000 (2022) - [j57]Fanfeng Zeng, Haoyin Bai, Ke Xiao:
Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS. Secur. Priv. 5(4) (2022) - [j56]Guangcan Yang, Yunhua He, Ke Xiao, Qifeng Tang, Yang Xin, Hongliang Zhu:
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. Secur. Commun. Networks 2022: 9360899:1-9360899:16 (2022) - [j55]Ke Xiao, Yutong Tian, Yuanyao Lu, Yu-Ping Lai, Xunchang Wang:
Quality assessment-based iris and face fusion recognition with dynamic weight. Vis. Comput. 38(5): 1631-1643 (2022) - [c34]Ke Xiao, Yueyao Zhang, Yunhua He, Gang Xu, Chao Wang:
Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM. CWSN 2022: 212-224 - [c33]Xincao Xu, Kai Liu, Qisen Zhang, Hao Jiang, Ke Xiao, Jiangtao Luo:
Age of View: A New Metric for Evaluating Heterogeneous Information Fusion in Vehicular Cyber-Physical Systems. ITSC 2022: 3762-3767 - [c32]Qisen Zhang, Kai Liu, Luyao Jiang, Chengliang Zhong, Liang Feng, Hao Zhang, Ke Xiao:
UAV-Assisted Blind Area Pedestrian Detection via Terminal-Edge-Cloud Cooperation in VANETs. NCAA (2) 2022: 314-330 - [c31]Yuyang Cheng, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios. WASA (2) 2022: 356-364 - [i4]Xincao Xu, Kai Liu, Qisen Zhang, Hao Jiang, Ke Xiao, Jiangtao Luo:
Age of View: A New Metric for Evaluating Heterogeneous Information Fusion in Vehicular Cyber-Physical Systems. CoRR abs/2208.00358 (2022) - [i3]Xincao Xu, Kai Liu, Penglin Dai, Hao Zhang, Ke Xiao:
Maximizing Quality and Minimizing Cost for VCPS in ISAC-Based Vehicular Networks: A Deep Reinforcement Learning Approach. CoRR abs/2211.00007 (2022) - 2021
- [j54]Zhen-Nan Fan, Zu-Ying Bian, Ke Xiao, Jing-Can Li, Bing Yao, Xue-Gui Gan:
The Electromagnetic-Fluid-Temperature Field Analysis of Loss and Heat of Self-Cooling Separate-Phase Enclosed Bus of Large Generator. IEEE Access 9: 11372-11377 (2021) - [j53]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A survey: applications of blockchain in the Internet of Vehicles. EURASIP J. Wirel. Commun. Netw. 2021(1): 77 (2021) - [j52]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Yutong Tian:
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme. EURASIP J. Wirel. Commun. Netw. 2021(1): 165 (2021) - [j51]Ke Xiao, Kai Liu, Xincao Xu, Yi Zhou, Liang Feng:
Efficient fog-assisted heterogeneous data services in software defined VANETs. J. Ambient Intell. Humaniz. Comput. 12(1): 261-273 (2021) - [j50]Ke Xiao, Kai Liu, Xincao Xu, Liang Feng, Zhou Wu, Qiangwei Zhao:
Cooperative coding and caching scheduling via binary particle swarm optimization in software-defined vehicular networks. Neural Comput. Appl. 33(5): 1467-1478 (2021) - [j49]Kai Liu, Ke Xiao, Penglin Dai, Victor C. S. Lee, Songtao Guo, Jiannong Cao:
Fog Computing Empowered Data Dissemination in Software Defined Heterogeneous VANETs. IEEE Trans. Mob. Comput. 20(11): 3181-3193 (2021) - [c30]Ziye Geng, Yunhua He, Chao Wang, Gang Xu, Ke Xiao, Shui Yu:
A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service. ICC 2021: 1-6 - [c29]Jialai Liu, Kai Liu, Feiyu Jin, Dong Wang, Guozhi Yan, Ke Xiao:
An Efficient CSI-Based Pedestrian Monitoring Approach via Single Pair of WiFi Transceivers. NCAA 2021: 685-700 - [c28]Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He, Ke Xiao, Yibo Cao:
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. WASA (2) 2021: 70-83 - 2020
- [j48]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Haoyu Zhang:
Destination Prediction-Based Scheduling Algorithms for Message Delivery in IoVs. IEEE Access 8: 14965-14976 (2020) - [j47]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Chunqiang Hu:
Segmented Trajectory Clustering-Based Destination Prediction in IoVs. IEEE Access 8: 98999-99009 (2020) - [j46]Zhi-Ting Zhou, Yong Yang, Ke Xiao, Zhen-Nan Fan, Zu-Ying Bian, Kun Wen, Jing-Can Li, Bing Yao:
Analysis and Treatment of an Overheated Ablated Fault on the Pole Shoe Surface of a Large Tubular Hydro-Generator. IEEE Access 8: 127929-127938 (2020) - [j45]Qing-Ling Hu, Ke Xiao, Zhi-Ting Zhou, Zhen-Nan Fan, Yong Yang, Zu-Ying Bian, Jing-Can Li, Bing Yao:
3D Transient Electromagnetic-Temperature Field Analysis of the Loss and Heat of the Damper Bars of a Large Tubular Hydro-Generator During Short Circuit Faults. IEEE Access 8: 135963-135974 (2020) - [j44]Meik Kunz, Beat Wolf, Maximilian Fuchs, Jan Christoph, Ke Xiao, Thomas Thum, David Atlan, Hans-Ulrich Prokosch, Thomas Dandekar:
A comprehensive method protocol for annotation and integrated functional understanding of lncRNAs. Briefings Bioinform. 21(4): 1391-1396 (2020) - [j43]Guandong Gao, Ke Xiao, Jia Yuchen:
A spraying path planning algorithm based on colour-depth fusion segmentation in peach orchards. Comput. Electron. Agric. 173: 105412 (2020) - [j42]Guoping Lei, Xiuying Luo, Zhiyuan Liu, Ke Xiao, Min-Lu Dai:
Research on application of dynamic threshold least squares Beidou positioning algorithm in Beidou geological disaster monitoring in Three Gorges Reservoir Area. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j41]Guoping Lei, Hongliang He, Ke Xiao, Min-Lu Dai:
Analysis and Research on the Structure Selection of BeiDou Navigation Array Antenna Based on Optimized PI Algorithm. Int. J. Pattern Recognit. Artif. Intell. 34(2): 2058002:1-2058002:18 (2020) - [j40]Xincao Xu, Kai Liu, Ke Xiao, Liang Feng, Zhou Wu, Songtao Guo:
Vehicular Fog Computing Enabled Real-Time Collision Warning via Trajectory Calibration. Mob. Networks Appl. 25(6): 2482-2494 (2020) - [j39]Ke Xiao, Bo Zhang, Supin Wang, Mingxi Wan, Liang Wu:
Aoustical and perceptual characteristics of mandarin consonants produced with an electrolarynx. Speech Commun. 123: 26-34 (2020) - [c27]Yunhua He, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020: 1-6 - [c26]Ke Xiao:
Design and Implementation of an Oral English Learning System Based on Speech Recognition Technology. ICITEE 2020: 446-449 - [c25]Chao Wang, Jitong Li, Xiaoman Cheng, Yunhua He, Limin Sun, Ke Xiao:
LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs. VTC Fall 2020: 1-5 - [c24]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A Survey: Applications of Blockchains in the Internet of Vehicles. WASA (1) 2020: 457-468 - [c23]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng:
A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. WASA (1) 2020: 542-554 - [i2]Xincao Xu, Kai Liu, Ke Xiao, Liang Feng, Zhou Wu, Songtao Guo:
Vehicular Fog Computing Enabled Real-time Collision Warning via Trajectory Calibration. CoRR abs/2005.11508 (2020)
2010 – 2019
- 2019
- [j38]Ke Xiao, Jianyu Zhao, Yunhua He, Chaofei Li, Wei Cheng:
Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks. IEEE Access 7: 110293-110305 (2019) - [j37]Guangcan Yang, Shoushan Luo, Hongliang Zhu, Yang Xin, Ke Xiao, Yuling Chen, Mingzhen Li, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j36]Guandong Gao, Ke Xiao, Miaomiao Chen:
An intelligent IoT-based control and traceability system to forecast and maintain water quality in freshwater fish farms. Comput. Electron. Agric. 166 (2019) - [j35]Ke Xiao, Jianyu Zhao, Moqi Jiang, Fenghe Wang:
An anti-eavesdropping scheme for hybrid multicast services with massive MIMO in 5G. J. Comput. Methods Sci. Eng. 19(1): 71-81 (2019) - [j34]Guoqing Xu, Ke Xiao, Chen Li:
Shape Description and Retrieval Using Included-Angular Ternary Pattern. J. Inf. Process. Syst. 15(4): 737-747 (2019) - [j33]Fanfeng Zeng, Shengda Hu, Ke Xiao:
Deep hash for latent image retrieval. Multim. Tools Appl. 78(22): 32419-32435 (2019) - [j32]Fanfeng Zeng, Shengda Hu, Ke Xiao:
Research on partial fingerprint recognition algorithm based on deep learning. Neural Comput. Appl. 31(9): 4789-4798 (2019) - [j31]Ke Xiao, Supin Wang, Mingxi Wan, Liang Wu:
Reconstruction of Mandarin Electrolaryngeal Fricatives With Hybrid Noise Source. IEEE ACM Trans. Audio Speech Lang. Process. 27(2): 383-391 (2019) - [j30]Junhua Wang, Kai Liu, Ke Xiao, Xiumin Wang, Qingwen Han, Victor Chung Sing Lee:
Delay-Constrained Routing via Heterogeneous Vehicular Communications in Software Defined BusNet. IEEE Trans. Veh. Technol. 68(6): 5957-5970 (2019) - [c22]Ke Xiao, Jianyu Zhao, Yunhua He, Shui Yu:
Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks. ICC 2019: 1-6 - [c21]Ke Xiao, Chaofei Li, Jianyu Zhao:
LSTM Based Multiple Beamforming for 5G HAPS IoT Networks. IWCMC 2019: 1895-1900 - [c20]Paroma Varma, Frederic Sala, Shiori Sagawa, Jason Alan Fries, Daniel Y. Fu, Saelig Khattar, Ashwini Ramamoorthy, Ke Xiao, Kayvon Fatahalian, James Priest, Christopher Ré:
Multi-Resolution Weak Supervision for Sequential Data. NeurIPS 2019: 192-203 - [c19]Ke Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng:
A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM. WASA 2019: 370-381 - [c18]Ke Xiao, Kai Liu, Junhua Wang, Yanning Yang, Liang Feng, Jingjing Cao, Victor C. S. Lee:
A Fog Computing Paradigm for Efficient Information Services in VANET. WCNC 2019: 1-7 - [i1]Frederic Sala, Paroma Varma, Jason A. Fries, Daniel Y. Fu, Shiori Sagawa, Saelig Khattar, Ashwini Ramamoorthy, Ke Xiao, Kayvon Fatahalian, James Priest, Christopher Ré:
Multi-Resolution Weak Supervision for Sequential Data. CoRR abs/1910.09505 (2019) - 2018
- [j29]Jingzhong Wang, Mengru Li, Yunhua He, Hong Li, Ke Xiao, Chao Wang:
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications. IEEE Access 6: 17545-17556 (2018) - [j28]Ke Xiao, Liang Gong, Michel Kadoch:
Opportunistic Multicast NOMA with Security Concerns in a 5G Massive MIMO System. IEEE Commun. Mag. 56(3): 91-95 (2018) - [j27]Yu-Ping Lai, Yuan Ping, Ke Xiao, Bin Hao, Xiufeng Zhang:
Variational Bayesian inference for a Dirichlet process mixture of beta distributions and application. Neurocomputing 278: 23-33 (2018) - [j26]Lu Gao, Ke Xiao, Hanquan Song, Xiaoman Qi:
Thermal Light Longitudinal Correlated Imaging with Random Orthogonal Matching Pursuit Algorithm. Int. J. Pattern Recognit. Artif. Intell. 32(12): 1854030:1-1854030:13 (2018) - [j25]Chen Li, Shuai Zhao, Ke Xiao, Yanjie Wang:
Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions. J. Inf. Process. Syst. 14(1): 191-204 (2018) - [j24]Chen Li, Mengti Liang, Wei Song, Ke Xiao:
A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information. J. Inf. Process. Syst. 14(6): 1494-1507 (2018) - [j23]Ke Xiao, Supin Wang, Mingxi Wan, Liang Wu:
Radiated Noise Suppression for Electrolarynx Speech Based on Multiband Time-Domain Amplitude Modulation. IEEE ACM Trans. Audio Speech Lang. Process. 26(9): 1585-1593 (2018) - [j22]Junhua Wang, Kai Liu, Ke Xiao, Chao Chen, Weiwei Wu, Victor C. S. Lee, Sang Hyuk Son:
Dynamic Clustering and Cooperative Scheduling for Vehicle-to-Vehicle Communication in Bidirectional Road Scenarios. IEEE Trans. Intell. Transp. Syst. 19(6): 1913-1924 (2018) - [j21]Xiang Cheng, Sen Su, Shengzhi Xu, Li Xiong, Ke Xiao, Mingxing Zhao:
A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining. IEEE Trans. Knowl. Data Eng. 30(8): 1411-1425 (2018) - [j20]Sen Su, Yiping Teng, Xiang Cheng, Ke Xiao, Guoliang Li, Junliang Chen:
Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments. IEEE Trans. Serv. Comput. 11(5): 796-809 (2018) - [j19]Ke Xiao, Wei Li, Michel Kadoch, Chen Li:
On the Secrecy Capacity of 5G MmWave Small Cell Networks. IEEE Wirel. Commun. 25(4): 47-51 (2018) - [j18]Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [j17]Ke Xiao, Michel Kadoch, Humphrey Rutagemwa, Chen Li:
Opportunistic NOMA-Based Massive MIMO Precoding for 5G New Radio. Wirel. Commun. Mob. Comput. 2018: 2328954:1-2328954:10 (2018) - [j16]Ke Xiao, Shaowei Zhang, Yunhua He:
On the Secrecy Capacity of 5G New Radio Networks. Wirel. Commun. Mob. Comput. 2018: 4359261:1-4359261:11 (2018) - [c17]Ke Xiao, Jianyu Zhao, Xunchang Wang, Chen Li, Moqi Jiang:
Design of Fast Iris Authentication System Based on Android Platform. BDIOT 2018: 71-75 - [c16]Chen Li, Zhiqiang Weng, Qianli Wang, Ke Xiao, Wei Song, Hui Zhou:
Human Identification Based on Deep Feature and Transfer Learning. BDIOT 2018: 80-83 - [c15]Zhenzhu Chen, Anmin Fu, Ke Xiao, Mang Su, Yan Yu, Yongli Wang:
Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing. ICC 2018: 1-6 - [c14]Ke Xiao, Shaowei Zhang, Michel Kadoch, Chen Li:
Study of Physical Layer Security in mmWave Satellite Networks. ICC 2018: 1-6 - [c13]Penglin Dai, Kai Liu, Ke Xiao, Junhua Wang, Zhaofei Yu, Huanlai Xing:
An Adaptive Task Assignment Scheme for Data Service in Heterogeneous Vehicular Networks. NAS 2018: 1-4 - 2017
- [j15]Ke Xiao, Yuejin Ma, Guandong Gao:
An intelligent precision orchard pesticide spray technique based on the depth-of-field extraction algorithm. Comput. Electron. Agric. 133: 30-36 (2017) - [j14]Fanfeng Zeng, Shupeng Liu, Ke Xiao:
Adaptive uneven illumination correction method of document images. J. Comput. Methods Sci. Eng. 17(3): 533-544 (2017) - [j13]Liang Wu, Ke Xiao, Supin Wang, Mingxi Wan:
Acoustic influence of the neck tissue on Mandarin voiceless consonant production of electrolaryngeal speech. Speech Commun. 87: 31-39 (2017) - [j12]Liang Wu, Ke Xiao, Supin Wang, Mingxi Wan:
Vocal efficiency of electrolaryngeal speech production. Speech Commun. 89: 17-24 (2017) - [c12]Chen Li, Mengti Liang, Ke Xiao, Simon Fong, Qianli Wang, Wei Song:
Human Body and Face Detection based Anti-shoulder Attack System on ATM. BDIOT 2017: 145-148 - [c11]Ke Xiao, Fenghe Wang, Humphrey Rutagemwa, Michel Kadoch, Bo Rong:
High-performance multicast services in 5G big data network with massive MIMO. ICC 2017: 1-6 - [c10]Chen Li, Shuai Zhao, Ke Xiao, Yanjie Wang:
Face Recognition Based on Enhanced CSLBP. MUE/FutureTech 2017: 539-544 - [c9]Ke Xiao, Shun Dai, Humphrey Rutagemwa, Bo Rong, Liang Gong, Michel Kadoch:
A Novel Opportunistic NOMA Scheme for 5G Massive MIMO Multicast Communications. VTC Fall 2017: 1-5 - 2016
- [j11]Shengzhi Xu, Xiang Cheng, Sen Su, Ke Xiao, Li Xiong:
Differentially Private Frequent Sequence Mining. IEEE Trans. Knowl. Data Eng. 28(11): 2910-2926 (2016) - [c8]Shengzhi Xu, Sen Su, Li Xiong, Xiang Cheng, Ke Xiao:
Differentially private frequent subgraph mining. ICDE 2016: 229-240 - [c7]Ke Xiao, Lijing Wang:
Based on point cloud and texture data generation algorithm of two-dimensional images. ISCIT 2016: 634-637 - [c6]Ke Xiao, Xiaodong Chu, Yutian Liu:
LED lighting loads actively participating in power system frequency regulation. ISGT 2016: 1-5 - 2015
- [j10]Xiang Cheng, Sen Su, Yiping Teng, Ke Xiao:
Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud. Secur. Commun. Networks 8(17): 3205-3218 (2015) - [j9]Xin Ma, Jing Guo, Ke Xiao, Xiao Sun:
PRBP: Prediction of RNA-Binding Proteins Using a Random Forest Algorithm Combined with an RNA-Binding Residue Predictor. IEEE ACM Trans. Comput. Biol. Bioinform. 12(6): 1385-1393 (2015) - 2014
- [j8]Chunming Gao, Changhui Li, Guanghua Tan, Songrui Guo, Ke Xiao:
Adaptive Segmentation Approach for Human Action Data. Int. J. Pattern Recognit. Artif. Intell. 28(8) (2014) - [j7]Ke Xiao, Haiying Jiang, Yuanyao Lu:
A Physical Layer Scheme in Two-Way Relay Networks with Soft Network Coding. J. Networks 9(7): 1861-1867 (2014) - [j6]Liang Wu, Congying Wan, Ke Xiao, Supin Wang, Mingxi Wan:
Evaluation of a method for vowel-specific voice source control of an electrolarynx using visual information. Speech Commun. 57: 39-49 (2014) - [c5]Lanlan Rui, Yinglin Xiong, Ke Xiao, Xuesong Qiu:
BP neural network-based web service selection algorithm in the smart distribution grid. APNOMS 2014: 1-4 - 2013
- [c4]Deyuan Wang, Ying Wang, Jichun Liu, Ke Xiao, Wenjing Li, Xuesong Qiu:
Pricing reserved and On-Demand Schemes of cloud computing based on option pricing model. APNOMS 2013: 1-3 - [c3]Ke Xiao, Guandong Gao, Jian Li:
An Improved Method of Detecting Pork Freshness Based on CRR Features. IIH-MSP 2013: 194-197 - 2012
- [j5]Manya Magnus, Jane Herwehe, DeAnn Gruber, Wayne Wilbright, Elizabeth Shepard, Amir Abrams, Joseph Foxhood, Luis Smith, Ke Xiao, Kathryn DeYoung, Michael Kaiser:
Improved HIV-related outcomes associated with implementation of a novel public health information exchange. Int. J. Medical Informatics 81(10): e30-e38 (2012) - [j4]Jane Herwehe, Wayne Wilbright, Amir Abrams, Susan Bergson, Joseph Foxhood, Michael Kaiser, Luis Smith, Ke Xiao, Amy Zapata, Manya Magnus:
Implementation of an innovative, integrated electronic medical record (EMR) and public health information exchange for HIV/AIDS. J. Am. Medical Informatics Assoc. 19(3): 448-452 (2012) - [c2]Hongbo Zhang, Qun Zhao, Hongyan Liu, Ke Xiao, Jun He, Xiaoyong Du, Hong Chen:
Predicting Retweet Behavior in Weibo Social Network. WISE 2012: 737-743 - 2011
- [j3]Jiaxu Wang, Xijin Hua, Ke Xiao, Juanjuan Zhu:
Two-dimensional study of lubrication mechanism of water-lubricated rubber alloy bearing. Int. J. Comput. Appl. Technol. 40(1/2): 98-106 (2011) - [j2]Jiang Sun, Bo Zhang, Haishi Wang, Xin Ming, Ke Xiao, Peng Ye, Liang Cao:
An Inductive Kickback Absorption Scheme Without Power Zener and Large Capacitor. IEEE Trans. Ind. Electron. 58(2): 709-716 (2011) - [c1]Jianbin Ma, Guifa Teng, Shuhui Chang, Xiaoru Zhang, Ke Xiao:
Social Network Analysis Based on Authorship Identification for Cybercrime Investigation. PAISI 2011: 27-35
2000 – 2009
- 2004
- [j1]Daniel Faller, Thomas Reinheckel, Daniel Wenzler, Sascha Hagemann, Ke Xiao, Josef Honerkamp, Christoph Peters, Thomas Dandekar, Jens Timmer:
An Open Source Protein Gel Documentation System for Proteome Analyses. J. Chem. Inf. Model. 44(1): 168-169 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint