default search action
Xinyu Meng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Meng Zhao, Yajun Wang, Xinyu Meng, Huchang Liao:
A three-way decision method based on cumulative prospect theory for the hierarchical diagnosis and treatment system of chronic diseases. Appl. Soft Comput. 149(Part A): 110960 (2024) - [j14]Meng Zhao, Yajun Wang, Xinyu Meng, Xunjie Gou:
Selection strategy of uniform expert evaluation scale in group decision making. J. Oper. Res. Soc. 75(6): 1178-1192 (2024) - [c10]Jingwei Song, Xuru Li, Lifei Wei, Xinyu Meng, Le Yu:
SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks. DSPP (1) 2024: 141-159 - [c9]Guojian Pu, Lusheng Zhai, Xinyu Meng, Xinyi Zhong, Wenhao Wang:
Instability Analysis of Taylor Bubble in Horizontal Gas-Liquid Intermittent Flows by S-PLIF Method. I2MTC 2024: 1-6 - [c8]Xinyi Zhong, Lusheng Zhai, Wenhao Wang, Xinyu Meng:
Flow Structure and Velocity Distribution in Horizontal Gas-Liquid Intermittent Flow Detected by S-PLIF&PIV. I2MTC 2024: 1-6 - 2023
- [j13]Yajun Wang, Xinyu Meng, Chang Xu, Meng Zhao:
Research on electronic word-of-mouth for product and service quality improvement: bibliometric analysis and future directions. Int. J. Intell. Comput. Cybern. 16(1): 68-98 (2023) - [j12]Rongrong Ren, Hailong Wang, Xinyu Meng, Meng Zhao:
The two stage group decision making model for massive alternatives based on the difference scale of expert evaluation. J. Intell. Fuzzy Syst. 45(5): 8837-8858 (2023) - [j11]Rui Zhang, Wendie Han, Lei Zhang, Lulu Wang, Xinyu Meng:
Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks. Sensors 23(9): 4198 (2023) - [j10]Lei Zhang, Wendie Han, Rui Zhang, Lulu Wang, Xinyu Meng:
Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs. IEEE Trans. Inf. Forensics Secur. 18: 3706-3719 (2023) - [j9]Lusheng Zhai, Xinyu Meng, Zihan Meng, Hongxin Zhang, Ningde Jin:
Measurement and Prediction of Droplet Entrainment in Inclined Liquid-Liquid Flow by PLIF Method. IEEE Trans. Instrum. Meas. 72: 1-13 (2023) - [j8]Lusheng Zhai, Wenhao Wang, Zihan Meng, Xinyu Meng, Ningde Jin:
Measurements on Interfacial Characteristics and Droplet Entrainment in Horizontal Liquid-Liquid Flows: A Comparison of PLIF Versus WMS. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - [c7]Lusheng Zhai, Xinyi Zhong, Wenhao Wang, Xinyu Meng:
Vortex detection in flow pattern control of horizontal liquid-liquid flows by PLIF&PIV methods. I2MTC 2023: 1-6 - [c6]Qizhuan Shao, Yigong Xie, Yang Wu, Xinyu Meng, Wenxin Kou, Yuguo Chen:
Analysis of the Development Path of the Ancillary Service Market in the Sending and Receiving Provinces under the New Power System. ICITEE 2023: 47-52 - [c5]Qizhuan Shao, Yang Wu, Yigong Xie, Xinyu Meng, Jian Zhang, Wenxin Kou, Yuguo Chen:
Study on The Development Path of Frequency Safety-Related Market Based on Inertia Scarcity under Large-Scale New Energy Sources. ICITEE 2023: 701-706 - [c4]Yang Wu, Xu Zhao, Yigong Xie, Jian Zhang, Xinyu Meng, Wenxin Kou, Yuguo Chen:
Evaluation of Inertia Levels in Provincial Power Grids with High Proportions of Renewable Energy. ICITEE 2023: 731-738 - 2022
- [j7]Min Fan, Jialu Xia, Xinyu Meng, Ke Zhang:
Single-Phase Grounding Fault Types Identification Based on Multi-Feature Transformation and Fusion. Sensors 22(9): 3521 (2022) - [j6]Xinyu Meng, Lei Zhang, Burong Kang:
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing. IEEE Trans. Cloud Comput. 10(3): 1819-1830 (2022) - [c3]Lusheng Zhai, Xinyu Meng, Zihan Meng, Hongxin Zhang, Ningde Jin:
Measurement of interfacial characteristics and droplet entrainment in nearly horizontal liquid-liquid flows using PLIF method. I2MTC 2022: 1-6 - [c2]Lusheng Zhai, Wenhao Wang, Xinyu Meng, Ningde Jin:
Detection of interfacial shear stress and droplet detachment using PLIF&PIV methods in horizontal liquid-liquid flows. I2MTC 2022: 1-6 - [c1]Burong Kang, Lei Zhang, Yafang Yang, Xinyu Meng:
CRFs for Digital Signature and NIZK Proof System in Web Services. ICA3PP 2022: 192-213 - 2021
- [j5]Tong Chen, Lei Zhang, Kim-Kwang Raymond Choo, Rui Zhang, Xinyu Meng:
Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems. IEEE Internet Things J. 8(13): 10766-10778 (2021) - 2020
- [j4]Zhigang Huang, Lei Zhang, Xinyu Meng, Kim-Kwang Raymond Choo:
Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home. IEEE Internet Things J. 7(2): 1039-1047 (2020) - [j3]Lei Zhang, Xinyu Meng, Kim-Kwang Raymond Choo, Yuanfei Zhang, Feifei Dai:
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. IEEE Trans. Dependable Secur. Comput. 17(3): 634-647 (2020)
2010 – 2019
- 2019
- [j2]Burong Kang, Xinyu Meng, Lei Zhang, Yinxia Sun:
Nonce-Based Key Agreement Protocol Against Bad Randomness. Int. J. Found. Comput. Sci. 30(4): 619-633 (2019) - 2018
- [j1]Jian Liu, Jiangtao Li, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen:
Secure intelligent traffic light control using fog computing. Future Gener. Comput. Syst. 78: 817-824 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint