default search action
Chunxiao Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Libin Lan, Chunxiao Ye, Chao Liao, Chengliang Wang, Xin Feng:
De-redundancy in wireless capsule endoscopy video sequences using correspondence matching and motion analysis. Multim. Tools Appl. 83(7): 21171-21195 (2024) - [j9]Chaokun Chang, Eric Lo, Chunxiao Ye:
Biathlon: Harnessing Model Resilience for Accelerating ML Inference Pipelines. Proc. VLDB Endow. 17(10): 2631-2640 (2024) - [i1]Chaokun Chang, Eric Lo, Chunxiao Ye:
Biathlon: Harnessing Model Resilience for Accelerating ML Inference Pipelines. CoRR abs/2405.11191 (2024) - 2023
- [c21]Mengqing Yang, Chunxiao Ye, Yuanmu Liu, Yan Jin, Chunming Ye:
PointPuff: An Ed25519 Optimization Implementation. SEC 2023: 117-130 - 2022
- [c20]Yan Jin, Chunxiao Ye, Mengqing Yang, Chunming Ye:
One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain. CollaborateCom (1) 2022: 533-551 - [c19]Chung Chan, Assan Kozhin, Qihang Liang, Glenn Salter, Ruoqin Tang, Chunxiao Ye, Chao Zhao:
DIVE: Make Online Learning Diversified, Interactive, Versatile, and Engaging. TALE 2022: 482-489 - [c18]Yan Jin, Chunxiao Ye, Mengqing Yang, Chunming Ye:
Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain. WASA (1) 2022: 377-388 - 2021
- [j8]Libin Lan, Chunxiao Ye:
Recurrent generative adversarial networks for unsupervised WCE video summarization. Knowl. Based Syst. 222: 106971 (2021)
2010 – 2019
- 2019
- [j7]Libin Lan, Chunxiao Ye, Chengliang Wang, Shangbo Zhou:
Deep Convolutional Neural Networks for WCE Abnormality Detection: CNN Architecture, Region Proposal and Transfer Learning. IEEE Access 7: 30017-30032 (2019) - [c17]Jian Wang, Chunxiao Ye, Yangfei Ou:
Dynamic Data Access Control for Multi-Authority Cloud Storage. HPCC/SmartCity/DSS 2019: 599-608 - [c16]Jian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang:
Improving Security Data Access Control for Multi-Authority Cloud Storage. ISPA/BDCloud/SocialCom/SustainCom 2019: 608-613 - 2016
- [j6]Hong Xiang, Xiaofeng Xia, Haibo Hu, Sheng Wang, Jun Sang, Chunxiao Ye:
Approaches to access control policy comparison and the inter-domain role mapping problem. Inf. Technol. Control. 45(3): 278-288 (2016) - 2011
- [j5]Haibo Hu, Dan Yang, Li Fu, Hong Xiang, Chunlei Fu, Jun Sang, Chunxiao Ye, Ren Li:
Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies. IET Commun. 5(17): 2451-2460 (2011) - [j4]Chunxiao Ye, Haibo Hu, Hong Xiang:
Towards Secure Delegation with Chinese Wall Security Policy (CWSP). J. Networks 6(8): 1230-1237 (2011) - [c15]Haibo Hu, Dan Yang, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li:
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. WOSIS 2011: 103-112 - 2010
- [j3]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification. Frontiers Comput. Sci. China 4(4): 560-570 (2010) - [j2]Chunxiao Ye, Xiang Li:
An Auto-revocation Supported Delegation Model. J. Comput. 5(6): 861-869 (2010)
2000 – 2009
- 2009
- [c14]Changze Wu, Kaigui Wu, Ming Chen, Chunxiao Ye:
Dynamic Replica Selection Services Based on State Evaluation Strategy. ChinaGrid 2009: 116-119 - [c13]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Web Text Classifier. ISNN (2) 2009: 684-693 - 2008
- [c12]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Detection Classifier. ICIC (2) 2008: 526-533 - [c11]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6. NAS 2008: 137-143 - [c10]Chunxiao Ye, Zhongfu Wu, Jiang Zhong, Yong Feng:
Revocation in an Attribute-Based Delegation Model. NAS 2008: 171-172 - [c9]Jiang Zhong, Luosheng Wen, Yong Feng, Chunxiao Ye:
Intrusion Detection Based on Density Level Sets Estimation. NAS 2008: 173-174 - 2007
- [c8]Jiang Zhong, Yong Feng, Chunxiao Ye, Ling Ou, Zhiguo Li:
Artificial Immune Networks Based Radial Basic Function Neural Networks Construction Algorithm and Application. ICNC (1) 2007: 104-107 - [c7]Yong Feng, Jiang Zhong, Zhongyang Xiong, Chunxiao Ye, Kaigui Wu:
Network Anomaly Detection Based on DSOM and ACO Clustering. ISNN (2) 2007: 947-955 - 2006
- [j1]Chunxiao Ye, Zhongfu Wu, Yunqing Fu:
An Attribute-Based Delegation Model and Its Extension. J. Res. Pract. Inf. Technol. 38(1) (2006) - [c6]Yong Feng, Jiang Zhong, Chunxiao Ye, Zhongfu Wu:
Clustering based on Self-Organizing Ant Colony Networks with Application to Intrusion Detection. ISDA (2) 2006: 1077-1080 - [c5]Jiang Zhong, Zhiguo Li, Yong Feng, Chunxiao Ye:
Intrusion Detection Based on Adaptive RBF Neural Network. ISDA (2) 2006: 1081-1084 - [c4]Jiang Zhong, Chunxiao Ye, Yong Feng, Ying Zhou, Zhongfu Wu:
Neuron Selection for RBF Neural Network Classifier Based on Multiple Granularities Immune Network. ISNN (1) 2006: 866-872 - 2005
- [c3]Chunxiao Ye, Zhongfu Wu:
Using XML and XACML to Support Attribute Based Delegation. CIT 2005: 751-756 - [c2]Chunxiao Ye, Zhongfu Wu, Yunqing Fu:
An Attribute-Based-Delegation-Model and Its Extension. WOSIS 2005: 146-159 - 2004
- [c1]Chunxiao Ye, Yunqing Fu, Zhongfu Wu:
An attribute-based-delegation-model. InfoSecu 2004: 220-221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 02:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint