default search action
Aixin Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Wei Zhang, Hongyin Yang, Hongyou Cao, Xiucheng Zhang, Aixin Zhang, Nanhao Wu, Zhangjun Liu:
Separation of Temperature-Induced Response for Bridge Long-Term Monitoring Data Using Local Outlier Correction and Savitzky-Golay Convolution Smoothing. Sensors 23(5): 2632 (2023) - 2022
- [j3]Zhiwei Ye, Wenhui Cai, Mingwei Wang, Aixin Zhang, Wen Zhou, Na Deng, Zimei Wei, Daxin Zhu:
Association Rule Mining Based on Hybrid Whale Optimization Algorithm. Int. J. Data Warehous. Min. 18(1): 1-22 (2022) - [c23]Jiahao Fan, Huabin Liu, Wenjie Yang, John See, Aixin Zhang, Weiyao Lin:
Speed up Object Detection on Gigapixel-level Images with Patch Arrangement. CVPR 2022: 4643-4653 - [c22]Kaiyuan Dong, Yuang Zhang, Aixin Zhang:
Interaction Guided Hand-Held Object Detection. ICME Workshops 2022: 1-6 - 2020
- [c21]Jun Ma, Shilin Wang, Aixin Zhang, Alan Wee-Chung Liew:
Feature Extraction For Visual Speaker Authentication Against Computer-Generated Video Attacks. ICIP 2020: 1326-1330
2010 – 2019
- 2019
- [c20]Can Jin, Zhiwei Ye, Lingyu Yan, Ye Cao, Aixin Zhang, Lie Ma, Xiang Hu, Jiwei Hu:
Image Segmentation Using Fuzzy C-means Optimized by Ant Lion Optimization. IDAACS 2019: 388-393 - [c19]Zhiwei Ye, Ye Cao, Aixin Zhang, Can Jin, Lie Ma, Xiang Hu, Jiwei Hu:
An Image Enhancement Optimization Method Based on Differential Evolution Algorithm and Cuckoo Search Through Serial Coupled Mode. IDAACS 2019: 916-920 - [c18]Zhiwei Ye, Aixin Zhang, Ye Cao, Lie Ma, Can Jin, Xiang Hu, Jiwei Hu:
An Image Thresholding Method Based on Differential Evolution Algorithm and Genetic Algorithm. IDAACS 2019: 921-926 - 2018
- [c17]Aixin Zhang, Shalin Huang, Xinghua Wu, Shilin Wang, Jianhua Li:
An Effective Verifiable Database Protocol in Severe Untrusted Environment. CSCloud/EdgeCom 2018: 5-11 - [c16]Weiwei Zhao, Li Qiang, Huanying Zou, Aixin Zhang, Jianhua Li:
Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage. CSCloud/EdgeCom 2018: 29-34 - 2017
- [j2]Yuchen Liu, Aixin Zhang, Shenghong Li, Junhua Tang, Jianhua Li:
A lightweight authentication scheme based on self-updating strategy for space information network. Int. J. Satell. Commun. Netw. 35(3): 231-248 (2017) - 2016
- [c15]Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu:
A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. Inscrypt 2016: 187-204 - [c14]Yuchen Liu, Aixin Zhang, Jianhua Li, Jun Wu:
An anonymous distributed key management system based on CL-PKC for space information network. ICC 2016: 1-7 - [c13]Weiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu:
Analysis and design of an authentication protocol for space information network. MILCOM 2016: 43-48 - 2015
- [c12]Shanghua Zhang, Aixin Zhang, Jun Wu, Longhua Guo, Jiahua Li, Bei Pei:
A Layered and Componentized Security Architecture for Linux Based Mobile Network Elements. FCST 2015: 330-334 - 2014
- [c11]Yong Zhao, Aixin Zhang, Songnian Lu:
The DWT Group Fingerprinting Scheme. DASC 2014: 81-84 - [c10]Yong Zhao, Aixin Zhang, Songnian Lu:
DCT fingerprint classifier based group fingerprint. ICAILP 2014: 292-295 - 2012
- [j1]Zhihua Huang, Songnian Lu, Aixin Zhang, Jie Gu:
Impact of Feedback on Trust in P2P Networks. J. Networks 7(8): 1182-1188 (2012) - [c9]Fang Wang, Aixin Zhang, Jianhua Li, Shenghong Li:
Perceptual Compressive Sensing Scheme Based on Human Vision System. ACIS-ICIS 2012: 351-355 - [c8]Aixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li:
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation. IWDW 2012: 495-506 - 2011
- [c7]Zhiyuan Zhang, Aixin Zhang, Jianhua Li, Shenghong Li:
An efficient angle-based shape matching approach towards object recognition. ICME 2011: 1-5 - [i1]Hao Peng, Songnian Lu, Dandan Zhao, Aixin Zhang, Jianhua Li:
An Anti-attack Model Based on Complex Network Theory in P2P networks. CoRR abs/1108.5530 (2011) - 2010
- [c6]Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao:
An Anonymity Scheme Based on Pseudonym in P2P Networks. e-Forensics 2010: 287-293 - [c5]Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang:
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting. IWDW 2010: 211-223
2000 – 2009
- 2009
- [c4]Aixin Zhang, Junhua Tang, Peng Wang:
Authentication Tests Based on Test Type Matrix. ICC 2009: 1-6 - [c3]Zhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang:
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. ICICS 2009: 283-292 - 2008
- [c2]Yang Yu, Aixin Zhang, Junhua Tang, Haopeng Chen:
A Dynamic Scheme For Authenticated Group Key Agreement Protocol. TeNe 2008: 245-250 - [c1]Liming Hao, Songnian Lu, Junhua Tang, Aixin Zhang:
A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties. GLOBECOM 2008: 2201-2205
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint