default search action
Xinxin Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Qilong Huang, Jianzhu Wang, Yixiao Song, Wenkai Cui, Hailang Li, Shengchun Wang, Peng Dai, Xinxin Zhao, Qingyong Li:
Synthetic-to-realistic domain adaptation for cold-start of rail inspection systems. Comput. Aided Civ. Infrastructure Eng. 39(3): 424-437 (2024) - [j9]Fan Wang, Weixin Ma, Le Wang, Peng Dai, Junbo Liu, Ning Wang, Xinxin Zhao, Fadeng Wang, Hailang Li, Yue Fang, Shengchun Wang, Yanting Pei:
A semi-supervised video dehazing method based on CNNs. Signal Image Video Process. 18(8-9): 6391-6403 (2024) - 2023
- [j8]Shane Allcroft, Mohammed Metwaly, Zachery Berg, Isha Ghodgaonkar, Fischer Bordwell, Xinxin Zhao, Xinglei Liu, Jiahao Xu, Subhankar Chakraborty, Vishnu Banna, Akhil Chinnakotla, Abhinav Goel, Caleb Tung, Gore Kao, Wei Zakharov, David A. Shoham, George K. Thiruvathukal, Yung-Hsiang Lu:
Observing Human Mobility Internationally During COVID-19. Computer 56(3): 59-69 (2023) - [j7]Ning Wang, Hao Wang, Shengchun Wang, Xinxin Zhao, Fan Wang, Jinfei Hao:
Research on Calibration Method of Rail Profile Measurement System. J. Circuits Syst. Comput. 32(10): 2350173:1-2350173:17 (2023) - 2022
- [j6]Qi Chen, Bihan Tang, Jiaqi Song, Ying Jiang, Xinxin Zhao, Yiming Ruan, Fangjie Zhao, Guosheng Wu, Tao Chen, Jia He:
Dynamic Bayesian network for predicting physiological changes, organ dysfunctions and mortality risk in critical trauma patients. BMC Medical Informatics Decis. Mak. 22(1): 119 (2022) - [j5]Xuefeng Lei, Zhenhai Liu, Fei Tao, Weizhen Hou, Honglian Huang, Yanqing Xie, Xinxin Zhao, Hao Dong, Peng Zou, Maoxin Song, Zhengqiang Li, Jin Hong:
Geolocation Error Estimation Method for the Wide Swath Polarized Scanning Atmospheric Corrector Onboard HJ-2 A/B Satellites. IEEE Trans. Geosci. Remote. Sens. 60: 1-9 (2022) - [c28]Qibin Chen, Yijin Teng, Hui Zhang, Kai Jiang, Qiang Duan, Xue Li, Xinxin Zhao, Rui Li:
Post-Training Quantization for Longformer with Chunkwise Quantization Granularity and Optimized Percentile. ICCCS 2022: 27-31 - [c27]Jinggang Zhang, Xinxin Zhao, Nasser L. Azad:
LSTM-based adaptive energy management of connected hybrid mining trucks for improving fuel efficiency. ITSC 2022: 2848-2855 - [c26]Xinxin Zhao, Zhuang Miao, Yufei Wang, Jiabao Wang, Yang Li:
Large Kernel Attention Hashing for Efficient Image Retrieval. WCSP 2022: 77-82 - 2021
- [c25]Zihao Ye, Qize Wu, Xinxin Zhao, Jiajun Zhang, Wei Yu, Chao Fan:
Abnormal Driving Detection Based on Human Pose Estimation and Facial Key Points Detection. ICIC (2) 2021: 91-102 - 2020
- [i1]Isha Ghodgaonkar, Subhankar Chakraborty, Vishnu Banna, Shane Allcroft, Mohammed Metwaly, Fischer Bordwell, Kohsuke Kimura, Xinxin Zhao, Abhinav Goel, Caleb Tung, Akhil Chinnakotla, Minghao Xue, Yung-Hsiang Lu, Mark Daniel Ward, Wei Zakharov, David S. Ebert, David M. Barbarash, George K. Thiruvathukal:
Analyzing Worldwide Social Distancing through Large-Scale Computer Vision. CoRR abs/2008.12363 (2020)
2010 – 2019
- 2019
- [j4]Gaiying Li, Guoqiang Zhai, Xinxin Zhao, Hedi An, Pascal Spincemaille, Kelly M. Gillen, Yixuan Ku, Yi Wang, Dongya Huang, Jianqi Li:
3D texture analyses within the substantia nigra of Parkinson's disease patients on quantitative susceptibility maps and R2∗ maps. NeuroImage 188: 465-472 (2019) - 2018
- [j3]Xinxin Zhao, Lingjun Li, Guoliang Xue, Gail-Joon Ahn:
Efficient Anonymous Message Submission. IEEE Trans. Dependable Secur. Comput. 15(2): 217-230 (2018) - 2016
- [j2]Lingjun Li, Xinxin Zhao, Guoliang Xue:
A Proximity Authentication System for Smartphones. IEEE Trans. Dependable Secur. Comput. 13(6): 605-616 (2016) - 2015
- [c24]Lingjun Li, Guoliang Xue, Xinxin Zhao:
The Power of Whispering: Near Field Assertions via Acoustic Communications. AsiaCCS 2015: 627-632 - [c23]Xue Qiu, Chunsheng Li, Jingwen Li, Xinxin Zhao, Yan Wang:
A CZT-based continuous varying PRF polar format algorithm for highly squinted spotlight SAR. IGARSS 2015: 4494-4497 - 2014
- [c22]Xinxin Zhao, Huiji Gao, Lingjun Li, Huan Liu, Guoliang Xue:
An efficient privacy preserving location based service system. GLOBECOM 2014: 576-581 - [c21]Xinxin Zhao, Lingjun Li, Guoliang Xue:
RemindU: A secure and efficient location based reminder system. ICC 2014: 1005-1010 - 2013
- [c20]Xinxin Zhao, Lingjun Li, Guoliang Xue:
Secure cloud-assisted location based reminder. AsiaCCS 2013: 323-328 - [c19]Lingjun Li, Xinxin Zhao, Guoliang Xue:
A lightweight system to authenticate smartphones in the near field without NFC chips. ICC 2013: 6391-6395 - [c18]Lingjun Li, Xinxin Zhao, Guoliang Xue:
Near field authentication for smart devices. INFOCOM 2013: 375-379 - [c17]Xinxin Zhao, Lingjun Li, Guoliang Xue:
Checking in without worries: Location privacy in location based social networks. INFOCOM 2013: 3003-3011 - [c16]Lingjun Li, Xinxin Zhao, Guoliang Xue:
Unobservable Re-authentication for Smartphones. NDSS 2013 - 2012
- [c15]Lingjun Li, Xinxin Zhao, Guoliang Xue:
An identity authentication protocol in online social networks. AsiaCCS 2012: 28-29 - [c14]Xinxin Zhao, Lingjun Li, Guoliang Xue:
Keeping identity secret in online social networks. AsiaCCS 2012: 55-56 - [c13]Heather T. Ma, James F. Griffith, Xinxin Zhao, Haiyan Lv, David Ka Wai Yeung, Ping Chung Leung:
Relationship between marrow perfusion and bone mineral density: A pharmacokinetic study of DCE-MRI. EMBC 2012: 377-379 - [c12]Lingjun Li, Xinxin Zhao, Guoliang Xue:
Searching in the dark: A framework for authenticating unknown users in online social networks. GLOBECOM 2012: 714-719 - [c11]Lingjun Li, Xinxin Zhao, Guoliang Xue, Gabriel Silva:
Privacy Preserving Group Ranking. ICDCS 2012: 214-223 - [c10]Xinxin Zhao, Lingjun Li, Guoliang Xue, Gabriel Silva:
Efficient anonymous message submission. INFOCOM 2012: 2228-2236 - 2011
- [j1]Xinxin Zhao, Lingjun Li, Guoliang Xue:
Authenticating strangers in Online Social Networks. Int. J. Secur. Networks 6(4): 237-248 (2011) - [c9]Wanzeng Kong, Xinwei Guo, Xinxin Zhao, Daming Wei, Sanqing Hu, Guojun Dai, Giovanni Vecchiato, Fabio Babiloni:
Spectral analysis of brain function network for the classification of motor imagery tasks. BMEI 2011: 850-853 - [c8]Xinxin Zhao, Lingjun Li, Guoliang Xue:
Authenticating Strangers in Fast Mixing Online Social Networks. GLOBECOM 2011: 1-5 - 2010
- [c7]Zhiqiang Bai, Peizhi Liu, Jinhua Wang, Xiongwen Hu, Xinxin Zhao:
Control system design of a small-scale unmanned helicopter. ICCA 2010: 1414-1417
2000 – 2009
- 2009
- [c6]Xinxin Zhao, Xiaofeng Wang:
Maritime information engine. GrC 2009: 795-798 - [c5]Xinxin Zhao, Liusheng Huang, Lingjun Li, Wei Yang, Zhili Chen, Zhenshan Yu:
Steganalysis on Character Substitution Using Support Vector Machine. WKDD 2009: 84-88 - 2008
- [c4]Zhenshan Yu, Liusheng Huang, Zhili Chen, Lingjun Li, Xinxin Zhao, Youwen Zhu:
Detection of Synonym-Substitution Modified Articles Using Context Information. FGCN (1) 2008: 134-139 - [c3]Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, Xinxin Zhao:
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Information Hiding 2008: 224-235 - [c2]Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang, Zhili Chen:
A Statistical Attack on a Kind of Word-Shift Text-Steganography. IIH-MSP 2008: 1503-1507 - [c1]Lingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen:
Detection of word shift steganography in PDF document. SecureComm 2008: 15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 20:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint