


default search action
Xiang Cui
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Tiantian Ji
, Binxing Fang, Xiang Cui, Tian Wang, Yuntao Zhang
, Fan Gu, Chao Zheng:
Scrutinizing Code Signing: A Study of in-Depth Threat Modeling and Defense Mechanism. IEEE Internet Things J. 11(24): 40051-40069 (2024) - [j28]Haibo Yang, Xiang Cui, Yingchun Cai
, Zhengrong Wu, Shiqi Gao, Bo Yu, Yanling Wang, Ke Li, Zheng Duan, Qiuhua Liang
:
Coupling Downscaling and Calibrating Methods for Generating High-Quality Precipitation Data with Multisource Satellite Data in the Yellow River Basin. Remote. Sens. 16(8): 1318 (2024) - [j27]Xiang Cui, Ming Chen:
A novel learning framework for vocal music education: an exploration of convolutional neural networks and pluralistic learning approaches. Soft Comput. 28(4): 3533-3553 (2024) - [c76]Jianjun Zhao, Ru Tan, Yaqin Cao, Xutong Wang, Qixu Liu, Xiang Cui:
MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior Detection. CSCWD 2024: 1231-1237 - [c75]Jinli Zhang, Xutong Wang, Ningjun Zheng, Kezhen Huang, Yun Feng, Xiang Cui:
XShellGNN: Cross-file Web Shell Detection Based on Graph Neural Network. CSCWD 2024: 2607-2613 - 2023
- [j26]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Peng Liao, Shouyou Song:
Framework for understanding intention-unbreakable malware. Sci. China Inf. Sci. 66(4) (2023) - [j25]Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu:
Detecting compromised email accounts via login behavior characterization. Cybersecur. 6(1): 36 (2023) - [j24]Yan Shi
, Xiang Cui
, Lei Qi
, Xiangyu Zhang
, Xuebao Li, Hong Shen
:
A Novel Energy Harvesting Method for Online Monitoring Sensors in HVdc Overhead Line. IEEE Trans. Ind. Electron. 70(2): 2139-2143 (2023) - [j23]Wuyu Zhang
, Kun Tan
, Bing Ji
, Lei Qi
, Xiang Cui
, Xiangyu Zhang
, Luchun Du:
In Situ Diagnosis of Multichip IGBT Module Wire Bonding Faults Based on Collector Voltage Undershoot. IEEE Trans. Ind. Electron. 70(3): 3045-3054 (2023) - [j22]Hao Zhou
, Jialin Deng
, Wenxiong Hua, Xiang Cui, Xiang-Yang Li
, Panlong Yang
:
PROCS: Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System. IEEE Trans. Mob. Comput. 22(3): 1702-1716 (2023) - [j21]Wangqiu Zhou
, Hao Zhou
, Xiang Cui
, Fengyu Zhou
, Haisheng Tan
, Xiang-Yang Li
:
IMeP: Impedance Matching Enhanced Power-Delivered-to-Load Optimization for Magnetic MIMO Wireless Power Transfer System. ACM Trans. Sens. Networks 19(4): 73:1-73:25 (2023) - [c74]Wangqiu Zhou, Hao Zhou, Xiang Cui, Xinyu Wang, Xiaoyan Wang, Zhi Liu:
Roland: Robust In-band Parallel Communication for Magnetic MIMO Wireless Power Transfer System. INFOCOM 2023: 1-10 - [c73]Jinli Zhang, Feng Dai, Yaqin Cao, Ru Tan, Xiang Cui, Qixu Liu:
SWDNet: Stealth Web Shell Detection Technology based on Triplet Network. MSN 2023: 406-414 - [c72]Weiming Guo, Zhan Wang, Hao Zhou, Wangqiu Zhou, Xiang Cui, Jianhui Zhang:
DPDA: Distributed Probability-adaptive Direction Adjustment for Magnetic Wireless Power Transfer. SECON 2023: 142-150 - 2022
- [j20]Zhi Wang
, Chaoge Liu, Xiang Cui, Jie Yin, Xutong Wang:
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks. Comput. Secur. 120: 102807 (2022) - [c71]Xutong Wang
, Chaoge Liu
, Xiaohui Hu
, Zhi Wang
, Jie Yin, Xiang Cui:
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. ACSAC 2022: 267-278 - [c70]Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song:
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples. DSC 2022: 191-198 - [c69]Zhi Wang
, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu
, Di Wu, Qixu Liu:
DeepC2: AI-Powered Covert Command and Control on OSNs. ICICS 2022: 394-414 - [c68]Xiang Cui, Hao Zhou, Jialin Deng, Wangqiu Zhou, Xing Guo, Yu Gu:
Mag-E4E: Trade Efficiency for Energy in Magnetic MIMO Wireless Power Transfer System. INFOCOM 2022: 440-449 - [c67]Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. TrustCom 2022: 159-166 - [c66]Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu:
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. TrustCom 2022: 274-282 - [c65]Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu:
DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. TrustCom 2022: 307-314 - 2021
- [j19]Shi Fu
, Erping Deng
, Cheng Peng
, Guanrou Zhang
, Zhibin Zhao
, Xiang Cui
:
Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section. IEEE Trans. Instrum. Meas. 70: 1-10 (2021) - [j18]Shi Fu
, Guanrou Zhang
, Yongfan Zhan
, Cheng Peng
, Zhibin Zhao
, Xuebao Li
, Xiang Cui
:
Method of Segmented Turns Arrangement of PCB Rogowski Coil With Anti-Interference Ability. IEEE Trans. Instrum. Meas. 70: 1-12 (2021) - [c64]Xiang Cui, Zhenghao Jia, Ping Xue, Qidan Xu, Shuang Li, Liankai Zhou:
Prediction and Analysis of Saturated Electricity Consumption Based on Logistic - BP Neural Network. ATCI (1) 2021: 322-327 - [c63]Xiaolun Liang, Hao Zhou, Wangqiu Zhou, Xiang Cui, Zhi Liu
, Xiang-Yang Li:
Onion: Dependency-Aware Reliable Communication Protocol for Magnetic MIMO WPT System. ICPADS 2021: 458-465 - [c62]Zhi Wang
, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. ISCC 2021: 1-7 - [c61]Wangqiu Zhou, Hao Zhou, Wenxiong Hua, Fengyu Zhou, Xiang Cui, Suhua Tang, Zhi Liu, Xiang-Yang Li:
IMP: Impedance Matching Enhanced Power-Delivered-to-Load Optimization for Magnetic MIMO Wireless Power Transfer System. IWQoS 2021: 1-10 - [c60]Tianchu Lyu, Andrew Eidson, Jungmi Jun, Xiajie Zhou, Xiang Cui, Chen Liang:
Data Veracity of Patients and Health Consumers Reported Adverse Drug Reactions on Twitter: Key Linguistic Features, Twitter Variables, and Association Rules. MedInfo 2021: 552-556 - [c59]Junnan Wang, Qixu Liu, Di Wu, Ying Dong, Xiang Cui:
Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL. RAID 2021: 193-204 - [i4]Zhi Wang, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. CoRR abs/2107.08590 (2021) - [i3]Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin:
EvilModel 2.0: Hiding Malware Inside of Neural Network Models. CoRR abs/2109.04344 (2021) - 2020
- [j17]Xiaoke Zhu
, Pengfei Ye, Xiao-Yuan Jing
, Xinyu Zhang
, Xiang Cui, Xiaopan Chen
, Fan Zhang
:
Heterogeneous Distance Learning Based on Kernel Analysis-Synthesis Dictionary for Semi-Supervised Image to Video Person Re-Identification. IEEE Access 8: 169663-169675 (2020) - [j16]Hongtao Li, Juncheng Bai, Xiang Cui, Yongwu Li, Shaolong Sun
:
A new secondary decomposition-ensemble approach with cuckoo search optimization for air cargo forecasting. Appl. Soft Comput. 90: 106161 (2020) - [j15]Xiang Cui, Xiaowen Li
, Yifeng Chen:
The transplantation technology of communication intensive applications on heterogeneous clusters. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j14]Zhonghao Dongye
, Lei Qi
, Kexin Liu, Xiaoguang Wei, Xiang Cui
:
Coupled Inductance Model of Full-Bridge Modules in Hybrid High Voltage Direct Current Circuit Breakers. IEEE Trans. Ind. Electron. 67(12): 10315-10324 (2020) - [c58]Xiajie Zhou, Tianchu Lyu, Jungmi Jun, Xiang Cui, Andrew Eidson, Chen Liang:
Exploratory Analysis of Data Veracity Problem for Consumer Reported Adverse Drug Reaction Events on Social Media. AMIA 2020 - [c57]Feiyu Han, Chengchen Wan, Panlong Yang, Hao Zhang, Yubo Yan, Xiang Cui:
ACE: Accurate and Automatic CSI Error Calibration for Wireless Localization System. BigCom 2020: 15-23 - [c56]Xiang Cui, Ji Zhang, Hao Zhou, Chang Deng:
PowerPool: Multi-source Ambient Energy harvesting. BigCom 2020: 86-90 - [c55]Fangjiao Zhang, Xiang Cui, Zhi Wang
, Shaomian Chen, Qixu Liu, Chaoge Liu:
A Systematic Study of AI Applications in Cybersecurity Competitions. BigDataSE 2020: 138-146 - [c54]Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang
:
CoinBot: A Covert Botnet in the Cryptocurrency Network. ICICS 2020: 107-125 - [c53]Hao Zhou, Wenxiong Hua, Jialin Deng, Xiang Cui, Xiang-Yang Li, Panlong Yang:
Joint Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System. INFOCOM 2020: 2283-2292 - [i2]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Jiawen Diao, Tian Wang, Weiqiang Yu:
First Step Towards Modeling Unbreakable Malware. CoRR abs/2008.06163 (2020) - [i1]Zhi Wang
, Chaoge Liu, Xiang Cui, Jialong Zhang, Di Wu, Jie Yin, Jiaxi Liu, Qixu Liu, Jinli Zhang:
AI-powered Covert Botnet Command and Control on OSNs. CoRR abs/2009.07707 (2020)
2010 – 2019
- 2019
- [j13]Wei Jiang, Xianda Wu, Xiang Cui, Chaoge Liu:
A Highly Efficient Remote Access Trojan Detection Method. Int. J. Digit. Crime Forensics 11(4): 1-13 (2019) - [j12]Juan Chen, Zhihong Tian
, Xiang Cui, Lihua Yin, Xianzhi Wang
:
Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 10(8): 3099-3107 (2019) - [j11]Xiaoke Zhu, Xiao-Yuan Jing
, Fan Zhang
, Xinyu Zhang
, Xinge You, Xiang Cui:
Distance learning by mining hard and easy negative samples for person re-identification. Pattern Recognit. 95: 211-222 (2019) - [j10]Weihai Chen, Zhongyi Li
, Xiang Cui, Jianbin Zhang, Shaoping Bai
:
Mechanical Design and Kinematic Modeling of a Cable-Driven Arm Exoskeleton Incorporating Inaccurate Human Limb Anthropomorphic Parameters. Sensors 19(20): 4461 (2019) - [c52]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c51]Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun:
Research on SQL Injection and Defense Technology. ICAIS (4) 2019: 191-201 - [c50]Wenxiong Hua, Xiang Cui, Hao Zhou, Panlong Yang, Xiang-Yang Li:
Parallel Feedback Communications for Magnetic MIMO Wireless Power Transfer System. SECON 2019: 1-9 - 2018
- [j9]Zhihong Tian
, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui:
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 6: 35355-35364 (2018) - [j8]Zihan Wang
, Chaoge Liu
, Jing Qiu
, Zhihong Tian
, Xiang Cui, Shen Su:
Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput. 2018: 7943586:1-7943586:13 (2018) - [c49]Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:
SLBot: A Serverless Botnet Based on Service Flux. DSC 2018: 181-188 - [c48]Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. DSC 2018: 197-204 - [c47]Xiaoyun Li, Xiang Cui, Limin Shi, Chaoge Liu, Xiaoxi Wang:
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model. DSC 2018: 213-218 - [c46]Chaoge Liu, Xiang Cui, Zhi Wang
, Xiaoxi Wang, Yun Feng, Xiaoyun Li:
MaliceScript: A Novel Browser-Based Intranet Threat. DSC 2018: 219-226 - [c45]Jingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang
, Qixu Liu:
A Novel Approach for Detecting Browser-Based Silent Miner. DSC 2018: 490-497 - [c44]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Ronglai Jia:
A Trusted Computing Base for Information System Classified Protection. ICCCS (1) 2018: 253-262 - [c43]Xiangsong Gao, Hui Lu, Xiang Cui, Le Wang:
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. ICCCS (1) 2018: 285-292 - [c42]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:
The Research on Security Audit for Information System Classified Protection. ICCCS (2) 2018: 300-308 - [c41]Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui:
Study on Advanced Botnet Based on Publicly Available Resources. ICICS 2018: 57-74 - [c40]Zhi Wang
, Jinli Zhang, Qixu Liu, Xiang Cui, Junwei Su:
Practical Metrics for Evaluating Anonymous Networks. SciSec 2018: 3-18 - [c39]Yun Feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang, Junwei Su:
A Systematic Method on PDF Privacy Leakage Issues. TrustCom/BigDataSE 2018: 1020-1029 - 2017
- [j7]Heng-Tian Wu
, Chong-Qing Jiao, Xiang Cui, Xiao-Fan Liu, Jian-Fei Ji:
Transient Electromagnetic Disturbance Induced on the Ports of Intelligent Component of Electronic Instrument Transformer Due to Switching Operations in 500 kV GIS Substations. IEEE Access 5: 5104-5112 (2017) - [c38]Jie Yin, Xiang Cui, Ke Li:
A Reputation-Based Resilient and Recoverable P2P Botnet. DSC 2017: 275-282 - 2016
- [c37]Zhilong Zou, Yong Ju, Xu Zhang, Xiang Cui, Tiebing Lu:
Measurement of ground-level charge density under a HVDC conductor with presence of fine particles. I2MTC 2016: 1-5 - [c36]Yifeng Chen, Kun Huang, Bei Wang, Guohui Li, Xiang Cui:
Samsara parallel: a non-BSP parallel-in-time model. PPoPP 2016: 49:1-49:2 - 2015
- [j6]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [c35]Xiang Cui, Xiaowen Li, Yifeng Chen:
Programming Heterogeneous Systems with Array Types. CCGRID 2015: 1067-1074 - [c34]Yang Liu, Xiang Cui, Tiebing Lu, Xuebao Li, Zhenguo Wang:
Quasi-peak response of EMI receiver to corona pulses. I2MTC 2015: 68-73 - [c33]Xuebao Li, Xiang Cui, Tiebing Lu, Donglai Wang, Zhenguo Wang, He Zhang:
A platform for multiple DC corona effects measurements and analysis. I2MTC 2015: 181-186 - [c32]Xin Jin
, Xiang Cui, Sunil Kumar Agrawal:
Design of a cable-driven active leg exoskeleton (C-ALEX) and gait training experiments with human subjects. ICRA 2015: 5578-5583 - [c31]Yifeng Chen, Xiang Cui, Hong Mei:
Tiles: a new language mechanism for heterogeneous parallelism. PPoPP 2015: 287-288 - 2014
- [c30]Ke Li, Chaoge Liu, Xiang Cui:
POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System. CCS 2014: 1454-1456 - [c29]Yu Liang, Zhiqiao Li, Xiang Cui:
POSTER: Study of Software Plugin-based Malware. CCS 2014: 1463-1465 - [c28]Lingfang Zeng
, Shijie Xu, Yang Wang, Xiang Cui, Tan Wee Kiat, David Bremner, Kenneth B. Kent
:
Monetary-and-QoS Aware Replica Placements in Cloud-Based Storage Systems. CloudCom 2014: 672-675 - [c27]Xiang Cui, Weihai Chen, Sunil K. Agrawal, Jianhua Wang:
A novel customized Cable-driven robot for 3-DOF wrist and forearm motion training. IROS 2014: 3579-3584 - [c26]Fangjiao Zhang, Lidong Zhai, Jincui Yang, Xiang Cui:
Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks. ITQM 2014: 711-720 - [c25]Xiang Cui, Xiaowen Li, Yifeng Chen:
Cross-Platform Parallel Programming in Parray: A Case Study. NPC 2014: 579-582 - 2013
- [j5]Xiang Cui, Guisheng Yin, Long Zhang, Yongjin Kang:
Method of Collaborative Filtering Based on Uncertain User Interests Cluster. J. Comput. 8(1): 186-193 (2013) - [c24]Xiang Cui, Weihai Chen, Guilin Yang, Yan Jin
:
Closed-loop control for a cable-driven parallel manipulator with joint angle feedback. AIM 2013: 625-630 - [c23]Dan Li, Chaoge Liu, Xu Cui, Xiang Cui:
Sniffing and propagating malwares through WPAD deception in LANs. CCS 2013: 1437-1440 - [c22]Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. SecureComm 2013: 53-68 - 2012
- [c21]Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu:
Advanced triple-channel botnets: model and implementation. CCS 2012: 1019-1021 - [c20]Changyou Zhang, Kun Huang, Xiang Cui, Yifeng Chen:
Power-aware Programming with GPU Accelerators. IPDPS Workshops 2012: 2443-2449 - [c19]Shuai Wang, Xiang Cui, Peng Liao, Dan Li:
S-URL Flux: A Novel C&C Protocol for Mobile Botnets. ISCTCS 2012: 412-419 - [c18]Yaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin, Yi Pang:
Network Security Situation Prediction Based on BP and RBF Neural Network. ISCTCS 2012: 659-665 - [c17]Yifeng Chen, Xiang Cui, Hong Mei:
PARRAY: a unifying array representation for heterogeneous parallelism. PPoPP 2012: 171-180 - [c16]Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). RAID 2012: 376-377 - [c15]Shuyuan Jin, Zhi Yang, Xiang Cui:
Automatic Covert Channel Detection in Asbestos System (Poster Abstract). RAID 2012: 380-381 - [c14]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [j4]Lidong Zhai, Li Guo, Xiang Cui, Shuhao Li:
Research on Real-time Publish/Subscribe System supported by Data-Integration. J. Softw. 6(6): 1133-1139 (2011) - [c13]Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu:
Poster: recoverable botnets: a hybrid C&C approach. CCS 2011: 833-836 - [c12]Changyou Zhang, Kun Huang, Xiang Cui, Yifeng Chen:
Programming-Level Power Measurement for GPU Clusters. GreenCom 2011: 182-187 - [c11]Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - [c10]Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui:
A recoverable hybrid C&C botnet. MALWARE 2011: 110-118 - [c9]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426 - 2010
- [c8]Xiang Cui, Yifeng Chen, Changyou Zhang, Hong Mei:
Auto-tuning Dense Matrix Multiplication for GPGPU with Cache. ICPADS 2010: 237-242 - [c7]Yifeng Chen, Xiang Cui, Hong Mei:
Large-scale FFT on GPU clusters. ICS 2010: 315-324
2000 – 2009
- 2009
- [c6]Xiang Cui, Yifeng Chen, Hong Mei:
Improving Performance of Matrix Multiplication and FFT on GPU. ICPADS 2009: 42-48 - [c5]Shuyuan Jin, Yong Wang, Xiang Cui, Xiao-chun Yun:
A review of classification methods for network vulnerability. SMC 2009: 1171-1175 - 2008
- [c4]Alex A. Aravind, Xiang Cui:
RMobiGen: a trace generation, visualization, and performance analysis tool for random mobility models. SpringSim 2008: 403-412 - 2007
- [c3]Bing Wu, Xiao-chun Yun, Xiang Cui:
Study on Worm Poisoning Technology. ITNG 2007: 65-70 - 2005
- [j3]Yu Jiang, Binxing Fang, Ming-Zeng Hu, Xiang Cui:
Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement. J. Comput. Sci. Technol. 20(5): 689-701 (2005) - [j2]Changsheng Li, Xiang Cui, Ichirou Yamaguchi, Masayuki Yokota, Toshihiko Yoshino:
Optical voltage sensor using a pulse-controlled electrooptic quarter waveplate. IEEE Trans. Instrum. Meas. 54(1): 273-277 (2005) - [c2]Jernej Polajnar, Tyler Neilson, Xiang Cui, Alex A. Aravind:
Simple and efficient protocols for guaranteed message delivery in wireless ad-hoc networks. WiMob (3) 2005: 93-100 - 2004
- [c1]Xiang Cui, Yong Sun, K. Alagarsamy:
Simple and Efficient Connectionless Semi-Compulsory Routing Protocols for Mobile Ad-Hoc Networks. International Conference on Wireless Networks 2004: 906-909 - 2001
- [j1]Changsheng Li, Xiang Cui, Toshihiko Yoshino:
Measurement of AC electric power based on dual transverse Pockels effect. IEEE Trans. Instrum. Meas. 50(5): 1375-1380 (2001)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint