default search action
Xueli Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j44]Shanshan Luo, Jiaqi Min, Wei Li, Xueli Wang, Zhi Geng:
A comparative analysis of different adjustment sets using propensity score based estimators. Comput. Stat. Data Anal. 203: 108079 (2025) - 2024
- [j43]Xueli Wang, Bo Hu:
Machine Learning Algorithms for Improved Product Design User Experience. IEEE Access 12: 112810-112821 (2024) - [j42]Xueli Wang, Shangwei Zhao, Ming Yang, Xin Wang, Xiaoming Wu:
Neural Network-Based State Estimation for Nonlinear Systems with Denial-of-Service Attack Under Try-Once-Discard Protocol. IEEE CAA J. Autom. Sinica 11(10): 2182-2184 (2024) - [j41]Xueli Wang, Suxia Zhang:
Coupling media coverage and susceptibility for modeling epidemic dynamics: An application to COVID-19. Math. Comput. Simul. 217: 374-394 (2024) - [j40]Bin Wu, Dong Xie, Fulong Chen, Huijun Zhu, Xueli Wang, Yangyang Zeng:
Compressed sensing based visually secure multi-secret image encryption-sharing scheme. Multim. Tools Appl. 83(7): 18919-18941 (2024) - [j39]Xueli Wang, Fengbo Li, Yuanzhe Li, Dailing Hou, Lei Wang, Xionghe Qin:
Does inter-regional investment by publicly listed companies promote local technological catch-up? A study of the mediation effects of patents in China. Technol. Anal. Strateg. Manag. 36(2): 279-292 (2024) - [j38]Xueli Wang, Derui Ding, Xiaohua Ge, Qing-Long Han:
Supplementary Control for Quantized Discrete-Time Nonlinear Systems Under Goal Representation Heuristic Dynamic Programming. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3202-3214 (2024) - 2023
- [j37]Xueli Wang, Shangwei Zhao, Xin Wang, Ming Yang, Xiaoming Wu:
Data-driven control for dynamic quantized nonlinear systems with state constraints based on barrier functions. Inf. Sci. 646: 119132 (2023) - [j36]Fei Fan, Keke Zhang, Shangze Dai, Xueli Wang:
Decoupling analysis and rebound effect between China's urban innovation capability and resource consumption. Technol. Anal. Strateg. Manag. 35(4): 478-492 (2023) - [j35]Xueli Wang, Derui Ding, Hongli Dong, Xiao-jian Yi:
PI-Based Security Control Against Joint Sensor and Controller Attacks and Applications in Load Frequency Control. IEEE Trans. Syst. Man Cybern. Syst. 53(2): 970-980 (2023) - [c19]Xueli Wang, Shangwei Zhao, Ming Yang, Xiaoming Wu, Xin Wang, Shuo Xu, Xu Hu:
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time Systems. IECON 2023: 1-6 - [i9]Junhao Chen, Xueli Wang:
Data-driven multinomial random forest. CoRR abs/2304.04240 (2023) - 2022
- [j34]Bin Wu, Dong Xie, Fulong Chen, Xueli Wang, Yangyang Zeng:
A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing. Digit. Signal Process. 123: 103391 (2022) - [j33]Xueli Wang, Dong Xie, Fulong Chen, Huijun Zhu, Taochun Wang:
PHISS: Progressive and hierarchical image segmentation-sharing scheme. Digit. Signal Process. 129: 103640 (2022) - [j32]Peng Qin, Yulin Cai, Xueli Wang:
Small Waterbody Extraction With Improved U-Net Using Zhuhai-1 Hyperspectral Remote Sensing Images. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j31]Xueli Wang, Dong Xie, Fulong Chen, Bin Wu, Yangyang Zeng:
Progressive and multi-level secret image sharing scheme with hierarchical shadows. Multim. Tools Appl. 81(21): 31039-31059 (2022) - [j30]Wenyi Yang, Fei Fan, Xueli Wang, Haichao Yu:
Knowledge innovation network externalities in the Guangdong-Hong Kong-Macao Greater Bay Area: borrowing size or agglomeration shadow? Technol. Anal. Strateg. Manag. 34(9): 1020-1037 (2022) - [j29]Xueli Wang, Derui Ding, Xiaohua Ge, Hongli Dong:
Neural-Network-Based Control With Dynamic Event-Triggered Mechanisms Under DoS Attacks and Applications in Load Frequency Control. IEEE Trans. Circuits Syst. I Regul. Pap. 69(12): 5312-5324 (2022) - [c18]Xueli Wang:
Zigbee Wireless Communication Technology and Its Application. ICCSIE 2022: 149-153 - [c17]Lei Li, Xueli Wang, Juan Yang:
The Classification of Chinese Personal Income Level Based on Bayesian Network. ICoMS 2022: 105-109 - 2021
- [j28]Xueli Wang, Derui Ding, Hongli Dong, Xian-Ming Zhang:
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol. IEEE CAA J. Autom. Sinica 8(4): 766-778 (2021) - [j27]Xueli Wang:
Low-Energy Secure Routing Protocol for WSNs Based on Multiobjective Ant Colony Optimization Algorithm. J. Sensors 2021: 1-9 (2021) - [j26]Kaiqing Huang, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. Secur. Commun. Networks 2021: 8872699:1-8872699:22 (2021) - [j25]Song Wang, Xueli Wang, Fei Lu, Fei Fan:
The impact of collaborative innovation on ecological efficiency - empirical research based on China's regions. Technol. Anal. Strateg. Manag. 33(2): 242-256 (2021) - [j24]Xueli Wang, Lei Wang, Song Wang, Fei Fan, Xiaohua Ye:
Marketisation as a channel of international technology diffusion and green total factor productivity: research on the spillover effect from China's first-tier cities. Technol. Anal. Strateg. Manag. 33(5): 491-504 (2021) - [c16]Rui Wang, Xueli Wang, Yunfang Chen, Wei Zhang:
Design Guidance for Lightweight Object Detection Models. ICBDS 2021: 203-217 - 2020
- [j23]Xueli Wang, Guoyong Yuan, Jun Liu, Guangrui Wang:
Control of spiral drift by using feedback signals from a circular measuring domain in oscillatory media. Appl. Math. Comput. 368 (2020) - [j22]Xueli Wang, Yufeng Zhang, Hongxin Zhang, Yixuan Li, Xiaofeng Wei:
Radio Frequency Signal Identification Using Transfer Learning Based on LSTM. Circuits Syst. Signal Process. 39(11): 5514-5528 (2020) - [j21]Binbin Tu, Yu Chen, Xueli Wang:
Threshold trapdoor functions and their applications. IET Inf. Secur. 14(2): 220-231 (2020) - [j20]Jinhua Song, Derui Ding, Hongjian Liu, Xueli Wang:
Non-fragile distributed state estimation over sensor networks subject to DoS attacks: the almost sure stability. Int. J. Syst. Sci. 51(6): 1119-1132 (2020) - [c15]Wei Chen, Xueli Wang, Jingyang Mao, Derui Ding:
Distributed State Estimation for State-Saturated Power Systems under Denial-of-Service Attacks. ICARCV 2020: 824-829 - [c14]Yufeng Zhang, Yingxue Wang, Xueli Wang, Bochao Zou, Haiyong Xie:
Text-based Decision Fusion Model for Detecting Depression. SSPS 2020: 101-106
2010 – 2019
- 2019
- [j19]Xueli Wang, Yufeng Zhang, Hongxin Zhang, Xiaofeng Wei, Guangyuan Wang:
Identification and authentication for wireless transmission security based on RF-DNA fingerprint. EURASIP J. Wirel. Commun. Netw. 2019: 230 (2019) - [j18]Dun Ao, Xueli Wang:
Consensus for time-delay multi-agent systems with H∞ performance in finite frequency domains. Int. J. Syst. Sci. 50(13): 2449-2458 (2019) - [c13]Fei Lei, Zhanghong An, Xueli Wang:
Pose Estimation of Complex Human Motion. ICVIP 2019: 153-156 - [c12]Fei Lei, Junyou Yan, Xueli Wang:
Human Pose Estimation of Diver Based on Improved Stacked Hourglass Model. ICVIP 2019: 178-182 - [c11]Xueli Wang, Yu Chen, Xuecheng Ma:
Adding Linkability to Ring Signatures with One-Time Signatures. ISC 2019: 445-464 - [i8]Xueli Wang, Yu Chen, Xuecheng Ma:
Generic Construction of Linkable Ring Signature. IACR Cryptol. ePrint Arch. 2019: 371 (2019) - 2018
- [j17]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold decryption scheme from bilinear pairings. Frontiers Comput. Sci. 12(1): 177-189 (2018) - [c10]Moqin Zhou, Xueli Wang, Xing Zhang, Wenbo Wang:
Spatial-Temporal Analysis of Traffic Load Based on User Activity Characteristics in Mobile Cellular Network. BIC-TA (1) 2018: 213-222 - [i7]Binbin Tu, Yu Chen, Xueli Wang:
Threshold and Revocation Encryptions via Threshold Trapdoor Function. CoRR abs/1804.03783 (2018) - 2017
- [j16]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Informatica 28(2): 215-235 (2017) - 2015
- [j15]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Comput. J. 58(10): 2747-2757 (2015) - [j14]Jianhua Yu, Xueli Wang, Wei Gao:
Improvement and applications of secure outsourcing of scientific computations. J. Ambient Intell. Humaniz. Comput. 6(6): 763-772 (2015) - [c9]Lin Ma, Xueli Wang, Xiaopeng He:
Diagnosis on Corporate Culture and Construction - A Case Study of Limin Chemical Co., Ltd. HCI (12) 2015: 339-348 - 2014
- [j13]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. Int. J. Internet Protoc. Technol. 8(2/3): 107-115 (2014) - 2013
- [j12]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures and Its Application to E-Prosecution. J. Comput. 8(4): 833-841 (2013) - [j11]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
Short Convertible Undeniable Signature From Pairing. J. Softw. 8(12): 2983-2990 (2013) - [c8]Jianhua Yu, Yue Luo, Xueli Wang:
Deceptive Detection and Security Reinforcement in Grid Computing. INCoS 2013: 146-152 - [c7]Jianhua Yu, Kun Wang, Pingzhi Yuan, Xueli Wang:
Blind Signature Scheme Based on Quartic Residues. INCoS 2013: 403-407 - 2012
- [j10]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption. J. Commun. 7(12): 909-920 (2012) - [j9]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings. J. Comput. 7(12): 2987-2996 (2012) - [c6]Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. IDCS 2012: 253-263 - [i6]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. IACR Cryptol. ePrint Arch. 2012: 73 (2012) - [i5]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012) - [i4]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. IACR Cryptol. ePrint Arch. 2012: 104 (2012) - [i3]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. IACR Cryptol. ePrint Arch. 2012: 105 (2012) - 2011
- [j8]Zhengbang Zha, Xueli Wang:
Almost Perfect Nonlinear Power Functions in Odd Characteristic. IEEE Trans. Inf. Theory 57(7): 4826-4832 (2011) - [c5]Beaumie Kim, Xueli Wang, Misong Kim:
Learners' Ideas about Plate Tectonics and Collaborative Game Play. CSCL 2011 - 2010
- [j7]Xueli Wang:
Conditions for uniformly non-confounding of causal distribution effects over multiple covariates. J. Syst. Sci. Complex. 23(4): 796-803 (2010) - [c4]Ye Tian, Wendong Wang, Xueli Wang, Jinghai Rao, Canfeng Chen, Jian Ma:
Topic detection and organization of mobile text messages. CIKM 2010: 1877-1880
2000 – 2009
- 2009
- [j6]Wei Gao, Fei Li, Xueli Wang:
Chameleon hash without key exposure based on Schnorr signature. Comput. Stand. Interfaces 31(2): 282-285 (2009) - [j5]Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang:
Perfect nonlinear binomials and their semifields. Finite Fields Their Appl. 15(2): 125-133 (2009) - [j4]Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang:
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings. Informatica 20(4): 461-476 (2009) - [j3]Xiang Qian, Cheng Peng, Xueli Wang, Datian Ye:
Self-organizing map-based multi-thresholding on neural stem cells images. Medical Biol. Eng. Comput. 47(7): 801-808 (2009) - 2008
- [c3]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. Pairing 2008: 316-331 - [i2]Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang:
A New Family of Perfect Nonlinear Binomials. IACR Cryptol. ePrint Arch. 2008: 196 (2008) - 2007
- [j2]Wei Gao, Xueli Wang, Dongqing Xie:
Chameleon Hashes Without Key Exposure Based on Factoring. J. Comput. Sci. Technol. 22(1): 109-113 (2007) - [c2]Jun-Wu Dong, Dingyi Pei, Xueli Wang:
A Key Predistribution Scheme Based on 3-Designs. Inscrypt 2007: 81-92 - [i1]Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. IACR Cryptol. ePrint Arch. 2007: 7 (2007) - 2006
- [c1]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures. WISA 2006: 1-14 - 2005
- [j1]Yuefei Zhu, Xueli Wang:
A criterion for primitive polynomials over Galois rings. Discret. Math. 303(1-3): 243-255 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint