default search action
Sheng Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yuquan Le, Sheng Xiao, Zheng Xiao, Kenli Li:
Topology-aware Multi-task Learning Framework for Civil Case Judgment Prediction. Expert Syst. Appl. 238(Part F): 122103 (2024) - 2023
- [j20]Sheng Xiao, Yong Chen, Jing He, Xi Yang:
Read-Write Dependency Aware Register Allocation. Comput. Syst. Sci. Eng. 46(3): 3527-3540 (2023) - [j19]Dan Tang, Dongshuo Zhang, Zheng Qin, Qiuwei Yang, Sheng Xiao:
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 213: 103597 (2023) - [j18]Linghua Duo, Junqi Wang, Fuqing Zhang, Yuanping Xia, Sheng Xiao, Bao-Jie He:
Assessing the Spatiotemporal Evolution and Drivers of Ecological Environment Quality Using an Enhanced Remote Sensing Ecological Index in Lanzhou City, China. Remote. Sens. 15(19): 4704 (2023) - [j17]Dan Tang, Siyuan Wang, Siqi Zhang, Zheng Qin, Wei Liang, Sheng Xiao:
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics. IEEE Trans. Cogn. Commun. Netw. 9(6): 1721-1733 (2023) - [j16]Dan Tang, Chenjun Gao, Xinmeng Li, Wei Liang, Sheng Xiao, Qiuwei Yang:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. IEEE Trans. Netw. Sci. Eng. 10(4): 1952-1963 (2023) - [j15]Dan Tang, Zhiqing Zheng, Xiaocai Wang, Sheng Xiao, Qiuwei Yang:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. IEEE Trans. Netw. Serv. Manag. 20(3): 3686-3698 (2023) - [c25]Yutao Dou, Yangtao Zheng, Dazheng Liu, Keqin Li, Sheng Xiao, Shaoliang Peng:
ParaMET: A Parallel Framework for Efficient Medical Data Extraction on Tianhe-NG Supercomputer. BIBM 2023: 488-493 - [i1]Yu Liang, Shiliang Zhang, Yaowei Wang, Sheng Xiao, Kenli Li, Xiaoyu Wang:
MixBCT: Towards Self-Adapting Backward-Compatible Training. CoRR abs/2308.06948 (2023) - 2022
- [j14]Sheng Xiao, Jing He, Xi Yang, Heng Zhou, Yujie Yuan:
Timing Error Aware Register Allocation in TS. Comput. Syst. Sci. Eng. 40(1): 273-286 (2022) - [c24]Yong Chen, Chao Xu, Jing Selena He, Sheng Xiao, Fanfan Shen:
DDG-Based Optimization Metrics for Defect Prediction. ICAIS (1) 2022: 3-16 - [c23]Sheng Xiao, Jing Selena He, Jingwen Yang, Xiaomeng Hong, Jinke Luo:
Energy Reduction Method by Compiler Optimization. ICAIS (1) 2022: 672-683 - 2021
- [j13]Jinwen Liang, Zheng Qin, Sheng Xiao, Lu Ou, Xiaodong Lin:
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services. IEEE Trans. Dependable Secur. Comput. 18(4): 1632-1644 (2021) - 2020
- [j12]Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distributed Comput. 135: 127-139 (2020) - [c22]Yinrong Tao, Sheng Xiao, Bin Hao, Qingquan Zhang, Ting Zhu, Zhuo Chen:
WiRE: Security Bootstrapping for Wireless Device-to-Device Communication. WCNC 2020: 1-7
2010 – 2019
- 2019
- [j11]Qingquan Zhang, Yao Yao, Ting Zhu, Ziqiao Zhou, Wei Xu, Ping Yi, Sheng Xiao:
Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware. ACM Trans. Sens. Networks 15(1): 2:1-2:26 (2019) - [c21]Qitao Xie, Dayuan Tan, Ting Zhu, Qingquan Zhang, Sheng Xiao, Junyu Wang, Beibei Li, Lei Sun, Ping Yi:
Chatbot Application on Cryptocurrency. CIFEr 2019: 1-8 - [c20]Huigui Rong, Shiyong Li, Sheng Xiao, Naizheng Bian, Hang Li:
Innovative Talent Cultivation Pattern of Software Engineering under Internet Plus. ICCSE 2019: 180-183 - [c19]Jihui Zeng, Beibei Zhan, Shao Zhang, Jiajun Bie, Sheng Xiao:
Keyword Analysis Visualization for Chinese Historical Texts. VINCI 2019: 14:1-14:4 - 2018
- [j10]Song Zhou, Sheng Xiao:
3D face recognition: a survey. Hum. centric Comput. Inf. Sci. 8: 35 (2018) - [j9]Lu Ou, Hui Yin, Zheng Qin, Sheng Xiao, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. Secur. Commun. Networks 2018: 4724815:1-4724815:11 (2018) - [c18]Haiyou Sun, Sheng Xiao:
DNA-X: Dynamic Network Authentication using SGX. ICCSP 2018: 110-115 - 2017
- [j8]Rui Li, Alex X. Liu, Sheng Xiao, Hongyue Xu, Bezawada Bruhadeshwar, Ann L. Wang:
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks. IEEE/ACM Trans. Netw. 25(4): 2334-2346 (2017) - [c17]Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. SecureComm 2017: 808-822 - 2016
- [j7]Wei Zhang, Yaping Lin, Sheng Xiao, Jie Wu, Siwang Zhou:
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing. IEEE Trans. Computers 65(5): 1566-1577 (2016) - [c16]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu:
Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. ICCCN 2016: 1-9 - 2015
- [j6]Ting Zhu, Qingquan Zhang, Sheng Xiao, Yu Gu, Ping Yi, Yanhua Li:
Big Data in Future Sensing. Int. J. Distributed Sens. Networks 11: 837159:1-837159:2 (2015) - [j5]Ting Zhu, Sheng Xiao, Qingquan Zhang, Yu Gu, Ping Yi, Yanhua Li:
Emergent Technologies in Big Data Sensing: A Survey. Int. J. Distributed Sens. Networks 11: 902982:1-902982:13 (2015) - [j4]Min Li, Sheng Xiao, Zhengjie Liu, Jun Zhang:
嘀咕网用户领域影响力研究 (Research on Field Influence of Digu Users). 计算机科学 42(9): 66-69 (2015) - [j3]Yupeng Hu, Shun Song, Sheng Xiao, Quan Xu, Nong Xiao, Zheng Qin:
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs. IEEE Trans. Circuits Syst. II Express Briefs 62-II(6): 578-582 (2015) - [j2]Shiwen Zhang, Qingquan Zhang, Sheng Xiao, Ting Zhu, Yu Gu, Yaping Lin:
Cooperative Data Reduction in Wireless Sensor Network. ACM Trans. Embed. Comput. Syst. 14(4): 84:1-84:26 (2015) - [c15]Qingquan Zhang, Wei Xu, Zhichuan Huang, Ziqiao Zhou, Ping Yi, Ting Zhu, Sheng Xiao:
Context-Centric Target Localization with Optimal Anchor Deployments. ICNP 2015: 396-405 - [c14]Qingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao:
Fingerprint-free tracking with dynamic enhanced field division. INFOCOM 2015: 2785-2793 - 2014
- [j1]Ting Liu, Yang Liu, Yashan Mao, Yao Sun, Xiaohong Guan, Weibo Gong, Sheng Xiao:
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication. IEEE Trans. Smart Grid 5(3): 1175-1182 (2014) - [c13]Wei Zhang, Sheng Xiao, Yaping Lin, Ting, Siwang Zhou:
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing. DSN 2014: 276-286 - [c12]Weigang Zhong, Zhichuan Huang, Ting Zhu, Yu Gu, Qingquan Zhang, Ping Yi, Dingde Jiang, Sheng Xiao:
iDES: Incentive-driven distributed energy sharing in sustainable microgrids. IGCC 2014: 1-10 - [c11]Ziqiao Zhou, Mengjun Xie, Ting Zhu, Wei Xu, Ping Yi, Zhichuan Huang, Qingquan Zhang, Sheng Xiao:
EEP2P: An energy-efficient and economy-efficient P2P network protocol. IGCC 2014: 1-6 - [c10]Sheng Xiao, Weibo Gong, Don Towsley, Qingquan Zhang, Ting Zhu:
Reliability analysis for cryptographic key management. ICC 2014: 999-1004 - [c9]Wei Zhang, Yaping Lin, Sheng Xiao, Qin Liu, Ting Zhou:
Secure distributed keyword search in multiple clouds. IWQoS 2014: 370-379 - 2013
- [c8]Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li:
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. SecureComm 2013: 19-34 - 2011
- [c7]Ting Zhu, Sheng Xiao, Yi Ping, Don Towsley, Weibo Gong:
A secure energy routing mechanism for sharing renewable energy in smart microgrid. SmartGridComm 2011: 143-148 - 2010
- [c6]Sheng Xiao, Weibo Gong, Donald F. Towsley:
Secure Wireless Communication with Dynamic Secrets. INFOCOM 2010: 1568-1576 - [c5]Sheng Xiao, Changfeng Xing, Zhangsong Shi:
A New Distributed Node Localization Scheme Using a Mobile Beacon. ISICA (1) 2010: 140-147 - [c4]Sheng Xiao, Weibo Gong:
Mobility Can Help: Protect User Identity with Dynamic Credential. Mobile Data Management 2010: 378-380
2000 – 2009
- 2008
- [c3]Sheng Xiao, Jinzhu Hu, Xishu Yang, Fengwen Wu:
An Algorithm for Collocation of Relation Word Based on P/T System. CSSE (1) 2008: 714-717 - [c2]Xiaolin Wang, Yan Cai, Sheng Xiao, Weibo Gong:
A Three-Stage Load-Balancing Switch. INFOCOM 2008: 1993-2001 - 2007
- [c1]Sheng Xiao, Hossein Pishro-Nik, Weibo Gong:
Dense Parity Check Based Secrecy Sharing in Wireless Communications. GLOBECOM 2007: 54-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint