default search action
Xiaotong Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Jing Zhou, Bin Hu, Wei Feng, Zhang Zhang, Xiaotong Fu, Handie Shao, Hansheng Wang, Longyu Jin, Siyuan Ai, Ying Ji:
An ensemble deep learning model for risk stratification of invasive lung adenocarcinoma using thin-slice CT. npj Digit. Medicine 6 (2023) - [c11]Xiaotong Fu, Xiangyu Meng, Jing Zhou, Ying Ji:
High-risk Factor Prediction in Lung Cancer Using Thin CT Scans: An Attention-Enhanced Graph Convolutional Network Approach. BIBM 2023: 1905-1910 - [i3]Jing Zhou, Xiaotong Fu, Xirong Li, Wei Feng, Zhang Zhang, Ying Ji:
Adaptive Fusion of Radiomics and Deep Features for Lung Adenocarcinoma Subtype Recognition. CoRR abs/2308.13997 (2023) - [i2]Xiaotong Fu, Xiangyu Meng, Jing Zhou, Ying Ji:
High-risk Factor Prediction in Lung Cancer Using Thin CT Scans: An Attention-Enhanced Graph Convolutional Network Approach. CoRR abs/2308.14000 (2023) - 2022
- [j8]Md. Nazibul Islam, Steven M. Doria, Xiaotong Fu, Zachary R. Gagnon:
Piezoresistive Conductive Microfluidic Membranes for Low-Cost On-Chip Pressure and Flow Sensing. Sensors 22(4): 1489 (2022) - 2020
- [c10]Hantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, Yuqing Zhang:
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning. INFOCOM Workshops 2020: 722-727
2010 – 2019
- 2019
- [j7]Mengping Yin, Shichong Tan, Ning Zhang, Xiaotong Fu, Suchun Yuan:
A new approximate image verification mechanism in cloud computing. Int. J. Embed. Syst. 11(6): 687-697 (2019) - [j6]Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang, Xiaotong Fu, Xiaoling Tao:
A new revocable reputation evaluation system based on blockchain. Int. J. High Perform. Comput. Netw. 14(3): 385-396 (2019) - [c9]Lipeng Zhu, Xiaotong Fu, Yao Yao, Yuqing Zhang, He Wang:
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware. TrustCom/BigDataSE 2019: 248-255 - 2018
- [j5]Lanjun Dang, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, Xiaotong Fu:
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int. J. Distributed Sens. Networks 14(4) (2018) - [j4]Wenhao Guan, Yunling Wang, Jianfeng Wang, Xiaotong Fu:
Verifiable memory leakage-resilient dynamic searchable encryption. J. High Speed Networks 24(3): 201-217 (2018) - 2017
- [c8]Zhelin Li, Songbin Ye, Lijun Jiang, Yaqi Wang, Deli Zhu, Xiaotong Fu:
Visibility Analysis on Swing Motion of the Golf Player Based on Kinect. HCI (16) 2017: 115-126 - 2013
- [j3]Xiaotong Fu, Wen Liu, Ruijun Shi:
Designated verifier ring signature and ring signcryption. Int. J. Intell. Inf. Database Syst. 7(5): 414-421 (2013) - [c7]Xiaotong Fu, Xiaowei Li, Wen Liu:
IDPKC-to-TPKC Construction of Multi-receiver Signcryption. INCoS 2013: 335-339 - [c6]Ning Zhang, Xiaotong Fu:
Ternary Method in Elliptic Curve Scalar Multiplication. INCoS 2013: 490-494 - [c5]Xiaotong Fu, Shufang Guo, Ruijun Shi:
An Efficient Tripartite Identity-Based Authenticated Key Agreement Protocol. INCoS 2013: 847-851 - 2012
- [c4]Xiaotong Fu, Yandong Guo:
A Lightweight RFID Mutual Authentication Protocol with Ownership Transfer. CWSN 2012: 68-74 - [c3]Xiaotong Fu, Ruijun Shi:
Cryptanalysis of an Efficient Three-Party Key Exchange Protocol. INCoS 2012: 297-302 - [c2]Xiaotong Fu, Wen Liu:
Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption. INCoS 2012: 668-670 - 2011
- [c1]Chan Wang, Xiaotong Fu:
Forgery Attacks on Two Pairing-Based Proxy Signature Schemes. iThings/CPSCom 2011: 473-478
2000 – 2009
- 2007
- [j2]Shengqiang Li, Zhixiong Chen, Xiaotong Fu, Guozhen Xiao:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length pq. J. Comput. Sci. Technol. 22(6): 830-834 (2007) - 2005
- [j1]Enjian Bai, Xiaotong Fu, Guozhen Xiao:
On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 392-395 (2005) - 2004
- [i1]Xiaotong Fu, Chunxiang Xu, Guozhen Xiao:
Forgery Attacks on Chang et al.'s signature scheme with message recovery. IACR Cryptol. ePrint Arch. 2004: 236 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint