default search action
Xi Sun
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Xi Sun, Alessandro Beghi, Gian Antonio Susto, Zhimin Lv:
Deep learning-based quality prediction for multi-stage sequential hot rolling processes in heavy rail manufacturing. Comput. Ind. Eng. 196: 110466 (2024) - [j31]Tingting Zhou, Xuedong Gao, Xi Sun, Lei Han:
Split Difference Weighting: An Enhanced Decision Tree Approach for Imbalanced Classification. Int. J. Comput. Commun. Control 19(6) (2024) - [j30]Hongyan Liu, Xi Sun, Xiang Chen, Qun Huang, Dong Zhang, Haifeng Zhou, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
Terra: Low-latency and reliable event collection in network measurement. J. Netw. Comput. Appl. 228: 103904 (2024) - [j29]Xiang Chen, Wenbin Zhang, Xi Sun, Hongyan Liu, Jianshan Zhang, Qun Huang, Dong Zhang, Haifeng Zhou, Xuan Liu, Chunming Wu:
Resource-Efficient and Timely Packet Header Vector (PHV) Encoding on Programmable Switches. IEEE/ACM Trans. Netw. 32(5): 4191-4206 (2024) - [c26]Xiang Chen, Xi Sun, Wenbin Zhang, Xin Yao, Zizheng Wang, Hongyan Liu, Qun Huang, Gaoning Pan, Xuan Liu, Haifeng Zhou, Chunming Wu:
Accelerating Sketch-based End-Host Traffic Measurement with Automatic DPU Offloading. INFOCOM 2024: 171-180 - [i4]Hongsheng Wang, Xiang Cai, Xi Sun, Jinhong Yue, Shengyu Zhang, Feng Lin, Fei Wu:
MOSS: Motion-based 3D Clothed Human Synthesis from Monocular Video. CoRR abs/2405.12806 (2024) - 2023
- [j28]Shaohui Yan, Lin Li, Binxian Gu, Xi Sun, Yu Ren, Yuyan Zhang:
A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding. Appl. Intell. 53(24): 31181-31206 (2023) - [j27]Shaohui Yan, Jianjian Wang, Ertong Wang, Qiyu Wang, Xi Sun, Lin Li:
A four-dimensional chaotic system with coexisting attractors and its backstepping control and synchronization. Integr. 91: 67-78 (2023) - [j26]Xi Sun, Zhimin Lv:
Exploring nonlinear spatiotemporal effects for personalized next point-of-interest recommendation. Frontiers Inf. Technol. Electron. Eng. 24(9): 1273-1286 (2023) - [j25]Shaohui Yan, Binxian Gu, Yu Ren, Xi Sun, Ertong Wang:
Dynamical analysis of four-dimensional chaotic system and its application in image encryption. Multim. Tools Appl. 82(14): 21509-21534 (2023) - [c25]Xi Sun, Xiang Chen, Di Wang, Zhengyan Zhou, Xinyue Jiang, Wenhai Wang, Chunming Wu, Haifeng Zhou:
RFT: Toward Highly Reliable Flow Data Transmission in Network Measurement. SECON 2023: 474-482 - [c24]Xi Sun, Derek Jacoby, Yvonne Coady:
3DFusion, A real-time 3D object reconstruction pipeline based on streamed instance segmented data. UEMCON 2023: 320-328 - [i3]Xi Sun, Derek Jacoby, Yvonne Coady:
3DFusion, A real-time 3D object reconstruction pipeline based on streamed instance segmented data. CoRR abs/2311.06659 (2023) - 2022
- [j24]Shaohui Yan, Zhenlong Song, Wanlin Shi, Weilong Zhao, Yu Ren, Xi Sun:
A Novel Memristor-Based Dynamical System with Chaotic Attractor and Periodic Bursting. Int. J. Bifurc. Chaos 32(4): 2250047:1-2250047:16 (2022) - [j23]Shaohui Yan, Yu Ren, Zhenlong Song, Wanlin Shi, Xi Sun:
A memristive chaotic system with rich dynamical behavior and circuit implementation. Integr. 85: 63-75 (2022) - [j22]Shaohui Yan, Qiyu Wang, Xi Sun, Ertong Wang, Zhenlong Song, Wanlin Shi:
The Comparison, Analysis and Circuit Implementation of the Chaotic Systems. J. Circuits Syst. Comput. 31(9): 2250170:1-2250170:26 (2022) - [c23]Hongguang Yang, Xudong Wang, Jiyong Tan, Gen Liu, Xi Sun, Yuanwei Li:
A Breast Ultrasound Tumor Detection Framework Using Convolutional Neural Networks. BIC 2022: 72-78 - [c22]Zhenbo Song, Xi Sun, Zhou Xue, Dong Xie, Chao Wen:
Visual Localization Through Virtual Views. CICAI (3) 2022: 582-587 - 2021
- [j21]Xi Sun, Hao Wang, Xiu Fu, Hong Qin, Mei Jiang, Likun Xue, Xiaochao Wei:
Substring-searchable attribute-based encryption and its application for IoT devices. Digit. Commun. Networks 7(2): 277-283 (2021) - [j20]Hang Zhang, Mingxin Gan, Xi Sun:
Incorporating Memory-Based Preferences and Point-of-Interest Stickiness into Recommendations in Location-Based Social Networks. ISPRS Int. J. Geo Inf. 10(1): 36 (2021) - [c21]Joshua Power, Derek Jacoby, Xi Sun, Matthew Plaudis, Marc-Antoine Drouin, Yvonne Coady, Julian Meng:
Real-Time Mission Planning Simulations from Geospatial Data. DS-RT 2021: 1-2 - 2020
- [j19]Mei Jiang, Hao Wang, Wenying Zhang, Hong Qin, Xi Sun:
Location-based data access control scheme for Internet of Vehicles. Comput. Electr. Eng. 86: 106716 (2020) - [j18]Xiangyu Liu, Xiaogang Ren, Xiaoying Ma, Xi Sun, Yue Wu, Zeqing Li:
Analysis of Clinical Features and Endoscopic Ultrasonography in the Diagnosis of Gastric Submucosal Tumors. J. Medical Imaging Health Informatics 10(7): 1570-1574 (2020) - [c20]Xi Sun, Xinshuo Weng, Kris Kitani:
When We First Met: Visual-Inertial Person Localization for Co-Robot Rendezvous. IROS 2020: 10408-10415 - [c19]Xi Sun, Tianming Wei, Matthew Plaudis, Yvonne Coady:
BUDI: Building Urban Designs Interactively Can Spatial-Based Collaboration be Seamless? SUI 2020: 24:1-24:2 - [i2]Xi Sun, Xinshuo Weng, Kris Kitani:
When We First Met: Visual-Inertial Person Localization for Co-Robot Rendezvous. CoRR abs/2006.09959 (2020)
2010 – 2019
- 2019
- [j17]Tianhao Zhang, Qi Huang, Chunxiang Jiao, Hua Liu, Binbin Nie, Shengxiang Liang, Panlong Li, Xi Sun, Ting Feng, Lin Xu, Baoci Shan:
Modular architecture of metabolic brain network and its effects on the spread of perturbation impact. NeuroImage 186: 146-154 (2019) - 2018
- [j16]Yao Wei, Weiming Zhang, Weihai Li, Nenghai Yu, Xi Sun:
Which gray level should be given the smallest cost for adaptive steganography? Multim. Tools Appl. 77(14): 17861-17874 (2018) - [c18]Xi Sun, Yi Man, Yanling Zhao, Jin He, Ningning Liu:
Incorporating Description Embeddings into Medical Knowledge Graphs Representation Learning. HCC 2018: 188-194 - 2017
- [j15]Shoubiao Tan, Xi Sun, Wentao Chan, Lei Qu, Ling Shao:
Robust Face Recognition With Kernelized Locality-Sensitive Group Sparsity Representation. IEEE Trans. Image Process. 26(10): 4661-4668 (2017) - [j14]Bin Cao, Xi Sun, Yun Li, Chonggang Wang, Hang Mei:
Understanding the Impact of Employing Relay Node on Wireless Networks. IEEE Trans. Veh. Technol. 66(5): 4287-4299 (2017) - 2015
- [c17]Xi Sun, Wentao Chan, Lei Qu:
Robust Face Recognition with Locality-Sensitive Sparsity and Group Sparsity Constraints. ICIG (3) 2015: 260-270 - 2014
- [j13]Xi Sun, Haibo Tian, Yumin Wang:
Toward quantum-resistant strong designated verifier signature. Int. J. Grid Util. Comput. 5(2): 80-86 (2014) - [j12]Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang:
Versatile identity-based signatures for authentication in multi-user settings. Int. J. Grid Util. Comput. 5(3): 156-164 (2014) - [i1]Liya Fan, Bo Gao, Xi Sun, Fa Zhang, Zhiyong Liu:
Improving the Load Balance of MapReduce Operations based on the Key Distribution of Pairs. CoRR abs/1401.0355 (2014) - 2012
- [j11]WeiGuo Zhang, Xi Sun, JunPo Yang:
On constructing 1-cheating immune secret-sharing functions. Int. J. Comput. Math. 89(1): 30-34 (2012) - [c16]Xi Sun, Bo Gao, Liya Fan, Wenhao An:
A Cost-Effective Approach to Delivering Analytics as a Service. ICWS 2012: 512-519 - [c15]Xi Sun, Haibo Tian, Yumin Wang:
Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies. INCoS 2012: 292-296 - [c14]Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang:
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings. INCoS 2012: 318-322 - 2011
- [c13]Bo Gao, Wenhao An, Xi Sun, Zhi Hu Wang, Liya Fan, Changjie Guo, Wei Sun:
A Non-intrusive Multi-tenant Database Software for Large Scale SaaS Application. ICEBE 2011: 324-328 - [c12]Xi Sun, Bo Gao, Yuzhou Zhang, Wenhao An, Heng Cao, Changjie Guo, Wei Sun:
Towards Delivering Analytical Solutions in Cloud: Business Models and Technical Challenges. ICEBE 2011: 347-351 - [c11]Xi Sun, Liya Fan, Linlin Yan, Lei Kong, Yang Ding, Changjie Guo, Wei Sun:
Deliver Bioinformatics Services in Public Cloud: Challenges and Research Framework. ICEBE 2011: 352-357 - 2010
- [j10]Yan Li, Feng-Hong Chen, Xi Sun, Minghui Zhou, Wenpin Jiao, Donggang Cao, Hong Mei:
Self-Adaptive Resource Management for Large-Scale Shared Clusters. J. Comput. Sci. Technol. 25(5): 945-957 (2010) - [c10]Xi Sun, Ying Zheng, Zengfu Wang:
Model-assisted face reconstruction based on binocular stereo. VCIP 2010: 77442Y
2000 – 2009
- 2009
- [j9]Xi Sun, Li Zhou, Lei Zhuang, Wenpin Jiao, Hong Mei:
An Approach to Constructing High-Available Decentralized Systems via Self-Adaptive Components. Int. J. Softw. Eng. Knowl. Eng. 19(4): 553-571 (2009) - [c9]Igor Boiko, Xi Sun, Edgar Tamayo:
Performance analysis and tuning of variable-structure PID controllers for level process. CCA/ISIC 2009: 268-273 - [c8]Qi Wang, Xi Sun, Zengfu Wang:
A Robust Algorithm for Color Correction between Two Stereo Images. ACCV (2) 2009: 405-416 - 2008
- [c7]Amr M. Pertew, Xi Sun, R. Kent Gooden, Horacio J. Marquez:
A new blowdown compensation scheme for boiler leak detection. ACC 2008: 4309-4311 - [c6]Igor M. Boiko, Xi Sun, Edgar Tamayo:
Variable-structure PI controller for tank level process. ACC 2008: 4697-4702 - 2007
- [j8]Jingwei Liu, Rong Sun, Weidong Kou, Xi Sun:
The security analyses of RosettaNet in Grid. Comput. Stand. Interfaces 29(2): 224-228 (2007) - [j7]Haibo Tian, Xi Sun, Yumin Wang:
A New Public-Key Encryption Scheme. J. Comput. Sci. Technol. 22(1): 95-102 (2007) - [c5]Xi Sun, Li Zhou, Lei Zhuang, Wenpin Jiao, Hong Mei:
Towards Constructing High-available Decentralized Systems via Self-adaptive Components. SEKE 2007: 296-301 - 2006
- [j6]Hong Mei, Xi Sun, Xuanzhe Liu, Wenpin Jiao, Gang Huang:
An agent-based approach to composing web services to support adaptable business processes. Multiagent Grid Syst. 2(4): 383-399 (2006) - 2005
- [j5]Zhengtao Jiang, Xi Sun, Yumin Wang:
Security analysis and improvement of a double-trapdoor encryption scheme. Appl. Math. Comput. 169(1): 41-50 (2005) - [c4]Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model. CIS (2) 2005: 500-507 - [c3]Junrong Shen, Xi Sun, Gang Huang, Wenpin Jiao, Yanchun Sun, Hong Mei:
Towards a unified formal model for supporting mechanisms of dynamic component update. ESEC/SIGSOFT FSE 2005: 80-89 - 2003
- [j4]Xi Sun, Kazuko Morizawa, Hiroyuki Nagasawa:
Powerful heuristics to minimize makespan in fixed, 3-machine, assembly-type flowshop scheduling. Eur. J. Oper. Res. 146(3): 498-516 (2003) - [j3]Kazuko Morizawa, Xi Sun, Hiroyuki Nagasawa:
Squeezing branch and bound algorithm for the machine-fixed, machining-assembly flowshop scheduling problem. Int. J. Manuf. Technol. Manag. 5(1/2): 20-27 (2003) - 2001
- [c2]Xi Sun, Tongwen Chen, Horacio J. Marquez:
Detecting leaks and sensor biases by recursive identification with forgetting factors. CDC 2001: 3716-3721 - 2000
- [j2]Xi Sun, Ming Rao:
A multivariable bilinear adaptive controller with decoupling design. IEEE Trans. Autom. Control. 45(4): 714-719 (2000)
1990 – 1999
- 1998
- [c1]Xi Sun, Ming Rao:
Intelligent multivariable fault tolerant control systems. SMC 1998: 1406-1410 - 1994
- [j1]Xi Sun, Ji Feng Zhang:
Adaptive stabilization of bilinear systems. IEEE Trans. Autom. Control. 39(1): 207-211 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint