default search action
Xiao Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xiao Yi, Qiuping Jiang, Wei Zhou:
No-reference quality assessment of underwater image enhancement. Displays 81: 102586 (2024) - [j15]Xiao Yi:
Social media user information security encryption method based on chaotic algorithm. Int. J. Web Based Communities 20(1/2): 128-138 (2024) - [c12]Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang:
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. EuroS&P 2024: 724-740 - [i7]Yuxuan Wu, Xiao Yi, Yang Tan, Huiqun Yu, Guisheng Fan:
A PLMs based protein retrieval framework. CoRR abs/2407.11548 (2024) - [i6]Zhongyi Wang, Linyu Yang, Mingshuai Chen, Yixuan Bu, Zhiyang Li, Qiuye Wang, Shengchao Qin, Xiao Yi, Jianwei Yin:
Parf: Adaptive Parameter Refining for Abstract Interpretation. CoRR abs/2409.05794 (2024) - 2023
- [j14]Zhangzhi Xue, Tiansheng Zhu, Fangfei Zhang, Cheng Zhang, Nan Xiang, Liujia Qian, Xiao Yi, Yaoting Sun, Wei Liu, Xue Cai, Linyan Wang, Xizhe Dai, Liang Yue, Lu Li, Thang Viet Pham, Sander R. Piersma, Qi Xiao, Meng Luo, Cong Lu, Jiang Zhu, Yongfu Zhao, Guangzhi Wang, Junhong Xiao, Tong Liu, Zhiyu Liu, Yi He, Qijun Wu, Tingting Gong, Jianqin Zhu, Zhiguo Zheng, Juan Ye, Yan Li, Connie R. Jimenez, Jun A, Tiannan Guo:
DPHL v.2: An updated and comprehensive DIA pan-human assay library for quantifying more than 14,000 proteins. Patterns 4(7): 100792 (2023) - [j13]Shitao Yang, Xiao Yi, Richang Dong, Qianyi Ren, Xupeng Li, Tao Shuai, Jun Zhang, Wenbin Gong:
A Method for Autonomous Generation of High-Precision Time Scales for Navigation Constellations. Sensors 23(3): 1703 (2023) - [c11]Xiao Yi, Bo Wang, Shengbai Luo, Tiejun Li, Lizhou Wu, Jianmin Zhang, Kenli Li, Sheng Ma:
A Hybrid Kernel Pruning Approach for Efficient and Accurate CNNs. ICA3PP (7) 2023: 34-46 - [c10]Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang:
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts. ISSTA 2023: 1157-1168 - [c9]Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang:
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. NDSS 2023 - [i5]Wei Zhiwei, Xiao Yi, Tong Ying, Wenjia Xu, Wang Yang:
Linear building pattern recognition via spatial knowledge graph. CoRR abs/2304.10733 (2023) - 2022
- [j12]Bin Wu, Xiao Yi, Dongning Zhao:
A node screening algorithm for wireless sensor network based on threshold measurement. Int. J. Inf. Comput. Secur. 17(3/4): 424-437 (2022) - [j11]Bo Wang, Sheng Ma, Guoyi Zhu, Xiao Yi, Rui Xu:
A novel systolic array processor with dynamic dataflows. Integr. 85: 42-47 (2022) - [c8]Bo Wang, Sheng Ma, Yuan Yuan, Yi Dai, Wei Jiang, Xiang Hou, Xiao Yi, Rui Xu:
SparG: A Sparse GEMM Accelerator for Deep Learning Applications. ICA3PP 2022: 529-547 - [c7]Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang:
An empirical study of blockchain system vulnerabilities: modules, types, and patterns. ESEC/SIGSOFT FSE 2022: 709-721 - [i4]Xu Yang, Daoyuan Wu, Xiao Yi, Jimmy H. M. Lee, Tan Lee:
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition. CoRR abs/2206.13356 (2022) - [i3]Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang:
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. CoRR abs/2208.00205 (2022) - 2021
- [i2]Mengjie Chen, Daoyuan Wu, Xiao Yi, Jianliang Xu:
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets. CoRR abs/2101.06454 (2021) - [i1]Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Kehuan Zhang, Wei Zhang:
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities. CoRR abs/2110.12162 (2021) - 2020
- [c6]Xiao Yi, Yonghong Song, Yuanlin Zhang:
Enhanced Darknet53 Combine MLFPN Based Real-Time Defect Detection in Steel Surface. PRCV (1) 2020: 303-314
2010 – 2019
- 2019
- [j10]Guidong Sun, Xin Guan, Xiao Yi, Zheng Zhou:
Improvements on Correlation Coefficients of Hesitant Fuzzy Sets and Their Applications. Cogn. Comput. 11(4): 529-544 (2019) - 2018
- [j9]Guidong Sun, Xin Guan, Xiao Yi, Jing Zhao:
Conflict Evidence Measurement Based on the Weighted Separate Union Kernel Correlation Coefficient. IEEE Access 6: 30458-30472 (2018) - [j8]Guidong Sun, Xin Guan, Xiao Yi, Zheng Zhou:
An innovative TOPSIS approach based on hesitant fuzzy correlation coefficient and its applications. Appl. Soft Comput. 68: 249-267 (2018) - [j7]Guidong Sun, Xin Guan, Xiao Yi, Zheng Zhou:
Grey relational analysis between hesitant fuzzy sets with applications to pattern recognition. Expert Syst. Appl. 92: 521-532 (2018) - [j6]Xin Guan, Guidong Sun, Xiao Yi, Zheng Zhou:
Synthetic Correlation Coefficient Between Hesitant Fuzzy Sets with Applications. Int. J. Fuzzy Syst. 20(6): 1968-1985 (2018) - [j5]Guidong Sun, Xin Guan, Xiao Yi, Jing Zhao:
Belief intervals aggregation. Int. J. Intell. Syst. 33(12): 2425-2447 (2018) - [j4]Guidong Sun, Xin Guan, Xiao Yi, Zheng Zhou:
Multi-Attribute Decision Making with Interval-Valued Hesitant Fuzzy Information, a Novel Synthetic Grey Relational Degree Method. Informatica 29(3): 517-537 (2018) - 2017
- [c5]Zhanpei Jia, Chao Shen, Xiao Yi, Yufei Chen, Tianwen Yu, Xiaohong Guan:
Big-data analysis of multi-source logs for anomaly detection on network-based system. CASE 2017: 1136-1141 - 2015
- [c4]Xiao Yi, Nan Liu:
An achievability scheme for downlink multicell processing with finite backhaul capacity: The general case. WCSP 2015: 1-5 - 2012
- [j3]Yu Liu, Xiao Yi, You He:
A Novel Centroid Localization for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [c3]Xiao Yi:
The application research of virtual reality technology in emergency evacuation simulation of sports stadium. ICNC 2011: 2300-2303 - 2010
- [c2]Xiao Yi, Yu Liu, Lu Deng:
A novel environment self-adaptive localization algorithm based on RSSI for wireless sensor networks. WCNIS 2010: 360-363
2000 – 2009
- 2009
- [j2]Xiao Yi, Sheng Feng Qin, Jinsheng Kang:
Generating 3D architectural models based on hand motion and gesture. Comput. Ind. 60(9): 677-685 (2009) - 2008
- [c1]Ying Huang, Zifan Yu, Xiao Yi, Yong Liu:
Model Analyses on Message Stream Transmission in P2P-SIP. ICNSC 2008: 1372-1375 - 2005
- [j1]Xin Guan, You He, Xiao Yi:
Attribute measure recognition approach and its applications to emitter recognition. Sci. China Ser. F Inf. Sci. 48(2): 225-233 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint