default search action
Xiaohan Hao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j9]Xiaohan Hao, Chao Lin, Wenhan Dong, Xinyi Huang, Hui Xiong:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. IEEE Trans. Inf. Forensics Secur. 19: 1576-1588 (2024) - 2023
- [j8]Shiyong Huang, Xin Yang, Langyue He, Xiaohan Hao, Wei Ren:
An analysis model for detecting misbehaviors in anonymous cryptocurrency. Comput. Stand. Interfaces 83: 103669 (2023) - [j7]Ruoting Xiong, Wei Ren, Xiaohan Hao, Jie He, Kim-Kwang Raymond Choo:
BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things. IEEE Internet Things J. 10(24): 22581-22590 (2023) - [j6]Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, Geyong Min:
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things. IEEE Trans. Computers 72(2): 501-512 (2023) - [j5]Xiaohan Hao, Wei Ren, Yangyang Fei, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. IEEE Trans. Serv. Comput. 16(2): 773-786 (2023) - 2022
- [j4]Xiaohan Hao, Wei Ren, Kim-Kwang Raymond Choo, Neal N. Xiong:
A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids. IEEE Trans. Ind. Informatics 18(6): 4097-4106 (2022) - 2021
- [j3]Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo:
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things. Future Gener. Comput. Syst. 124: 243-253 (2021) - 2019
- [j2]Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Feng Xiong, Tianqing Zhu:
CaACBIM: A Context-aware Access Control Model for BIM. Inf. 10(2): 47 (2019) - [j1]Yuling Chen, Xiaohan Hao, Wei Ren, Yi Ren:
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019: 5627497:1-5627497:10 (2019)
Conference and Workshop Papers
- 2023
- [c6]Mengdie Song, Xiaohan Hao, Fulang Qi:
CSA: A Channel-Separated Attention Module for Enhancing MRI Reconstruction. EMBC 2023: 1-4 - 2022
- [c5]Xiaohan Hao, Xiao Xu, Daimin Jiang, Guoyi Zhou:
Light Adaptation for Classification of the Upper Gastrointestinal Sites. ISGIE/GRAIL@MICCAI 2022: 3-12 - 2021
- [c4]Xiaohan Hao, Bing Liu, Xiaofei Hu, Jingwei Wei, Yuqi Han, Xianchuang Liu, Zhiyu Chen, Jiaping Li, Jie Bai, Yongliang Chen, Jian Wang, Meng Niu, Jie Tian:
A Radiomics-based Approach for Predicting Early Recurrence in Intrahepatic Cholangiocarcinoma after Surgical Resection: A Multicenter Study. EMBC 2021: 3659-3662 - [c3]Chenyan Sun, Xiaohan Hao, Wei Ren:
A Route Optimization Scheme based on Improved Simulated Annealing Algorithm. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 186-192 - 2020
- [c2]Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu:
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. TrustCom 2020: 1598-1605 - 2019
- [c1]Shuaitong Zhang, Yafei Qi, Jingwei Wei, Jianxing Niu, Dongsheng Gu, Yuqi Han, Xiaohan Hao, Yali Zang, Jie Tian:
Radiomics analysis potentially reduces over-diagnosis of prostate cancer with PSA levels of 4-10 ng/ml based on DWI data. Medical Imaging: Computer-Aided Diagnosis 2019: 109501Z
Parts in Books or Collections
- 2019
- [p1]Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Blockchain-based security and access control for BIM big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 89-119
Data and Artifacts
- 2021
- [d7]Xiaohan Hao, Ruoting Xiong, Wei Ren:
Sharing Information. IEEE DataPort, 2021 - 2020
- [d6]Langyue He, Xiaohan Hao, Wei Ren:
An Analysis Model For Detecting Click Farm in Anonymous Cryptocurrency. IEEE DataPort, 2020 - [d5]Ruoting Xiong, Xiaohan Hao, Wei Ren:
The process of exchanging models. IEEE DataPort, 2020 - [d4]Ruoting Xiong, Xiaohan Hao, Wei Ren, Chengzhuo Zhang:
Learning To Simulate Asymmetric Encryption With Adversarial Neural Networks. IEEE DataPort, 2020 - [d3]Ruoting Xiong, Xiaohan Hao, Wei Ren, Chengzhuo Zhang:
A New Method for Constructing Digital Signature With Generative Adversarial Neural Network. IEEE DataPort, 2020 - 2019
- [d2]Wei Ren, Shunwei Qiu, Xiaohan Hao:
A SVM-based Scanning System for Vulnerabilities in Blochchain Smart Contracts. IEEE DataPort, 2019 - 2018
- [d1]Wei Ren, Xiaohan Hao:
Code to generate keys. IEEE DataPort, 2018
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint