default search action
Zhiyan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Kaiyan Li, Jingyuan Yang, Wenxuan Liang, Xingde Li, Chenxi Zhang, Lulu Chen, Chan Wu, Xiao Zhang, Zhiyan Xu, Yueling Wang, Lihui Meng, Yue Zhang, Youxin Chen, S. Kevin Zhou:
O-PRESS: Boosting OCT axial resolution with Prior guidance, Recurrence, and Equivariant Self-Supervision. Medical Image Anal. 99: 103319 (2025) - 2023
- [j13]Zhiyan Xu, Min Luo, Cong Peng, Qi Feng:
Sanitizable signature scheme with privacy protection for electronic medical data sharing. Cyber Secur. Appl. 1: 100018 (2023) - [j12]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Brij B. Gupta, Jian Shen:
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs. IEEE J. Biomed. Health Informatics 27(5): 2334-2344 (2023) - 2022
- [j11]Weisen Wang, Xirong Li, Zhiyan Xu, Weihong Yu, Jianchun Zhao, Dayong Ding, Youxin Chen:
Learning Two-Stream CNN for Multi-Modal Age-Related Macular Degeneration Categorization. IEEE J. Biomed. Health Informatics 26(8): 4111-4122 (2022) - 2021
- [j10]Zhiyan Xu, Min Luo, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25(4): 1074-1078 (2021) - 2020
- [j9]Zhiyan Xu, Debiao He, Huaqun Wang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inf. Secur. Appl. 51: 102453 (2020) - [j8]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Kim-Kwang Raymond Choo, Li Li:
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. J. Medical Syst. 44(5): 92 (2020) - [j7]Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. Secur. Commun. Networks 2020: 5276813:1-5276813:12 (2020) - [j6]Zhiyan Xu, Min Luo, Neeraj Kumar, Pandi Vijayakumar, Li Li:
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios. Wirel. Commun. Mob. Comput. 2020: 8877405:1-8877405:10 (2020) - [i2]Weisen Wang, Xirong Li, Zhiyan Xu, Weihong Yu, Jianchun Zhao, Dayong Ding, Youxin Chen:
Learning Two-Stream CNN for Multi-Modal Age-related Macular Degeneration Categorization. CoRR abs/2012.01879 (2020)
2010 – 2019
- 2019
- [c4]Weisen Wang, Zhiyan Xu, Weihong Yu, Jianchun Zhao, Jingyuan Yang, Feng He, Zhikun Yang, Di Chen, Dayong Ding, Youxin Chen, Xirong Li:
Two-Stream CNN with Loose Pair Training for Multi-modal AMD Categorization. MICCAI (1) 2019: 156-164 - [i1]Weisen Wang, Zhiyan Xu, Weihong Yu, Jianchun Zhao, Jingyuan Yang, Feng He, Zhikun Yang, Di Chen, Dayong Ding, Youxin Chen, Xirong Li:
Two-Stream CNN with Loose Pair Training for Multi-modal AMD Categorization. CoRR abs/1907.12023 (2019) - 2018
- [j5]Jiahua Wei, Lei Shi, Yu Zhu, Yang Xue, Zhiyan Xu, Jun Jiang:
Deterministic remote preparation of arbitrary multi-qubit equatorial states via two-qubit entangled states. Quantum Inf. Process. 17(3): 70 (2018) - [j4]Jiahua Wei, Lei Shi, Chen Han, Zhiyan Xu, Yu Zhu, Gang Wang, Hao Wu:
Probabilistic teleportation via multi-parameter measurements and partially entangled states. Quantum Inf. Process. 17(4): 82 (2018) - [j3]Libing Wu, Zhiyan Xu, Debiao He, Xianmin Wang:
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment. Secur. Commun. Networks 2018: 2595273:1-2595273:13 (2018) - 2017
- [j2]Zhiyan Xu, Libing Wu, Debiao He, Muhammad Khurram Khan:
Security analysis of a publicly verifiable data possession scheme for remote storage. J. Supercomput. 73(11): 4923-4930 (2017) - [j1]Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12): 5285-5309 (2017) - 2016
- [c3]Yong Xie, Libing Wu, Yubo Zhang, Zhiyan Xu:
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. ProvSec 2016: 244-254 - 2013
- [c2]Yuqiang Chen, Wei Lu, Zhiyan Xu:
Fault Detection Filter Design for Certain Networked Control System. BICS 2013: 366-376
2000 – 2009
- 2006
- [c1]Yuqiang Chen, Bo Xiao, Zhiyan Xu:
Fault Detection Filter Design For Networked Control System With Communication Delays. ISDA (1) 2006: 867-872
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint