default search action
Hong Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Jianing Fan, Shao-Hua Shi, Hong Xiang, Li Fu, Yanjing Duan, Dong-Sheng Cao, Hongwei Lu:
Predicting Elimination of Small-Molecule Drug Half-Life in Pharmacokinetics Using Ensemble and Consensus Machine Learning Methods. J. Chem. Inf. Model. 64(8): 3080-3092 (2024) - [j27]Yonggang Li, Yaotong Su, Lei Xia, Yongfu Li, Hong Xiang, Qinglong Liao:
A Novel Wind Power Prediction Scheme by Coupling the BP Neural Network Model with the Fireworks Algorithm. Scalable Comput. Pract. Exp. 25(4): 3114-3125 (2024) - 2023
- [j26]Jianbo Li, Guirong Hou, Hong Xiang, Zhiwen Lei, Shaomiao Chen:
An efficient neural architecture search based deep learning algorithm for surface defects detection of T-beam. Int. J. Embed. Syst. 16(2): 153-160 (2023) - 2022
- [j25]Zhong-Kai Guo, Hai-Feng Huo, Hong Xiang:
Optimal control of TB transmission based on an age structured HIV-TB co-infection model. J. Frankl. Inst. 359(9): 4116-4137 (2022) - [j24]Chen Wu, Hong Xiang, Shao-Fei Jiang, Shenglan Ma:
Stress Monitoring of Concrete via Uniaxial Piezoelectric Sensor. Sensors 22(11): 4041 (2022) - [j23]Yiru Niu, Hong Jiang, Bo Tian, Hong Xiang, Yiming Liu, Xiaofeng Xia, Yue Zhao:
An efficient access control scheme for smart campus. EAI Endorsed Trans. Scalable Inf. Syst. 9(6): e5 (2022) - [c8]Fusen Wang, Jun Sang, Chunlin Huang, Bin Cai, Hong Xiang, Nong Sang:
Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes. ICASSP 2022: 3029-3033 - 2021
- [j22]Peng Wang, Tao Xiang, Xiaoguo Li, Hong Xiang:
Access control encryption without sanitizers for Internet of Energy. Inf. Sci. 546: 924-942 (2021) - 2020
- [j21]Yan Yan, Lingjun He, Li Liu, Tao Yang, Wenhua Hou, Hong Xiang, Xiaofeng Xia, Haibo Hu:
Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in Networks. IEEE Access 8: 31317-31329 (2020) - [j20]Peng Wang, Tao Xiang, Xiaoguo Li, Hong Xiang:
Public key encryption with conjunctive keyword search on lattice. J. Inf. Secur. Appl. 51: 102433 (2020)
2010 – 2019
- 2019
- [j19]Jun Sang, Weiqun Wu, Hongling Luo, Hong Xiang, Qian Zhang, Haibo Hu, Xiaofeng Xia:
Improved Crowd Counting Method Based on Scale-Adaptive Convolutional Neural Network. IEEE Access 7: 24411-24419 (2019) - [j18]Hai-Feng Huo, Peng Yang, Hong Xiang:
Dynamics for an SIRS epidemic model with infection age and relapse on a scale-free network. J. Frankl. Inst. 356(13): 7411-7443 (2019) - [j17]Nasrullah, Jun Sang, Muhammad Mateen, Muhammad Azeem Akbar, Hong Xiang, Xiaofeng Xia:
Reversible data hiding in compressed and encrypted images by using Kd-tree. Multim. Tools Appl. 78(13): 17535-17554 (2019) - [j16]Zhongyuan Wu, Jun Sang, Qian Zhang, Hong Xiang, Bin Cai, Xiaofeng Xia:
Multi-Scale Vehicle Detection for Foreground-Background Class Imbalance with Improved YOLOv2. Sensors 19(15): 3336 (2019) - [j15]Muhammad Azeem Akbar, Jun Sang, Nasrullah, Arif Ali Khan, Sajjad Mahmood, Syed Furqan Qadri, Haibo Hu, Hong Xiang:
Success factors influencing requirements change management process in global software development. J. Comput. Lang. 51: 112-130 (2019) - [c7]Ruping Shen, Hong Xiang, Xin Zhang, Bin Cai, Tao Xiang:
Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper). CollaborateCom 2019: 419-428 - [c6]Nayyar Iqbal, Jun Sang, Min Gao, Haibo Hu, Hong Xiang:
Forward Engineering Completeness for Software by Using Requirements Validation Framework (S). SEKE 2019: 523-686 - 2018
- [j14]Muhammad Azeem Akbar, Jun Sang, Arif Ali Khan, Fazal-e-Amin, Nasrullah, Muhammad Shafiq, Shahid Hussain, Haibo Hu, Manzoor Elahi, Hong Xiang:
Improving the Quality of Software Development Process by Introducing a New Methodology-AZ-Model. IEEE Access 6: 4811-4823 (2018) - [j13]Muhammad Azeem Akbar, Jun Sang, Arif Ali Khan, Fazal-e-Amin, Nasrullah, Shahid Hussain, Mohammad Khalid Sohail, Hong Xiang, Bin Cai:
Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model. IEEE Access 6: 8066-8079 (2018) - [j12]Jun Sang, Zhongyuan Wu, Pei Guo, Haibo Hu, Hong Xiang, Qian Zhang, Bin Cai:
An Improved YOLOv2 for Vehicle Detection. Sensors 18(12): 4272 (2018) - [c5]Xin Zhang, Hong Xiang, Yuqi Song:
Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering. CollaborateCom 2018: 3-16 - [c4]Xin Zhang, Hong Xiang, Tao Xiang:
An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper). CollaborateCom 2018: 467-476 - [i1]Xin Zhang, Hong Xiang, Tao Xiang, Li Fu, Jun Sang:
An efficient quantum circuits optimizing scheme compared with QISKit. CoRR abs/1807.01703 (2018) - 2017
- [j11]Zhan-Ping Ma, Hai-Feng Huo, Hong Xiang:
Hopf bifurcation for a delayed predator-prey diffusion system with Dirichlet boundary condition. Appl. Math. Comput. 311: 1-18 (2017) - 2016
- [j10]Hong Xiang, Xiaofeng Xia, Haibo Hu, Sheng Wang, Jun Sang, Chunxiao Ye:
Approaches to access control policy comparison and the inter-domain role mapping problem. Inf. Technol. Control. 45(3): 278-288 (2016) - 2015
- [j9]Chengdong Tao, Hong Xiang, Albrecht Petzoldt, Jintai Ding:
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption. Finite Fields Their Appl. 35: 352-368 (2015) - [j8]Haibo Hu, Qi Ma, Tingting Zhang, Yong Tan, Hong Xiang, Chunlei Fu, Yong Feng:
Semantic modelling and automated reasoning of non-functional requirement conflicts in the context of softgoal interdependencies. IET Softw. 9(6): 145-156 (2015) - [j7]Jun Sang, Jun Zhao, Zhili Xiang, Bin Cai, Hong Xiang:
Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm. Sensors 15(8): 19199-19211 (2015) - 2014
- [j6]Xin-You Meng, Hai-Feng Huo, Hong Xiang, Qi-yu Yin:
Stability in a predator-prey model with Crowley-Martin function and stage structure for prey. Appl. Math. Comput. 232: 810-819 (2014) - [j5]Xiao-Bing Zhang, Hai-Feng Huo, Hong Xiang, Xin-You Meng:
Dynamics of the deterministic and stochastic SIQS epidemic model with non-linear incidence. Appl. Math. Comput. 243: 546-558 (2014) - [j4]Jun Sang, Daxiang Hong, Bing Zhang, Hong Xiang, Li Fu:
Protection profile for the smartphone operating system. Int. J. Embed. Syst. 6(1): 28-37 (2014) - 2011
- [j3]Chunlei Fu, Qichang Duan, Li Fu, Hong Xiang, Zhongyang Xiong, Haibo Hu:
A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology. J. Res. Pract. Inf. Technol. 43(3): 247- (2011) - [j2]Haibo Hu, Dan Yang, Li Fu, Hong Xiang, Chunlei Fu, Jun Sang, Chunxiao Ye, Ren Li:
Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies. IET Commun. 5(17): 2451-2460 (2011) - [j1]Chunxiao Ye, Haibo Hu, Hong Xiang:
Towards Secure Delegation with Chinese Wall Security Policy (CWSP). J. Networks 6(8): 1230-1237 (2011) - [c3]Haibo Hu, Dan Yang, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li:
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. WOSIS 2011: 103-112
2000 – 2009
- 2007
- [c2]Xuezhou Xu, Hong Xiang, Jingyu Chen:
Query decomposition based on ontology mapping in data integration system. ICNC (1) 2007: 265-269
1990 – 1999
- 1994
- [c1]Hong Xiang, Brahm P. Verma, Gerrit Hoogenboom:
Fuzzy Irrigation Decision Support System. AAAI 1994: 1499
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-19 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint