default search action
Xiaolin Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Yue Chang, Xiaolin Zhao, Mingzhe Pei, Zhenyan Liu:
GUCN: A machine learning model combining time series features for malicious network behavior detection. GAIIS 2024 - 2022
- [j20]Zhaotian Wei, Xiaolin Zhao:
Multi-UAVs Cooperative Reconnaissance Task Allocation Under Heterogeneous Target Values. IEEE Access 10: 70955-70963 (2022) - 2020
- [j19]Xiaolin Zhao, Yiman Zhang, Jingfeng Xue, Chun Shan, Zhen Liu:
Research on Network Risk Evaluation Method Based on a Differential Manifold. IEEE Access 8: 66315-66326 (2020) - [j18]Qingcheng Li, Heng Cao, Shengkui Wang, Xiaolin Zhao:
A Reputation-Based Multi-User Task Selection Incentive Mechanism for Crowdsensing. IEEE Access 8: 74887-74900 (2020) - [j17]Yu Zhang, Yu Liu, Peng Sun, Han Yan, Xiaolin Zhao, Li Zhang:
IFCNN: A general image fusion framework based on convolutional neural network. Inf. Fusion 54: 99-118 (2020) - [j16]Xiaolin Zhao, Hui Peng, Xiang Li, Yue Li, Jingfeng Xue, Yaoyuan Liang, Mingzhe Pei:
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope. Secur. Commun. Networks 2020: 6679304:1-6679304:11 (2020) - [j15]Leisheng Zhong, Xiaolin Zhao, Yu Zhang, Shunli Zhang, Li Zhang:
Occlusion-Aware Region-Based 3D Pose Tracking of Objects With Temporally Consistent Polar-Based Local Partitioning. IEEE Trans. Image Process. 29: 5065-5078 (2020) - [c17]Jiang Liu, Bai-gen Cai, Zhong-bin Guo, Xiaolin Zhao:
Constructing Knowledge Graph for Prognostics and Health Management of On-board Train Control System Based on Big Data and XGBoost. BDTA/WiCON 2020: 3-16
2010 – 2019
- 2019
- [j14]Guoyan Huang, Yazhou Li, Qian Wang, Jiadong Ren, Yongqiang Cheng, Xiaolin Zhao:
Automatic Classification Method for Software Vulnerability Based on Deep Neural Network. IEEE Access 7: 28291-28298 (2019) - [j13]Xiaolin Zhao, Quanbao Chen, Jingfeng Xue, Yiman Zhang, Jingjing Zhao:
A Method for Calculating Network System Security Risk Based on a Lie Group. IEEE Access 7: 70610-70623 (2019) - [j12]Bo Qi, Chunjia Gao, Hao Han, Xiaolin Zhao, Qing Yuan, Shuqi Zhang, Chengrong Li:
Electric Field Distribution Characteristics and Space Charge Motion Process in Transformer Oil Under Impulse Voltage. IEEE Access 7: 103781-103793 (2019) - [j11]Haitao He, Xu Zhang, Qian Wang, Jiadong Ren, Jiaxin Liu, Xiaolin Zhao, Yongqiang Cheng:
Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data. IEEE Access 7: 110333-110343 (2019) - [j10]Xiaolin Zhao, Zhuofan Xu, Boxin Zhao, Xiaolong Chen, Zongzhe Li:
Object Tracking With Structured Metric Learning. IEEE Access 7: 161764-161775 (2019) - [j9]Qian Wang, Chun Shan, Xiaolin Zhao, Jun Dong, Jiadong Ren, Jiaxin Liu:
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory. Int. J. Softw. Eng. Knowl. Eng. 29(3): 415-432 (2019) - [j8]Han Yan, Xin Yu, Yu Zhang, Shunli Zhang, Xiaolin Zhao, Li Zhang:
Single Image Depth Estimation With Normal Guided Scale Invariant Deep Convolutional Fields. IEEE Trans. Circuits Syst. Video Technol. 29(1): 80-92 (2019) - [c16]Jiadong Ren, Qian Wang, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao:
Mining important nodes in complex software network based on ripple effects of probability. ACM TUR-C 2019: 51:1-51:8 - [c15]Xiaolin Zhao, Jiang Liu, Baigen Cai, Debiao Lu, Jian Wang:
Research on Optimized Pseudolite Constellation Design under Constrained GNSS Environment in Railway Stations. ITSC 2019: 3475-3481 - 2018
- [j7]Qian Wang, Jiadong Ren, Yu Wang, Bing Zhang, Yongqiang Cheng, Xiaolin Zhao:
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network. IEEE Access 6: 19550-19559 (2018) - [j6]Zhuofan Xu, Ruixuan Wei, Xiaolin Zhao, Shulei Wang:
Coordinated Standoff Target Tracking Guidance Method for UAVs. IEEE Access 6: 59853-59859 (2018) - [j5]Bing Zhang, Zhiyang Liu, Yanguo Jia, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. Secur. Commun. Networks 2018: 1914980:1-1914980:11 (2018) - [j4]Boxin Zhao, Xiaolong Chen, Xiaolin Zhao, Jun Jiang, Jiahua Wei:
Real-Time UAV Autonomous Localization Based on Smartphone Sensors. Sensors 18(12): 4161 (2018) - [c14]Xiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang:
A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain. DSC 2018: 902-909 - [c13]Xiaolin Zhao, Yiman Zhang, Xuhui Li, Quanbao Chen:
Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering. TrustCom/BigDataSE 2018: 1914-1921 - 2017
- [c12]Xiaolin Zhao, Jingfeng Xue, Yiman Zhang, Qi Zhang:
Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class. FSDM 2017: 494-510 - [c11]Xiaojian Xiang, Xuhan Dai, Shi Sun, Guifu Ding, Xiaolin Zhao:
An electrostatic actuator with variable stiffness for suppression of rebound due to waveform deviations. IEEE SENSORS 2017: 1-3 - [c10]Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:
SulleyEX: A Fuzzer for Stateful Network Protocol. NSS 2017: 359-372 - 2016
- [c9]Sheng Mao, Mingfa Zheng, Xiaolin Zhao, Wenjun Xie, Zutong Wang:
The uncertain time dependent vehicle routing problem with soft time windows. FUZZ-IEEE 2016: 38-45 - [c8]Yu Zhang, Ainong Chao, Boxin Zhao, Huawei Liu, Xiaolin Zhao:
Migratory birds-inspired navigation system for unmanned aerial vehicles. ICIA 2016: 276-281 - [c7]Qihuan Zhang, Zhuoqing Yang, Qiu Xu, Mengyuan Zhao, Jinyuan Yao, Guifu Ding, Xiaolin Zhao:
A MEMS inertial switch with compact constraint structures for lowering off-axis sensitivity. IEEE SENSORS 2016: 1-3 - 2015
- [j3]Xin Yu, Shunli Zhang, Xiaolin Zhao, Li Zhang:
Removing blur kernel noise via a hybrid ℓp norm. J. Electronic Imaging 24(1): 013011 (2015) - [j2]Yao Sui, Xiaolin Zhao, Shunli Zhang, Xin Yu, Sicong Zhao, Li Zhang:
Self-expressive tracking. Pattern Recognit. 48(9): 2872-2884 (2015) - [c6]Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang:
Research on Identification and Addressing of the Internet of Things. 3PGCIC 2015: 810-814 - [c5]Yong Wang, Longxing Wei, Xuemin Tong, Xiaolin Zhao, Ming Li:
CP-ABE Based Access Control for Cloud Storage. ITITS (2) 2015: 463-472 - 2013
- [c4]Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao:
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis. DASC 2013: 52-57 - 2011
- [j1]Xiaolin Zhao, Xin Yu, Liguo Sun, Kangqiao Hu, Guijin Wang, Li Zhang:
Non-rigid Object Tracking as Salient Region Segmentation and Association. IEICE Trans. Inf. Syst. 94-D(4): 934-937 (2011)
2000 – 2009
- 2009
- [c3]Xiaosheng Wu, Wenyuan Chen, Weiping Zhang, Yipeng Lu, Feng Cui, Xiaolin Zhao:
Modeling analysis of piezoelectric micromachined modal gyroscope (PMMG). NEMS 2009: 304-309 - 2008
- [c2]Lu Dai, Li Zhang, Xiaolin Zhao:
A Three Dimensional Combinative Lifting Algorithm for Wavelet Transform Using 9/7 Filter. DCC 2008: 510 - 2007
- [c1]Hongwei Zhao, Xiaolin Zhao, Yiming Qi:
Infrared Point Target Detection and Tracking Based on DSP. SNPD (2) 2007: 392-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint