default search action
Jixin Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Jiwei Liu, Zheng Qin, Zixing Zhang, Jixin Zhang:
An Angle-Oriented Approach to Transferring Speech to Gesture for Highly Anthropomorphized Embodied Conversational Agents. Int. J. Comput. Intell. Appl. 23(2): 2450006:1-2450006:22 (2024) - [j23]Hua Shen, Zhiwei Wang, Jixin Zhang, Mingwu Zhang:
L-Net: A lightweight convolutional neural network for devices with low computing power. Inf. Sci. 660: 120131 (2024) - [j22]Xiaofeng Xie, Jixin Zhang, Yuxuan Luo, Jing Gu, Yunfei Li:
Enterprise credit risk portrait and evaluation from the perspective of the supply chain. Int. Trans. Oper. Res. 31(4): 2765-2795 (2024) - [j21]Jun-Tao Gong, Wadaka Mamai, Xiaohua Wang, Jian Zhu, Yongjun Li, Julian Liu, Qixian Tang, Yuanhui Huang, Jixin Zhang, Jiayi Zhou, Hamidou Maiga, Nanwintoum Séverin Bimbilé Somda, Claudia Martina, Simran Singh Kotla, Thomas Wallner, Jérémy Bouyer, Zhiyong Xi:
Upscaling the production of sterile male mosquitoes with an automated pupa sex sorter. Sci. Robotics 9(92) (2024) - 2023
- [j20]Jixin Zhang, Jiageng Chen:
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain. Comput. J. 66(4): 842-865 (2023) - [j19]Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng:
MLCT: A multi-level contact tracing scheme with strong privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [c17]Haiyun Li, Jixin Zhang, Ning Xu, Mingyu Liu:
FanoutNet: A Neuralized PCB Fanout Automation Method Using Deep Reinforcement Learning. AAAI 2023: 8554-8561 - [c16]Conghua Wei, Qianjun Zhang, Xiaobo Zhang, Yan Yang, Jixin Zhang, Donghai Zhai:
YOLOv5s-BSS: A Novel Deep Neural Network for Crack Detection of Road Damage. IEEE Big Data 2023: 1550-1554 - 2022
- [j18]Fuyuan Song, Zheng Qin, Liang Xue, Jixin Zhang, Xiaodong Lin, Xuemin Shen:
Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing. IEEE Internet Things J. 9(8): 6184-6198 (2022) - [j17]Hua Deng, Jixin Zhang, Zheng Qin, Qianhong Wu, Hui Yin, Aniello Castiglione:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 3024-3037 (2022) - [j16]Zisang Xu, Wei Liang, Kuan-Ching Li, Jianbo Xu, Albert Y. Zomaya, Jixin Zhang:
A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Trans. Ind. Informatics 18(10): 7118-7127 (2022) - [c15]Jixin Zhang, Ke Cheng, Giuliano Sovernigo, Xiaodong Lin:
A Heterogeneous Feature Ensemble Learning based Deepfake Detection Method. ICC 2022: 2084-2089 - 2021
- [j15]Xiaofeng Huang, Jixin Zhang, Zisang Xu, Lu Ou, Jianbin Tong:
A knowledge graph based question answering method for medical domain. PeerJ Comput. Sci. 7: e667 (2021) - [j14]Kaiming Chen, Jiageng Chen, Jixin Zhang:
Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging. Sensors 21(4): 1058 (2021) - [j13]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Keqin Li:
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 9(1): 27-39 (2021) - [j12]Yang Xu, Xiaodan Yan, Yulei Wu, Yupeng Hu, Wei Liang, Jixin Zhang:
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 2946-2957 (2021) - [j11]Qing Ye, Yanan Sun, Jixin Zhang, Jiancheng Lv:
A Distributed Framework for EA-Based NAS. IEEE Trans. Parallel Distributed Syst. 32(7): 1753-1764 (2021) - [j10]Fuyuan Song, Zheng Qin, Dongxiao Liu, Jixin Zhang, Xiaodong Lin, Xuemin Shen:
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing. IEEE Trans. Veh. Technol. 70(7): 7161-7175 (2021) - [c14]Jixin Zhang, Jiageng Chen:
Practical and Provable Secure Vehicular Component Protection Scheme. EISA 2021: 1-20 - [c13]Haiyun Li, Ning Xu, Genggeng Liu, Jixin Zhang:
An optimized 3D Astar algorithm for multi-layer PCB automatic routing. ICCE-TW 2021: 1-2 - [c12]Jixin Zhang, Jiageng Chen, Weizhi Meng:
Efficient Attribute-Based Signature for Monotone Predicates. ProvSec 2021: 346-362 - 2020
- [j9]Hui Yin, Jixin Zhang, Zheng Qin:
A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm. Int. J. Comput. Sci. Eng. 21(1): 19-29 (2020) - [j8]Hui Yin, Zheng Qin, Jixin Zhang, Hua Deng, Fangmin Li, Keqin Li:
A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing. J. Parallel Distributed Comput. 135: 56-69 (2020) - [j7]Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distributed Comput. 135: 127-139 (2020) - [j6]Zisang Xu, Feng Li, Han Deng, Minfu Tan, Jixin Zhang, Jianbo Xu:
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol. Sensors 20(17): 4835 (2020) - [c11]Zisang Xu, Feng Li, Minfu Tan, Jixin Zhang:
A Blockchain-Based Distributed Authentication and Dynamic Group Key Agreement Protocol. BlockSys 2020: 142-151 - [c10]Fuyuan Song, Zheng Qin, Jixin Zhang, Dongxiao Liu, Jinwen Liang, Xuemin Sherman Shen:
Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j5]Hui Yin, Jixin Zhang, Yinqiao Xiong, Lu Ou, Fangmin Li, Shaolin Liao, Keqin Li:
CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme. IEEE Access 7: 5682-5694 (2019) - [j4]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Kehuan Zhang:
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84: 376-392 (2019) - [j3]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Fangmin Li, Keqin Li:
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners. Future Gener. Comput. Syst. 100: 689-700 (2019) - [c9]Jixin Zhang, Mohammad Faham Khan, Xiaodong Lin, Zheng Qin:
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants. DSC 2019: 1-8 - 2018
- [j2]Jixin Zhang, Zheng Qin, Kehuan Zhang, Hui Yin, Jingfu Zou:
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features. IEEE Access 6: 51964-51974 (2018) - [j1]Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin, Qixin Wu:
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. Cybersecur. 1(1): 10 (2018) - 2017
- [c8]Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. SecureComm 2017: 808-822 - [c7]Zejun Niu, Zheng Qin, Jixin Zhang, Hui Yin:
Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix. SpaCCS Workshops 2017: 757-766 - 2016
- [c6]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu:
Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. ICCCN 2016: 1-9 - [c5]Cheng Wang, Zheng Qin, Jixin Zhang, Hui Yin:
A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm. ICNC-FSKD 2016: 481-487 - [c4]Hui Yin, Zheng Qin, Jixin Zhang, Wenjie Li, Lu Ou, Yupeng Hu, Keqin Li:
Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing. ICPADS 2016: 761-768 - [c3]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Yupeng Hu:
IRMD: Malware Variant Detection Using Opcode Image Recognition. ICPADS 2016: 1175-1180 - 2015
- [c2]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong:
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data. ICA3PP (3) 2015: 667-681 - 2013
- [c1]Jixin Zhang, Ning Xu, Yuchun Ma, Yu Wang, Jinian Bian:
Data dependency aware prefetch scheduling for Dynamic Partial reconfigurable designs. ASICON 2013: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint