Xiaotong Fu

According to our database1, Xiaotong Fu authored at least 22 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An ensemble deep learning model for risk stratification of invasive lung adenocarcinoma using thin-slice CT.
npj Digit. Medicine, 2023

Adaptive Fusion of Radiomics and Deep Features for Lung Adenocarcinoma Subtype Recognition.
CoRR, 2023

High-risk Factor Prediction in Lung Cancer Using Thin CT Scans: An Attention-Enhanced Graph Convolutional Network Approach.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Piezoresistive Conductive Microfluidic Membranes for Low-Cost On-Chip Pressure and Flow Sensing.
Sensors, 2022

2020
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
A new revocable reputation evaluation system based on blockchain.
Int. J. High Perform. Comput. Netw., 2019

A new approximate image verification mechanism in cloud computing.
Int. J. Embed. Syst., 2019

FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Verifiable memory leakage-resilient dynamic searchable encryption.
J. High Speed Networks, 2018

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks.
Int. J. Distributed Sens. Networks, 2018

2017
Visibility Analysis on Swing Motion of the Golf Player Based on Kinect.
Proceedings of the Digital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Ergonomics and Design, 2017

2013
Designated verifier ring signature and ring signcryption.
Int. J. Intell. Inf. Database Syst., 2013

Ternary Method in Elliptic Curve Scalar Multiplication.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

IDPKC-to-TPKC Construction of Multi-receiver Signcryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Efficient Tripartite Identity-Based Authenticated Key Agreement Protocol.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Cryptanalysis of an Efficient Three-Party Key Exchange Protocol.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Lightweight RFID Mutual Authentication Protocol with Ownership Transfer.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
Forgery Attacks on Two Pairing-Based Proxy Signature Schemes.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

2007
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length <i>pq</i>.
J. Comput. Sci. Technol., 2007

2005
On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Forgery Attacks on Chang et al.'s signature scheme with message recovery.
IACR Cryptol. ePrint Arch., 2004


  Loading...