Hong Xiang
Orcid: 0000-0001-6012-2921
According to our database1,
Hong Xiang
authored at least 37 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Novel Wind Power Prediction Scheme by Coupling the BP Neural Network Model with the Fireworks Algorithm.
Scalable Comput. Pract. Exp., 2024
Predicting Elimination of Small-Molecule Drug Half-Life in Pharmacokinetics Using Ensemble and Consensus Machine Learning Methods.
J. Chem. Inf. Model., 2024
2023
An efficient neural architecture search based deep learning algorithm for surface defects detection of T-beam.
Int. J. Embed. Syst., 2023
2022
EAI Endorsed Trans. Scalable Inf. Syst., 2022
Optimal control of TB transmission based on an age structured HIV-TB co-infection model.
J. Frankl. Inst., 2022
Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes.
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
2020
J. Inf. Secur. Appl., 2020
Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in Networks.
IEEE Access, 2020
2019
Success factors influencing requirements change management process in global software development.
J. Comput. Lang., 2019
Multi-Scale Vehicle Detection for Foreground-Background Class Imbalance with Improved YOLOv2.
Sensors, 2019
Multim. Tools Appl., 2019
Dynamics for an SIRS epidemic model with infection age and relapse on a scale-free network.
J. Frankl. Inst., 2019
IEEE Access, 2019
Forward Engineering Completeness for Software by Using Requirements Validation Framework (S).
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019
Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Improving the Quality of Software Development Process by Introducing a New Methodology-AZ-Model.
IEEE Access, 2018
Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model.
IEEE Access, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
Hopf bifurcation for a delayed predator-prey diffusion system with Dirichlet boundary condition.
Appl. Math. Comput., 2017
2016
Approaches to access control policy comparison and the inter-domain role mapping problem.
Inf. Technol. Control., 2016
2015
Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm.
Sensors, 2015
Semantic modelling and automated reasoning of non-functional requirement conflicts in the context of softgoal interdependencies.
IET Softw., 2015
Finite Fields Their Appl., 2015
2014
Dynamics of the deterministic and stochastic SIQS epidemic model with non-linear incidence.
Appl. Math. Comput., 2014
Stability in a predator-prey model with Crowley-Martin function and stage structure for prey.
Appl. Math. Comput., 2014
2011
J. Networks, 2011
Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies.
IET Commun., 2011
A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology.
J. Res. Pract. Inf. Technol., 2011
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases.
Proceedings of the WOSIS 2011, 2011
2007
Proceedings of the Third International Conference on Natural Computation, 2007
1994
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994