Xiangsong Zhang

According to our database1, Xiangsong Zhang authored at least 17 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DepthParkNet: A 3D Convolutional Neural Network with Depth-Aware Coordinate Attention for PET-Based Parkinson's Disease Diagnosis.
Proceedings of the Advanced Intelligent Computing in Bioinformatics, 2024

2023
PET Tracer Conversion among Brain PET via Variable Augmented Invertible Network.
CoRR, 2023

Synthetic CT Generation via Variant Invertible Network for All-digital Brain PET Attenuation Correction.
CoRR, 2023

The changing rule of human bone density with aging based on a novel definition and mensuration of bone density with computed tomography.
CoRR, 2023

2022
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Identify glioma recurrence and treatment effects with triple-tracer PET/CT.
BMC Medical Imaging, 2021

2020
Constant-size ring signature scheme using multilinear maps.
Int. J. Embed. Syst., 2020

2017
Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update.
KSII Trans. Internet Inf. Syst., 2017

2016
Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Secur. Commun. Networks, 2016

2015
Revocable Identity-based Signcryption Scheme Without Random Oracles.
Int. J. Netw. Secur., 2015

Ring Signature Scheme from Multilinear Maps in the Standard Model.
Proceedings of the 10th International Conference on P2P, 2015

2013
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013

Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A trust region SQP-filter method for nonlinear second-order cone programming.
Comput. Math. Appl., 2012

2011
Provably secure multi-proxy signature scheme with revocation in the standard model.
Comput. Commun., 2011

2010
A non-interior-point smoothing method for variational inequality problem.
J. Comput. Appl. Math., 2010

Certificateless signcryption scheme in the standard model.
Inf. Sci., 2010


  Loading...