Xianmin Wang

Orcid: 0000-0003-3480-8780

According to our database1, Xianmin Wang authored at least 101 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A spatiotemporal and motion information extraction network for action recognition.
Wirel. Networks, August, 2024

Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation.
IEEE Trans. Mob. Comput., August, 2024

Near-Real Prediction of Earthquake-Triggered Landslides on the Southeastern Margin of the Tibetan Plateau.
Remote. Sens., May, 2024

Optimal Granularity of Machine Learning Models: A Perspective of Granular Computing.
IEEE Trans. Fuzzy Syst., April, 2024

Unsupervised Deep Clustering Method for Coseismic Landslide Recognition Based on High-Resolution Images and Implicit Knowledge.
IEEE Trans. Geosci. Remote. Sens., 2024

Robust semi-supervised learning with reciprocal weighted mixing distribution alignment.
Eng. Appl. Artif. Intell., 2024

GDSNet: A gated dual-stream convolutional neural network for automatic recognition of coseismic landslides.
Int. J. Appl. Earth Obs. Geoinformation, 2024

2023
Near real-time spatial prediction of earthquake-induced landslides: A novel interpretable self-supervised learning method.
Int. J. Digit. Earth, December, 2023

A Novel Deep Learning Method for Automatic Recognition of Coseismic Landslides.
Remote. Sens., February, 2023

A Hidden Markov Model-based fuzzy modeling of multivariate time series.
Soft Comput., 2023

<i>AR</i><sup>2</sup><i>PNET</i>: an adversarially robust re-weighting prototypical network for few-shot learning.
Int. J. Embed. Syst., 2023

Feature evolvable learning with image streams.
Intell. Data Anal., 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

Experimental Comparison of Graph Edit Distance Computation Methods.
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023

A Survey of Privacy Preserving Subgraph Matching Methods.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
A Hierarchical Approach to Interpretability of TS Rule-Based Models.
IEEE Trans. Fuzzy Syst., 2022

Identification of Fuzzy Rule-Based Models With Collaborative Fuzzy Clustering.
IEEE Trans. Cybern., 2022

A Universal Detection Method for Adversarial Examples and Fake Images.
Sensors, 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

Contrastive distortion-level learning-based no-reference image-quality assessment.
Int. J. Intell. Syst., 2022

An effective and practical gradient inversion attack.
Int. J. Intell. Syst., 2022

Task-aware swapping for efficient DNN inference on DRAM-constrained edge systems.
Int. J. Intell. Syst., 2022

DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
Int. J. Intell. Syst., 2022

Generative Adversarial Training for Supervised and Semi-supervised Learning.
Frontiers Neurorobotics, 2022

Research and application of intrusion detection method based on hierarchical features.
Concurr. Comput. Pract. Exp., 2022

OR-AutoRec: An Outlier-Resilient Autoencoder-based Recommendation model.
Proceedings of the IEEE Smartworld, 2022

2021
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

Design of Interval Type-2 Information Granules Based on the Principle of Justifiable Granularity.
IEEE Trans. Fuzzy Syst., 2021

Identification of Fuzzy Rule-Based Models With Output Space Knowledge Guidance.
IEEE Trans. Fuzzy Syst., 2021

Aggregation of Order-2 Fuzzy Sets.
IEEE Trans. Fuzzy Syst., 2021

Generating transferable adversarial examples based on perceptually-aligned perturbation.
Int. J. Mach. Learn. Cybern., 2021

An improved anti-quantum MST3 public key encryption scheme for remote sensing images.
Enterp. Inf. Syst., 2021

3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

2020
Experimental Evaluation of Transformer Internal Fault Detection Based on V-I Characteristics.
IEEE Trans. Ind. Electron., 2020

Hyperplane Division in Fuzzy C-Means: Clustering Big Data.
IEEE Trans. Fuzzy Syst., 2020

Approximation of Fuzzy Sets by Interval Type-2 Trapezoidal Fuzzy Sets.
IEEE Trans. Cybern., 2020

Identity-based data storage scheme with anonymous key generation in fog computing.
Soft Comput., 2020

Adversarial attacks on deep-learning-based SAR image target recognition.
J. Netw. Comput. Appl., 2020

Adversarial attacks on deep-learning-based radar range profile target recognition.
Inf. Sci., 2020

Machine learning assisted OSP approach for improved QoS performance on 3D charge-trap based SSDs.
Int. J. Intell. Syst., 2020

Re-training and parameter sharing with the Hash trick for compressing convolutional neural networks.
Appl. Soft Comput., 2020

Super-Resolution Based Fingerprint Augment for Indoor WiFi Localization.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Clustering Homogeneous Granular Data: Formation and Evaluation.
IEEE Trans. Cybern., 2019

Random ensemble of fuzzy rule-based models.
Knowl. Based Syst., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. Univers. Comput. Sci., 2019

The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput., 2019

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019

A packet-reordering covert channel over VoLTE voice and video traffics.
J. Netw. Comput. Appl., 2019

A hierarchical group key agreement protocol using orientable attributes for cloud computing.
Inf. Sci., 2019

Multilevel similarity model for high-resolution remote sensing image registration.
Inf. Sci., 2019

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access, 2019

Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting.
IEEE Access, 2019

Design and Experiments of Electromagnetic Heating Forming Technology.
IEEE Access, 2019

Alternating Renewal Theory Based MAC-Layer Sensing Period Optimization in CRNs with Hybrid OFF/ON Channel State Length Distributions.
Proceedings of the 2019 Wireless Telecommunications Symposium, 2019

Signal Distribution Oriented Mean Functions in GPR based Fingerprint Augment.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Clustering of Information Granules in Hotspot Identification.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wirel. Commun. Mob. Comput., 2018

Online handwritten signature verification using feature weighting algorithm relief.
Soft Comput., 2018

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.
Secur. Commun. Networks, 2018

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018

Fuzzy classifiers with information granules in feature space and logic-based computing.
Pattern Recognit., 2018

An authenticated asymmetric group key agreement based on attribute encryption.
J. Netw. Comput. Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Netw. Comput. Appl., 2018

A payload-dependent packet rearranging covert channel for mobile VoIP traffic.
Inf. Sci., 2018

Optimization of MAC-Layer Sensing Based on Alternating Renewal Theory in Cognitive Radio Networks.
IEICE Trans. Commun., 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Granular Fuzzy Rule-Based Models: A Study in a Comprehensive Evaluation and Construction of Fuzzy Models.
IEEE Trans. Fuzzy Syst., 2017

A Novel Approach to Subpixel Land-Cover Change Detection Based on a Supervised Back-Propagation Neural Network for Remotely Sensed Images With Different Resolutions.
IEEE Geosci. Remote. Sens. Lett., 2017

Development of granular models through the design of a granular output spaces.
Knowl. Based Syst., 2017

From fuzzy rule-based models to their granular generalizations.
Knowl. Based Syst., 2017

Data reconstruction with information granules: An augmented method of fuzzy clustering.
Appl. Soft Comput., 2017

Sub-Pixel Mapping Based on MAP Model and Spatial Attraction Theory for Remotely Sensed Image.
IEEE Access, 2017

2016
Designing Fuzzy Sets With the Use of the Parametric Principle of Justifiable Granularity.
IEEE Trans. Fuzzy Syst., 2016

Adaptive pixel unmixing based on a fuzzy ARTMAP neural network with selective endmembers.
Soft Comput., 2016

Optimal allocation of information granularity in system modeling through the maximization of information specificity: A development of granular input space.
Appl. Soft Comput., 2016

Multi-sensor optical remote sensing image registration based on Line-Point Invariant.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

2015
Clustering in augmented space of granular constraints: A study in knowledge-based clustering.
Pattern Recognit. Lett., 2015

高分辨率遥感图像配准并行加速方法 (Parallel Acceleration Method for Very High Resolution Remote Sensing Image Registration).
计算机科学, 2015

A rule-based development of incremental models.
Int. J. Approx. Reason., 2015

Comparative analysis of logic operators: A perspective of statistical testing and granular computing.
Int. J. Approx. Reason., 2015

2013
Complex Networks Community Structure Division Algorithm Based on Multi-gene Families Encoding.
J. Comput., 2013

2011
Landslide Susceptibility Analysis Based on Data Field.
J. Softw., 2011

Second-Order Cone Programming Based Joint Design of OFDM Systems.
IEICE Trans. Commun., 2011

2010
Lithology Intelligent Analysis in Three Gorges Based on Remote Sensing Image.
J. Softw., 2010

2009
Spatial Forecast of Landslides in Three Gorges Based On Spatial Data Mining.
Sensors, 2009

2008
Efficient optimal and suboptimal radio resource allocation in OFDMA system.
IEEE Trans. Wirel. Commun., 2008

Stegonograhpy for High-Resolution Color Remote Sensing Image.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Semidefinite programming relaxation approach for multiuser detection of QAM signals.
IEEE Trans. Wirel. Commun., 2007

QAM-MIMO Signal Detection Using Semidefinite Programming Relaxation.
Proceedings of the Global Communications Conference, 2007

2006
Branch-and-Bound Approach to OFDMA Radio Resource Allocation.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

A Recursive Quadratic Programming Approach to Multiuser Detection for MC-CDMA System with M-QAM.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Multiuser detectors for synchronous DS-CDMA systems based on a recursive p-norm convex relaxation approach.
IEEE Trans. Circuits Syst. I Regul. Pap., 2005

Multiuser Detection for MC-CDMA System Using an RQP Approach.
IEICE Trans. Commun., 2005

A Novel Information Hiding Technique for Remote Sensing Image.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2003
A near-optimal multiuser detector for DS-CDMA systems using semidefinite programming relaxation.
IEEE Trans. Signal Process., 2003

2002
Subspace estimation-based constrained optimization method for multipath CDMA channels.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

2001
A near-optimal multiuser detector for CDMA channels using semidefinite programming relaxation.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001


  Loading...