Xiao Zhang

Orcid: 0000-0003-4927-5016

Affiliations:
  • Beihang University, School of Mathematics and Systems Science, Beijing, China


According to our database1, Xiao Zhang authored at least 31 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Integrated Task Assignment and Trajectory Planning for a Massive Number of Agents Based on Bilayer-Coupled Mean Field Games.
IEEE Trans Autom. Sci. Eng., 2025

2024
Uncertainty modified policy for multi-agent reinforcement learning.
Appl. Intell., November, 2024

Hierarchical Cooperation in LQ Multi-Population Mean Field Game With Its Application to Opinion Evolution.
IEEE Trans. Netw. Sci. Eng., 2024

Adaptive trajectory-constrained exploration strategy for deep reinforcement learning.
Knowl. Based Syst., 2024

Preference-Guided Reinforcement Learning for Efficient Exploration.
CoRR, 2024

Trajectory-Oriented Policy Optimization with Sparse Rewards.
CoRR, 2024

Policy Optimization with Smooth Guidance Rewards Learned from Sparse-Reward Demonstrations.
CoRR, 2024

2023
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice.
Entropy, March, 2023

Differential Pricing Strategies for Bandwidth Allocation With LFA Resilience: A Stackelberg Game Approach.
IEEE Trans. Inf. Forensics Secur., 2023

Learning Diverse Policies with Soft Self-Generated Guidance.
Int. J. Intell. Syst., 2023

PINF: Continuous Normalizing Flows for Physics-Constrained Deep Learning.
CoRR, 2023

2022
A Mean-Field Game Control for Large-Scale Swarm Formation Flight in Dense Environments.
Sensors, 2022

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022

Cooperative attack-defense evolution of large-scale agents: a multi-population high-dimensional mean-field game approach.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

2021
Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Spatio-temporal heterogeneous bandwidth allocation mechanism against DDoS attack.
J. Netw. Comput. Appl., 2020

2019
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing.
Multim. Tools Appl., 2019

Identity-based proxy signature over NTRU lattice.
Int. J. Commun. Syst., 2019

Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation.
Concurr. Comput. Pract. Exp., 2019

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems.
Multim. Tools Appl., 2017

An efficient image encryption algorithm based on a novel chaotic map.
Multim. Tools Appl., 2017

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism.
KSII Trans. Internet Inf. Syst., 2017

Efficient Bloom filter for network protocols using AES instruction set.
IET Commun., 2017

TRIP: A Tussle-Resistant Internet Pricing Mechanism.
IEEE Commun. Lett., 2017

An Efficient Lattice-Based Proxy Signature with Message Recovery.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation.
Int. J. Comput. Math., 2016

DRDP: A DDoS-Resilient Data Pricing Mechanism.
IEEE Commun. Lett., 2016

2015
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

2012
Optimized statistical analysis of software trustworthiness attributes.
Sci. China Inf. Sci., 2012


  Loading...