Xiujie Zhang

Orcid: 0000-0001-8951-3280

According to our database1, Xiujie Zhang authored at least 17 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Constructions of optimal low hit zone frequency hopping sequence sets with large family size.
Adv. Math. Commun., 2024

2021
Multiway dynamic mask attention networks for natural language inference.
J. Comput. Methods Sci. Eng., 2021

2020
Omnichannel operations with ship-from-store.
Oper. Res. Lett., 2020

A neural joint model for rating prediction recommendation.
J. Comput. Methods Sci. Eng., 2020

Quick response and omnichannel retail operations with the ship-to-store program.
Int. Trans. Oper. Res., 2020

Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network.
Int. J. Distributed Sens. Networks, 2020

2017
An affinity propagation-based multiobjective evolutionary algorithm for selecting optimal aiming points of missiles.
Soft Comput., 2017

EGIP: An efficient group identification protocol in roaming network.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
Self-organizing multiobjective optimization based on decomposition with neighborhood ensemble.
Neurocomputing, 2016

Bilinear-pairing based two-party identification protocol in wireless sensor network.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

2015
A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update.
Int. J. Netw. Secur., 2015

2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2011
A new hybrid method for nonlinear complementarity problems.
Comput. Optim. Appl., 2011

2010
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010


  Loading...