Xu Huang

Affiliations:
  • University of Canberra, ESTEM Faculty, ACT, Australia


According to our database1, Xu Huang authored at least 90 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Cortical Network Response to Acupuncture and the Effect of the Hegu Point: An fNIRS Study.
Sensors, 2019

2017
Exploring the use of optical flow for the study of functional NIRS signals.
Proceedings of the Medical Imaging 2017: Biomedical Applications in Molecular, 2017

fNIRS Approach to Pain Assessment for Non-verbal Patients.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A Computational Investigation of an Active Region in Brain Network Based on Stimulations with Near-Infrared Spectroscopy.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Physiological fluctuations show frequency-specific networks in fNIRS signals during resting state.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
Cortical activation investigation by optical flow and wavelet analysis using near-infrared spectroscopy.
Proceedings of the 6th IEEE International Conference on Biomedical Robotics and Biomechatronics, 2016

Effective algorithm for protecting WSNs from internal attacks in real-time.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Novel Information Processing for Image De-noising Based on Sparse Basis.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform.
Proceedings of the 7th International Conference on Emerging Trends in Engineering & Technology, 2015

2014
Extraction of lane markings using orientation and vanishing point constraints in structured road scenes.
Int. J. Comput. Math., 2014

Cluster validity index for adaptive clustering algorithms.
IET Commun., 2014

Smart integration of cloud computing and MCMC based secured WSN to monitor environment.
Proceedings of the 4th International Conference on Wireless Communications, 2014

A Novel Sphere-Based Maximum Margin Classification Method.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

A Novel Adaptive Shrinkage Threshold on Shearlet Transform for Image Denoising.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Novel Evaluation Index for Image Quality.
Proceedings of the 2014 International Conference on Digital Image Computing: Techniques and Applications, 2014

2013
Higher quality of infrared images for future network security systems.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Malicious node detection for the future network security from epistemic uncertainties.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

A cluster validity index based on frequent pattern.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Protecting wireless sensor networks from internal attacks based on uncertain decisions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN.
Proceedings of the 12th IEEE International Conference on Trust, 2013

EEG-Based Person Verification Using Multi-Sphere SVDD and UBM.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Human Identification with Electroencephalogram (EEG) for the Future Network Security.
Proceedings of the Network and System Security - 7th International Conference, 2013

Motor Imagery EEG-Based Person Verification.
Proceedings of the Advances in Computational Intelligence, 2013

Parallel Support Vector Data Description.
Proceedings of the Advances in Computational Intelligence, 2013

A general aggregate model for improving multi-class brain-computer interface systems' performance.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

EEG-Based Age and Gender Recognition Using Tensor Decomposition and Speech Features.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

A Novel Image Quality Index for Image Quality Assessment.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

A novel method of virtual network embedding based on topology convergence-degree.
Proceedings of the IEEE International Conference on Communications, 2013

Approximation-based Common Principal Component for feature extraction in multi-class Brain-Computer Interfaces.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Wavelet based denoising algorithm of the ECG signal corrupted by WGN and Poisson noise.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Human identification with electroencephalogram (EEG) signal processing.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Prolonging network lifetime in two-level heterogeneous Wireless Sensor Networks.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Time Domain Parameters for Online Feedback fNIRS-Based Brain-Computer Interface Systems.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Protecting an WSN from internal attack based on epistemic uncertainties.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Quantum cryptography based key distribution in WiFi networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

Timing control for protecting from internal attacks in wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

People Identification with RMS-Based Spatial Pattern of EEG Signal.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

2011
Performance analysis of QKD based key distribution for IEEE 802.11 networks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Novel Metrics for Face Recognition Using Local Binary Patterns.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

Quantum cryptography based Key Distribution in IEEE 802.11 networks - analysis on reconciliation phase.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Investigations for the simulations of a quantum key distribution in WiFi.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography.
Proceedings of the FUZZ-IEEE 2011, 2011

Classification of gender and face based on gradient faces.
Proceedings of the European Workshop on Visual Information Processing, 2011

Face recognition based on Gabor features.
Proceedings of the European Workshop on Visual Information Processing, 2011

Analysis of the Experimental Results for Quantum Key Distribution Cryptography in IEEE 802.11 Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

Protecting from Inside Attacks in Wireless Sensor Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Relation Learning - A New Approach to Face Recognition.
Proceedings of the Advances Concepts for Intelligent Vision Systems, 2011

2010
Australian Accent-Based Speaker Classification.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Automatic Speech-Based Classification of Gender, Age and Accent.
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2010

Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Fuzzy support vector machines for age and gender classification.
Proceedings of the 11th Annual Conference of the International Speech Communication Association, 2010

Quantum Cryptography based Key Distribution in Wi-Fi Networks - Protocol Modifications in IEEE 802.11.
Proceedings of the ICSOFT 2010, 2010

Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Fuzzy Switching Controller for the Security in 802.11 Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

Multi-Agent Systems in Quantum Security for Modern Wireless Networks.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

E-health Services with Secure Mobile Agent.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Novel Protocol and Its Implementation QKD in Wi-Fi Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

RFID Technology and Crowded Event Management.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
A Multi-agent Architecture for RFID Taxonomy.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Adaptive Binary Splitting for a RFID Tag Collision Arbitration Via Multi-agent Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A New Efficient Transmission for XML Data on Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Dynamic Adaptive Threshold Transmission for XML Data on Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Investigating Security in Multi-tree Based Technique in RFID Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Dynamic Threshold Technique for XML Data Transmission on Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

An Improved ALOHA Algorithm for RFID Tag Identification.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator.
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006

2005
Evaluating the Size of the SOAP for Integration in B2B.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Investigating the Transport Communicating Rates of Wireless Networks over Fading Channels.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Image Multi-noise Removal via Lévy Process Analysis.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Image multi-noise removal by wavelet-based Bayesian estimator.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
Multi-noise removal from images by wavelet-based Bayesian estimator.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Noises removal for images by wavelet-based Bayesian estimator via Levy process analysis.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
Image noises removal on alpha-stable via Bayesian estimator.
Proceedings of the Seventh International Symposium on Signal Processing and Its Applications, 2003

Wavelet-based Bayesian estimator for Poisson noise removal from images.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Maximum likelihood for Bayesian estimator based on α-stable for image.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002


  Loading...