Zhiyan Xu
Orcid: 0000-0002-8443-8282
According to our database1,
Zhiyan Xu
authored at least 18 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
O-PRESS: Boosting OCT axial resolution with Prior guidance, Recurrence, and Equivariant Self-Supervision.
Medical Image Anal., 2025
2023
Sanitizable signature scheme with privacy protection for electronic medical data sharing.
Cyber Secur. Appl., December, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
2022
Learning Two-Stream CNN for Multi-Modal Age-Related Macular Degeneration Categorization.
IEEE J. Biomed. Health Informatics, 2022
2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021
2020
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios.
Wirel. Commun. Mob. Comput., 2020
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
2019
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019
2018
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018
Deterministic remote preparation of arbitrary multi-qubit equatorial states via two-qubit entangled states.
Quantum Inf. Process., 2018
Probabilistic teleportation via multi-parameter measurements and partially entangled states.
Quantum Inf. Process., 2018
2017
J. Supercomput., 2017
Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017
2016
Proceedings of the Provable Security, 2016
2013
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013
2006
Fault Detection Filter Design For Networked Control System With Communication Delays.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006