default search action
Yuting Xiao
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang:
Honey password vaults tolerating leakage of both personally identifiable information and passwords. Cybersecur. 7(1): 42 (2024) - [c15]Yuting Xiao, Jiongyi Chen, Yupeng Hu, Jing Huang:
FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis. DSN 2024: 495-506 - [c14]Yifei Gao, Jie Ou, Lei Wang, Yuting Xiao, Xiangzhiyuan Xiangzhiyuan, Ruiting Dai, Jun Cheng:
Compensate Quantization Errors: Make Weights Hierarchical to Compensate Each Other. NAACL-HLT (Findings) 2024: 2711-2722 - [i8]Yuting Xiao, Xuan Wang, Jiafei Li, Hongrui Cai, Yanbo Fan, Nan Xue, Minghui Yang, Yujun Shen, Shenghua Gao:
Bridging 3D Gaussian and Mesh for Freeview Video Rendering. CoRR abs/2403.11453 (2024) - [i7]Yifei Gao, Jie Ou, Lei Wang, Yuting Xiao, Zhiyuan Xiang, Ruiting Dai, Jun Cheng:
Compensate Quantization Errors: Make Weights Hierarchical to Compensate Each Other. CoRR abs/2406.16299 (2024) - 2023
- [j9]Xusen Cheng, Xiaowen Huang, Bo Yang, Yuting Xiao:
Unveiling the paradox of technostress: Impacts of technology-driven stressors on the elderly's avoidance behaviors. Inf. Manag. 60(8): 103875 (2023) - [c13]Huan Zou, Yuting Xiao, Rui Zhang:
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. ICICS 2023: 215-234 - [i6]Yuting Xiao, Jingwei Xu, Zehao Yu, Shenghua Gao:
DebSDF: Delving into the Details and Bias of Neural Indoor Scene Reconstruction. CoRR abs/2308.15536 (2023) - [i5]Huan Zou, Yuting Xiao, Rui Zhang:
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. IACR Cryptol. ePrint Arch. 2023: 1159 (2023) - 2022
- [j8]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao, Hui Ma:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 3592-3606 (2022) - [j7]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. IEEE Trans. Inf. Forensics Secur. 17: 2746-2760 (2022) - [j6]Kang Zhou, Jing Li, Yuting Xiao, Jianlong Yang, Jun Cheng, Wen Liu, Weixin Luo, Jiang Liu, Shenghua Gao:
Memorizing Structure-Texture Correspondence for Image Anomaly Detection. IEEE Trans. Neural Networks Learn. Syst. 33(6): 2335-2349 (2022) - [c12]Ivan Liu, Yuting Xiao, Fangyuan Liu, Shuming Wu, Shiguang Ni:
Assessing the Effectiveness of Using Chatbots for Positive Psychological Intervention: A Randomized Control Study. CCHI 2022: 227-234 - [i4]Yuting Xiao, Jiale Xu, Shenghua Gao:
TaylorImNet for Fast 3D Shape Reconstruction Based on Implicit Surface Function. CoRR abs/2201.06845 (2022) - 2021
- [c11]Yuting Xiao, Yanyu Xu, Ziming Zhong, Weixin Luo, Jiawei Li, Shenghua Gao:
Amodal Segmentation Based on Visible Region Segmentation and Shape Prior. AAAI 2021: 2995-3003 - [c10]Yuting Xiao, Rui Zhang, Hui Ma:
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. ASIACRYPT (4) 2021: 742-772 - 2020
- [j5]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j4]Tianyang Zhang, Jun Cheng, Huazhu Fu, Zaiwang Gu, Yuting Xiao, Kang Zhou, Shenghua Gao, Rui Zheng, Jiang Liu:
Noise Adaptation Generative Adversarial Network for Medical Image Analysis. IEEE Trans. Medical Imaging 39(4): 1149-1159 (2020) - [j3]Tianyang Miller, Jun Cheng, Huazhu Fu, Zaiwang Gu, Yuting Xiao, Kang Zhou, Shenghua Gao, Ru Zheng, Jiang Liu:
Correction to "Noise Adaptation Generative Adversarial Network for Medical Image Analysis". IEEE Trans. Medical Imaging 39(7): 2566-2567 (2020) - [c9]Rui Zhang, Huan Zou, Cong Zhang, Yuting Xiao, Yang Tao:
Distributed Key Generation for SM9-Based Systems. Inscrypt 2020: 113-129 - [c8]Yuting Xiao, Rui Zhang, Hui Ma:
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model. CT-RSA 2020: 171-198 - [c7]Kang Zhou, Yuting Xiao, Jianlong Yang, Jun Cheng, Wen Liu, Weixin Luo, Zaiwang Gu, Jiang Liu, Shenghua Gao:
Encoding Structure-Texture Relation with P-Net for Anomaly Detection in Retinal Images. ECCV (20) 2020: 360-377 - [c6]Yuting Xiao, Shenghua Gao, Zhenjie Chai, Kang Zhou, Tianyang Zhang, Yitian Zhao, Jun Cheng, Jiang Liu:
Open-Set OCT Image Recognition with Synthetic Learning. ISBI 2020: 1788-1792 - [i3]Kang Zhou, Yuting Xiao, Jianlong Yang, Jun Cheng, Wen Liu, Weixin Luo, Zaiwang Gu, Jiang Liu, Shenghua Gao:
Encoding Structure-Texture Relation with P-Net for Anomaly Detection in Retinal Images. CoRR abs/2008.03632 (2020) - [i2]Yuting Xiao, Yanyu Xu, Ziming Zhong, Weixin Luo, Jiawei Li, Shenghua Gao:
Amodal Segmentation Based on Visible Region Segmentation and Shape Prior. CoRR abs/2012.05598 (2020)
2010 – 2019
- 2019
- [j2]Rui Zhang, Yuting Xiao, Shuzhou Sun, Hui Ma:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 16(4): 625-634 (2019) - [c5]Tianyang Zhang, Huazhu Fu, Yitian Zhao, Jun Cheng, Mengjie Guo, Zaiwang Gu, Bing Yang, Yuting Xiao, Shenghua Gao, Jiang Liu:
SkrGAN: Sketching-Rendering Unconditional Generative Adversarial Networks for Medical Image Synthesis. MICCAI (4) 2019: 777-785 - [i1]Tianyang Zhang, Huazhu Fu, Yitian Zhao, Jun Cheng, Mengjie Guo, Zaiwang Gu, Bing Yang, Yuting Xiao, Shenghua Gao, Jiang Liu:
SkrGAN: Sketching-rendering Unconditional Generative Adversarial Networks for Medical Image Synthesis. CoRR abs/1908.04346 (2019) - 2018
- [c4]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c3]Zhen He, Yongchun Fang, Xiao Liang, He Lin, Yuting Xiao, Xuebo Zhang:
A Time-optimal Trajectory Generation Algorithm for Quadrotors with Various States Constraints. ICARM 2018: 880-885 - [c2]Yuting Xiao, Yongchun Fang, Xiao Liang, He Lin, Zhen He, Xingang Zhao:
Distributed Area Partitioning for Multi-UAVs in Cooperative Monitoring Task. ROBIO 2018: 1789-1794 - [c1]Yunhao Zheng, Xi Zhang, Yuting Xiao:
Making the Most Cost-effective Decision in Online Paid Q&A Community: An Expert Recommender System with Motivation Modeling and Knowledge Pricing. WWW (Companion Volume) 2018: 365-372 - 2017
- [j1]Yuting Xiao, Xi Zhang, Patricia Ordóñez de Pablos:
How does individuals' exchange orientation moderate the relationship between transformational leadership and knowledge sharing? J. Knowl. Manag. 21(6): 1622-1639 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint