Search Results - "ZOU, Xukai"
-
1
Changes in Regional Heavy Rainfall Events in China during 1961–2012
Published in Advances in atmospheric sciences (01-05-2015)“…A new technique for identifying regional climate events, the Objective Identification Technique for Regional Extreme Events(OITREE), was applied to investigate…”
Get full text
Journal Article -
2
A Two-Stage Deanonymization Attack against Anonymized Social Networks
Published in IEEE transactions on computers (01-02-2014)“…Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the…”
Get full text
Journal Article -
3
An Objective Identification Technique for Regional Extreme Events
Published in Journal of climate (15-10-2012)“…An extreme weather and climate event does not only mean that an extreme occurs at an individual point (station), but more generally it has a certain impacted…”
Get full text
Journal Article -
4
Variations in droughts over China: 1951–2003
Published in Geophysical research letters (01-02-2005)“…The Palmer Drought Severity Index (PDSI) was calculated by using monthly air temperature and precipitation in China during the period 1951 to 2003. For the…”
Get full text
Journal Article -
5
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey
Published in IEEE access (2020)“…The internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them…”
Get full text
Journal Article -
6
State of China's climate in 2022
Published in Atmospheric and oceanic science letters = Daqi-he-haiyang-kexue-kuaibao (01-11-2023)“…China experienced a warm and dry climate in 2022. The average annual surface air temperature (SAT) was 10.51°C, which was the second highest since 1961. The…”
Get full text
Journal Article -
7
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method
Published in IEEE transactions on computers (01-04-2014)“…A large portion of system breaches are caused by authentication failure, either during the login process or in the post-authentication session; these failures…”
Get full text
Journal Article -
8
Severe Historical Droughts Carved on Rock in the Yangtze
Published in Bulletin of the American Meteorological Society (01-06-2020)“…The White Crane Ridge (WCR) Rock Fish, now submerged under the backwater of the Three Gorges Reservoir in the Yangtze River, are affirmed as one of the…”
Get full text
Journal Article -
9
An effective method for 3D geological modeling with multi-source data integration
Published in Computers & geosciences (01-02-2005)“…The existing 3D geological modeling systems rely heavily on large numbers of borehole and cross-section data. However, it is well known that the available…”
Get full text
Journal Article -
10
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Due to deep automation, the configuration of many Cloud infrastructures is static and homogeneous, which, while easing administration, significantly decreases…”
Get full text
Conference Proceeding -
11
New threats to health data privacy
Published in BMC bioinformatics (24-11-2011)“…Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering…”
Get full text
Journal Article -
12
State of the climate over the Three Gorges Region of the Yangtze River in 2018
Published in Atmospheric and oceanic science letters = Daqi-he-haiyang-kexue-kuaibao (02-01-2020)“…2018年长江三峡地区气温较常年偏高,降水量接近常年,暴雨日数少,风速偏大,相对湿度接近常年,酸雨弱.年内高温出现早,持续时间长,强度大;夏季出现阶段性伏旱;暴雨和强降水引发城市内涝…”
Get full text
Journal Article -
13
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
Published in Cryptography (01-09-2017)“…Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack…”
Get full text
Journal Article -
14
A taxonomy and comparison of remote voting schemes
Published in 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (01-08-2014)“…Remote voting has been an active research field for application of cryptographic techniques in the last two decades with many schemes and systems in…”
Get full text
Conference Proceeding -
15
Enhancing and Implementing Fully Transparent Internet Voting
Published in 2015 24th International Conference on Computer Communication and Networks (ICCCN) (01-08-2015)“…Voting over the internet has been the focus of significant research with the potential to solve many problems. Current implementations typically suffer from a…”
Get full text
Conference Proceeding -
16
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01-04-2014)“…E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated…”
Get full text
Conference Proceeding -
17
Relationship between vegetation coverage and spring dust storms over northern China
Published in Journal of Geophysical Research - Atmospheres (16-02-2004)“…On the basis of normalized difference vegetation index (NDVI) data from 1982 to 2001 and dust storm observations in China the relationship between vegetation…”
Get full text
Journal Article -
18
Temporal coverage based content distribution in heterogeneous smart device networks
Published in 2015 IEEE International Conference on Communications (ICC) (01-06-2015)“…The present work studies content distribution in heterogeneous smart device networks, in which all smartphones/ tablets can communicate through proximity…”
Get full text
Conference Proceeding -
19
Secure and privacy-preserving biometrics based active authentication
Published in 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (01-10-2012)“…User authentication is critical in preventing system breaches. Existing authentication approaches usually do a onetime log-in authentication, but rarely…”
Get full text
Conference Proceeding -
20
Biometrics-Based Authentication: A New Approach
Published in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) (01-07-2011)“…Authentication is a fundamental issue to any trust-oriented computing system and also a critical part in many security protocols. Performing authentication is…”
Get full text
Conference Proceeding