default search action
Zhengyou Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c39]Junhao Xu, Zhengyou Xia:
An Optimization Meta-heuristic Algorithm Based on Segment Routing. ICIIT 2022: 1-6 - 2021
- [c38]Jie Zhang, Zhengyou Xia:
A New Novel Label Propagation Algorithm. WISA 2021: 39-46 - 2020
- [c37]Guocheng Wang, Zhengyou Xia:
Label Propagation Algorithm Based on Topological Potential. APWeb/WAIM Workshops 2020: 131-143 - [c36]Yuantao Teng, Zhengyou Xia:
A Traffic Engineering Technology Based on Segment Routing in SDN. MSN 2020: 636-641
2010 – 2019
- 2019
- [c35]Saisai Liu, Zhengyou Xia:
A Two-Level Edge-Knowledge Learning Genetic Algorithm for Community Detection. CBD 2019: 156-161 - [c34]Qingqing Liu, Zhengyou Xia:
Multi-layer LSTM Network Statement Generation Based on Mixed Input. CBD 2019: 223-228 - [c33]Qingqing Liu, Zhengyou Xia:
Statement Generation Based on Big Data for Keyword Search. MLICOM 2019: 477-488 - [c32]Saisai Liu, Zhengyou Xia:
Non-negative Matrix Factorization with Community Kernel for Dynamic Community Detection. MLICOM 2019: 778-792 - 2018
- [c31]Xiaoxiang Zhu, Zhengyou Xia:
Local Community Detection Using Greedy Algorithm with Probability. ADMA 2018: 465-473 - [c30]Xiaoxiang Zhu, Zhengyou Xia:
An Improved Optimization of Link-Based Label Propagation Algorithm. ADMA 2018: 489-498 - [c29]Xiaoxiang Zhu, Zhengyou Xia:
Label Propagation Algorithm Based on Adaptive H Index. DMBD 2018: 53-64 - [c28]Xinran Fan, Ting Ao, Zhengyou Xia:
Address Allocation Scheme Based on Local MAC Address. ICCCS (1) 2018: 263-274 - 2017
- [c27]Yubing Mao, Zhengyou Xia:
Live Migration Among CloudBased on MOOSE Address. ICCCS (1) 2017: 251-261 - [c26]TianRen Ma, Zhengyou Xia, Fan Yang:
An Ant Colony Random Walk Algorithm for Overlapping Community Detection. IDEAL 2017: 20-26 - [c25]TianRen Ma, Zhengyou Xia:
A Community Detection Algorithm Based on Local Double Rings and Fireworks Algorithm. IDEAL 2017: 129-135 - 2016
- [c24]Xun Lu, Zhengyou Xia:
A Study of Age Distribution Inference in Sina Weibo. CBD 2016: 63-67 - [c23]Leiming Ma, Zhengyou Xia:
An FW-DTSS Based Approach for News Page Information Extraction. DMBD 2016: 227-234 - [c22]Xia Zhang, Zhengyou Xia, Jiandong Wang:
Local Community Detection Based on Bridges Ideas. DMBD 2016: 409-415 - [c21]Leiming Ma, Zhengyou Xia:
An FW-BF Based Approach on Elimination of Duplicated Web Pages. IDEAL 2016: 183-191 - 2015
- [c20]Bohai Yu, Xia Zhang, Zhengyou Xia:
News Event Detection Based Web Big Data. ICIC (2) 2015: 646-653 - 2014
- [j12]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
An FAR-SW based approach for webpage information extraction. Inf. Syst. Frontiers 16(5): 771-785 (2014) - 2013
- [j11]Zhan Bu, Zhengyou Xia, Jiandong Wang:
A sock puppet detection algorithm on virtual spaces. Knowl. Based Syst. 37: 366-377 (2013) - [j10]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network. Knowl. Based Syst. 50: 246-259 (2013) - [c19]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
Current Attitude Prediction Model Based on Game Theory. WISE (2) 2013: 469-478 - 2012
- [j9]Zhengyou Xia, Bu Zhan:
Community detection based on a semantic network. Knowl. Based Syst. 26: 30-39 (2012) - [c18]Kun Fang, Zhan Bu, Zhengyou Xia:
Segmentation of CAPTCHAs Based on Complex Networks. AICI 2012: 735-743 - [c17]Rui Yang, Zhan Bu, Zhengyou Xia:
Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis. WISM 2012: 543-550 - 2011
- [j8]Jiuchuan Jiang, Zhengyou Xia:
Cluster partition-based communication of multiagents: The model and analyses. Adv. Eng. Softw. 42(10): 807-814 (2011) - [c16]Zhengyou Xia, Hui Lu:
RVAB: Rational Varied-Depth Search in Siguo Game. AICI (3) 2011: 270-277 - [c15]Shou Quan, Bu Zhan, Zhengyou Xia:
Authentication of Online Authorship or Article Based on Hypothesis Testing Model. CSE 2011: 3-8 - [c14]Bu Zhan, Zhengyou Xia:
A Link Analysis Model Based on Online Social Networks. WISM (2) 2011: 319-326
2000 – 2009
- 2009
- [c13]Lailei Huang, Zhengyou Xia:
Measuring User Prestige and Interaction Preference on Social Network Site. ACIS-ICIS 2009: 1161-1166 - 2008
- [c12]Hui Lu, Zhengyou Xia:
AWT: Aspiration with Timer Search Algorithm in Siguo. Computers and Games 2008: 264-274 - 2007
- [j7]Zhengyou Xia, Yongping Zhu, Hui Lu:
Using the Loopy Belief Propagation in Siguo. J. Int. Comput. Games Assoc. 30(4): 209-220 (2007) - 2006
- [j6]Zhengyou Xia, Jian Wang:
DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network. Comput. Stand. Interfaces 28(6): 660-669 (2006) - [c11]Zhengyou Xia, Yongping Zhu, Hui Lu:
Evaluation Function for Siguo Game Based on Two Attitudes. FSKD 2006: 1322-1331 - 2005
- [j5]Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang:
Autonomous trust construction in multi-agent systems - a graph theory methodology. Adv. Eng. Softw. 36(2): 59-66 (2005) - [j4]Zhengyou Xia, Jian Wang, Yichuan Jiang:
Design Quality of Security Service Negotiation Protocol. Comput. Artif. Intell. 24(2): 149-165 (2005) - [j3]Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang:
An adaptive adjusting mechanism for agent distributed blackboard architecture. Microprocess. Microsystems 29(1): 9-20 (2005) - [j2]Yichuan Jiang, Zhengyou Xia, Shiyong Zhang:
A novel defense model for dynamic topology network based on mobile agent. Microprocess. Microsystems 29(6): 289-297 (2005) - [c10]Zhengyou Xia, Y. A. Hu, Jian Wang, Y. C. Jiang, X. L. Qin:
Analyze and Guess Type of Piece in the Computer Game Intelligent System. FSKD (2) 2005: 1174-1183 - [c9]Zhengyou Xia, Yichuan Jiang, Jian Wang:
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. ISI 2005: 640-641 - [c8]Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. ISPA Workshops 2005: 466-474 - 2004
- [j1]Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang:
Defend mobile agent against malicious hosts in migration itineraries. Microprocess. Microsystems 28(10): 531-546 (2004) - [c7]Zhengyou Xia, Yichuan Jiang:
A Novel Artificial Life Ecosystem Environment Model. ACRI 2004: 650-659 - [c6]Zhengyou Xia, Yichuan Jiang:
A Novel Grid Node-by-Node Security Model. GCC 2004: 356-363 - [c5]Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:
The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus. International Conference on Computational Science 2004: 591-598 - [c4]Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:
The construction of a novel agent fault-tolerant migration model. ISCC 2004: 1-6 - [c3]Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:
An access control policy for active networks. ISCC 2004: 369-374 - [c2]Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:
A Novel Policy and Information Flow Security Model for Active Network. ISI 2004: 42-55 - [c1]Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:
A Novel Autonomous Trust Management Model for Mobile Agents. ISI 2004: 56-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint