default search action
Lingling Xu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Lingling Xu, Haoran Xie, Fu Lee Wang, Xiaohui Tao, Weiming Wang, Qing Li:
Contrastive sentence representation learning with adaptive false negative cancellation. Inf. Fusion 102: 102065 (2024) - [j56]Lingling Xu, Wei Xiong, Weining Yi, Wenyu Cui, Xiao Liu, Yuyao Wang:
Effect of Synchronous Atmospheric Correction on the Accuracy of High-Resolution Remote Sensing Indices Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 15102-15121 (2024) - [j55]Xieling Chen, Haoran Xie, Xiaohui Tao, Lingling Xu, Jingjing Wang, Hongning Dai, Fu Lee Wang:
A topic modeling-based bibliometric exploration of automatic summarization research. WIREs Data. Mining. Knowl. Discov. 14(5) (2024) - [j54]Lingling Xu, Zhiwei Sun, Wanhua Li, Hongyang Yan:
Delegatable searchable encryption with specified keywords for EHR systems. Wirel. Networks 30(5): 3547-3559 (2024) - [c21]Xu Ji, Hao-Tian Wu, Ting Cui, Yiqun Zhang, Lingling Xu:
FedGC: Federated Learning on Non-IID Data via Learning from Good Clients. PRCV (1) 2024: 181-194 - [i5]Lingling Xu, Haoran Xie, S. Joe Qin, Fu Lee Wang, Xiaohui Tao:
Exploring ChatGPT-based Augmentation Strategies for Contrastive Aspect-based Sentiment Analysis. CoRR abs/2409.11218 (2024) - 2023
- [j53]Jiahui Yao, Lingling Xu:
Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things. Comput. J. 66(12): 2948-2960 (2023) - [j52]Qin Li, Can Wang, Jiang Zhu, Lingling Xu, Zhiwei Sun:
Verifiable Multiparty Delegated Quantum Computation. Int. J. Intell. Syst. 2023: 1-17 (2023) - [j51]Xin Yang, Lingling Xu:
Some accelerated alternating proximal gradient algorithms for a class of nonconvex nonsmooth problems. J. Glob. Optim. 87(2): 939-964 (2023) - [j50]Lingling Xu, Weiming Wang:
Improving aspect-based sentiment analysis with contrastive learning. Nat. Lang. Process. J. 3: 100009 (2023) - [j49]Hao-Tian Wu, Yiu-Ming Cheung, Zhenwei Zhuang, Lingling Xu, Jiankun Hu:
Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing. IEEE Trans. Cybern. 53(6): 3688-3701 (2023) - [j48]Lingling Xu, Haoran Xie, Zongxi Li, Fu Lee Wang, Weiming Wang, Qing Li:
Contrastive Learning Models for Sentence Representations. ACM Trans. Intell. Syst. Technol. 14(4): 67:1-67:34 (2023) - [c20]Peiming Xu, Meiling Zheng, Lingling Xu:
Verifiable Secure Aggregation Protocol Under Federated Learning. AIS&P (1) 2023: 531-547 - [i4]Lingling Xu, Haoran Xie, Si-Zhao Joe Qin, Xiaohui Tao, Fu Lee Wang:
Parameter-Efficient Fine-Tuning Methods for Pretrained Language Models: A Critical Review and Assessment. CoRR abs/2312.12148 (2023) - 2022
- [j47]Xieling Chen, Gary Cheng, Fu Lee Wang, Xiaohui Tao, Haoran Xie, Lingling Xu:
Machine and cognitive intelligence for human health: systematic review. Brain Informatics 9(1): 5 (2022) - [j46]Wanhua Li, Lingling Xu, Yamin Wen, Fangguo Zhang:
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems. Comput. Stand. Interfaces 82: 103606 (2022) - [j45]Cixiao Wang, Lingling Xu, Hui Liu:
Exploring behavioural patterns of virtual manipulatives supported collaborative inquiry learning: Effect of device-student ratios and external scripts. J. Comput. Assist. Learn. 38(2): 392-408 (2022) - [j44]Yuxian Liu, Fagui Liu, Hao-Tian Wu, Jingfeng Yang, Kaihong Zheng, Lingling Xu, Xingfu Yan, Jiankun Hu:
RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing. J. Netw. Comput. Appl. 207: 103484 (2022) - [j43]Xiaoxi Jia, Lingling Xu:
A projection-like method for quasimonotone variational inequalities without Lipschitz continuity. Optim. Lett. 16(8): 2387-2403 (2022) - [j42]Lingling Xu, Wei Xiong, Weining Yi, Zhenwei Qiu, Xiao Liu, Dongying Zhang, Wei Fang, Zhengqiang Li, Weizhen Hou, Jun Lin, Zhongzheng Hu, Tao Wang, Wenyu Cui:
Synchronous Atmospheric Correction of High Spatial Resolution Images from Gao Fen Duo Mo Satellite. Remote. Sens. 14(17): 4427 (2022) - [c19]Yuan Zhao, Xin Tong, Zichong Zhu, Jianda Sheng, Lei Dai, Lingling Xu, Xuehai Xia, Yu Jiang, Jiao Li:
Rethinking Optical Flow Methods for Micro-Expression Spotting. ACM Multimedia 2022: 7175-7179 - 2021
- [j41]Jiawang Nie, Xindong Tang, Lingling Xu:
The Gauss-Seidel method for generalized Nash equilibrium problems of polynomials. Comput. Optim. Appl. 78(2): 529-557 (2021) - [j40]Lingling Xu, Ben Niu, Xianzhou Zhang, Yongtao He:
Dynamic Threshold of Carbon Phenology in Two Cold Temperate Grasslands in China. Remote. Sens. 13(4): 574 (2021) - [j39]Lingling Xu, Xiaofeng Chen, Fangguo Zhang, Wanhua Li, Hao-Tian Wu, Shaohua Tang, Yang Xiang:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. IEEE Trans. Dependable Secur. Comput. 18(6): 2941-2952 (2021) - 2020
- [j38]Hao Cai, Yanjia Chen, Lingling Xu, Khalid Elbaz, Chengdian Zhang:
Intelligent Building System for 3D Construction of Complex Brick Models. IEEE Access 8: 182506-182516 (2020) - [j37]Hao-Tian Wu, Qi Huang, Yiu-ming Cheung, Lingling Xu, Shaohua Tang:
Reversible contrast enhancement for medical images with background segmentation. IET Image Process. 14(2): 327-336 (2020) - [j36]Lingling Xu, Wanhua Li, Fangguo Zhang, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. IEEE Trans. Inf. Forensics Secur. 15: 2096-2109 (2020) - [c18]Lingling Xu, Yuzhong Chen, Kun Guo:
A Distributed Storage Middleware Based on HBase and Redis. ChineseCSCW 2020: 364-380
2010 – 2019
- 2019
- [j35]Hao-Tian Wu, Zhiyuan Yang, Yiu-Ming Cheung, Lingling Xu, Shaohua Tang:
High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction. IEEE Access 7: 62361-62371 (2019) - [j34]Charles Tapley Hoyt, Daniel Domingo-Fernández, Rana Aldisi, Lingling Xu, Kristian Kolpeja, Sandra Spalek, Esther Wollert, John A. Bachman, Benjamin M. Gyori, Patrick Greene, Martin Hofmann-Apitius:
Re-curation and rational enrichment of knowledge graphs in Biological Expression Language. Database J. Biol. Databases Curation 2019: baz068 (2019) - [j33]Xin Wang, Lingling Xu, Chen Ning:
Multi-feature local sparse representation for infrared pedestrian tracking. KSII Trans. Internet Inf. Syst. 13(3): 1464-1480 (2019) - [j32]Lingling Xu, Jin Li, Xiaofeng Chen, Wanhua Li, Shaohua Tang, Hao-Tian Wu:
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 128: 11-20 (2019) - 2017
- [j31]Xiaoyu Li, Shaohua Tang, Lingling Xu, Huaqun Wang, Jie Chen:
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems. IEEE Access 5: 393-405 (2017) - [j30]Xin Wang, Lingling Xu, Yuzhen Zhang, Chen Ning:
A novel hybrid method for robust infrared target detection. KSII Trans. Internet Inf. Syst. 11(10): 5006-5022 (2017) - [j29]Weiwei Lin, Siyao Xu, Jin Li, Lingling Xu, Zhiping Peng:
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput. 21(5): 1301-1314 (2017) - [j28]Lingling Xu, Yi Shen, Hock Chuan Chan:
Understanding Content Voting Based on Social Foraging Theory. IEEE Trans. Engineering Management 64(4): 574-585 (2017) - 2016
- [j27]Zhusong Liu, Jinman Luo, Lingling Xu:
A fine-grained attribute-based authentication for sensitive data stored in cloud computing. Int. J. Grid Util. Comput. 7(4): 237-244 (2016) - [j26]Zhengjun Jing, Guoping Jiang, Chunsheng Gu, Zhimin Yu, Lingling Xu:
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. J. Ambient Intell. Humaniz. Comput. 7(2): 153-161 (2016) - [j25]Lingling Xu, Fangguo Zhang, Willy Susilo, Yamin Wen:
Solutions to the anti-piracy problem in oblivious transfer. J. Comput. Syst. Sci. 82(3): 466-476 (2016) - [j24]Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu:
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. IEEE Trans. Computers 65(7): 2325-2331 (2016) - 2015
- [j23]Deliang Wang, Lingling Xu, Hock Chuan Chan:
Understanding the continuance use of social network sites: a computer self-efficacy perspective. Behav. Inf. Technol. 34(2): 204-216 (2015) - [j22]Hao Tang, Lingling Xu, Jing Sun, Yingjun Chen, Lei Zhou:
Modeling and optimization control of a demand-driven, conveyor-serviced production station. Eur. J. Oper. Res. 243(3): 839-851 (2015) - [j21]Yamin Wen, Zheng Gong, Lingling Xu:
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model. Inf. 6(4): 576-591 (2015) - [j20]Zhusong Liu, Hongyang Yan, Zhiqiang Lin, Lingling Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure. J. Univers. Comput. Sci. 21(3): 454-472 (2015) - [j19]Lingling Xu, Jin Li, Shaohua Tang, Joonsang Baek:
Server-Aided Verification Signature with Privacy for Mobile Computing. Mob. Inf. Syst. 2015: 626415:1-626415:11 (2015) - [j18]Zhiwei Sun, Jianping Yu, Ping Wang, Lingling Xu, Chun-Hui Wu:
Quantum private comparison with a malicious third party. Quantum Inf. Process. 14(6): 2125-2133 (2015) - [j17]Niu Liu, Shaohua Tang, Lingling Xu, Daojing He:
Analyses of several recently proposed group key management schemes. Secur. Commun. Networks 8(2): 136-148 (2015) - [j16]Baojiang Cui, Tingting Hou, Baolian Long, Lingling Xu:
Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language. Trans. Comput. Collect. Intell. 19: 32-44 (2015) - [j15]Zheli Liu, Chuan Fu, Jun Yang, Zhusong Liu, Lingling Xu:
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud. Trans. Comput. Collect. Intell. 19: 140-156 (2015) - [c17]Han Gang, Hongyang Yan, Lingling Xu:
Secure Image Deduplication in Cloud Storage. ICT-EurAsia/CONFENIS 2015: 243-251 - 2014
- [j14]Shaohua Tang, Lingling Xu:
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials. Future Gener. Comput. Syst. 30: 91-97 (2014) - [j13]Deren Han, Hongjin He, Lingling Xu:
A proximal parallel splitting method for minimizing sum of convex functions with linear constraints. J. Comput. Appl. Math. 256: 36-51 (2014) - [j12]Niu Liu, Shaohua Tang, Lingling Xu:
Yet another attack on the chinese remainder theorem-based hierarchical access control scheme. Secur. Commun. Networks 7(7): 1079-1095 (2014) - [j11]Lingling Xu, Fangguo Zhang, Shaohua Tang:
Timed-release oblivious transfer. Secur. Commun. Networks 7(7): 1138-1149 (2014) - [j10]Lingling Xu, Shaohua Tang:
Verifiable computation with access control in cloud computing. J. Supercomput. 69(2): 528-546 (2014) - [j9]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distributed Syst. 25(12): 3253-3263 (2014) - 2013
- [j8]Cuixia Cao, Deren Han, Lingling Xu:
A new partial splitting augmented Lagrangian method for minimizing the sum of three convex functions. Appl. Math. Comput. 219(10): 5449-5457 (2013) - [j7]Xingju Cai, Deren Han, Lingling Xu:
An improved first-order primal-dual algorithm with a new correction step. J. Glob. Optim. 57(4): 1419-1428 (2013) - [j6]Kai Wang, Deren Han, Lingling Xu:
A Parallel Splitting Method for Separable Convex Programs. J. Optim. Theory Appl. 159(1): 138-158 (2013) - [c16]Bin Liu, Hui Tian, Lingling Xu:
An efficient downlink packet scheduling algorithm for real time traffics in LTE systems. CCNC 2013: 364-369 - [c15]Wuqiang Shen, Shaohua Tang, Lingling Xu:
IBUOV, A Provably Secure Identity-Based UOV Signature Scheme. CSE 2013: 388-395 - [c14]Lingling Xu, Shaohua Tang:
Server-Aided Verification Signatures with Privacy. EIDWT 2013: 414-421 - [c13]Shaohua Tang, Lingling Xu:
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. NSS 2013: 549-562 - [c12]Jinghong Li, Hui Tian, Lingling Xu, Yao Huang:
An Optimized Random Access Algorithm for MTC Users over Wireless Networks. VTC Spring 2013: 1-5 - [c11]Linlin Sun, Hui Tian, Lingling Xu:
A joint energy-saving mechanism for M2M communications in LTE-based system. WCNC 2013: 4706-4711 - [i3]Niu Liu, Shaohua Tang, Lingling Xu:
Attacks and Comments on Several Recently Proposed Key Management Schemes. IACR Cryptol. ePrint Arch. 2013: 100 (2013) - [i2]Niu Liu, Shaohua Tang, Lingling Xu:
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme. IACR Cryptol. ePrint Arch. 2013: 132 (2013) - [i1]Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li:
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature. IACR Cryptol. ePrint Arch. 2013: 877 (2013) - 2012
- [j5]Yamin Wen, Fangguo Zhang, Lingling Xu:
Secret handshakes from ID-based message recovery signatures: A new generic approach. Comput. Electr. Eng. 38(1): 96-104 (2012) - [j4]Deren Han, Hongchao Zhang, Gang Qian, Lingling Xu:
An improved two-step method for solving generalized Nash equilibrium problems. Eur. J. Oper. Res. 216(3): 613-623 (2012) - [j3]Lingling Xu, Julian Lin, Hock Chuan Chan:
The Moderating Effects of Utilitarian and Hedonic Values on Information Technology Continuance. ACM Trans. Comput. Hum. Interact. 19(2): 12:1-12:26 (2012) - [j2]Julian Lin, Hock Chuan Chan, Lingling Xu:
A Tale of Four Functions in a Multifunctional Device: Extending Implementation Intention Theory. IEEE Trans. Prof. Commun. 55(1): 36-54 (2012) - [c10]Shaohua Tang, Lingling Xu:
Proxy Signature Scheme Based on Isomorphisms of Polynomials. NSS 2012: 113-125 - [c9]Lingling Xu, Hui Tian, Ziqiang Liu, Yao Huang, Haidong Yan:
A Novel Power Ramping Scheme of M2M for WCDMA Random Access Channel. VTC Fall 2012: 1-5 - 2011
- [j1]Xu Ma, Lingling Xu, Fangguo Zhang:
Oblivious transfer with timed-release receiver's privacy. J. Syst. Softw. 84(3): 460-464 (2011) - 2010
- [c8]Lingling Xu, Fangguo Zhang:
Oblivious Transfer with Complex Attribute-Based Access Control. ICISC 2010: 370-395
2000 – 2009
- 2009
- [c7]Huanxi Zhao, Lingling Xu:
A geometric non-linear interpolatory subdivision scheme via approximation scheme. CAD/Graphics 2009: 280-285 - 2008
- [c6]Lingling Xu, Chung Haur Koh, Hock Chuan Chan:
The Effect of Background Music-Induced Arousal on Online Consumer Search Behavior: Evaluating Search Performance and Experience. AMCIS 2008: 260 - [c5]Jinsheng Xiao, Lingling Xu, Benshun Yi, Wenjuan Xie:
The Improvement of C-V Level Set Method for Image Segmentation. CSSE (2) 2008: 1106-1109 - [c4]Deliang Wang, Lingling Xu, Hock Chuan Chan:
Understanding Users' Continuance of Facebook: The Role of General and Specific Computer Self-Efficacy. ICIS 2008: 168 - [c3]Yu Tong, Lingling Xu, Shanling Pan:
Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company. Information Technology in the Service Economy 2008: 379-381 - [c2]Lingling Xu, Mingqiang Wang:
New ID-Based Signatures without Trusted PKG. WKDD 2008: 589-593 - 2007
- [c1]Lingling Xu, Cheng Yi, Yunjie Xu:
Emotional Expression Online: the Impact of Task, Relationship and Personality Perception on Emoticon Usage in Instant Messenger. PACIS 2007: 79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint