default search action
Xiaolin Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Baoyin Zhang, Zeyao Mo, Xin Wang, Wei Wang, Gang Li, Aiqing Zhang, Xiaolin Cao:
JCOGIN: a programming framework for particle transport on combinatorial geometry. J. Supercomput. 77(10): 11270-11287 (2021)
2010 – 2019
- 2018
- [c12]Chiman Kwan, Laszlo B. Kish, Yessica Saez, Xiaolin Cao:
Low Cost and Unconditionally Secure Communications for Complex UAS Networks. IECON 2018: 5895-5900 - 2017
- [c11]Guangyan Li, Caixia Zheng, Tingfa Xu, Xiaolin Cao, Xingpeng Mao, Shuangwei Wang:
A Threshold Denoising Algorithm Based on Mathematical Morphology for Speech Enhancement. CSPS 2017: 1776-1784 - 2016
- [j5]Xiaolin Cao, Ciara Moore, Máire O'Neill, Elizabeth O'Sullivan, Neil Hanley:
Optimised Multiplication Architectures for Accelerating Fully Homomorphic Encryption. IEEE Trans. Computers 65(9): 2794-2806 (2016) - 2015
- [j4]Xu Liu, Zeyao Mo, Hengbin An, Xiaolin Cao, Aiqing Zhang:
一种基于实测的自动负载建模算法 (Automatic Load Modeling Algorithm Based on Real Time Measuring). 计算机科学 42(1): 63-66 (2015) - 2014
- [c10]Xiaolin Cao, Ciara Moore, Máire O'Neill, Neil Hanley, Elizabeth O'Sullivan:
High-Speed Fully Homomorphic Encryption Over the Integers. Financial Cryptography Workshops 2014: 169-180 - [c9]Xiaolin Cao, Aiqing Zhang, Qingkai Liu:
Software Quality Assurance for the Development of JASMIN Infrastructure. ICSOFT EA 2014: 439-444 - [i3]Yessica Saez, Xiaolin Cao, Laszlo B. Kish, G. Pesti:
Securing vehicle communication systems by the KLJN key exchange protocol. CoRR abs/1404.1900 (2014) - [i2]Xiaolin Cao, Yessica Saez, G. Pesti, Laszlo B. Kish:
On KLJN-based secure key distribution in vehicular communication networks. CoRR abs/1409.5911 (2014) - 2013
- [j3]Li Xiao, Zhiwei Ai, Xiaolin Cao:
A Patch-Based Data Reorganization Method for Coupling Large-Scale Simulations and Parallel Visualization. Trans. Edutainment 9: 278-289 (2013) - [c8]Ciara Moore, Neil Hanley, John McAllister, Máire O'Neill, Elizabeth O'Sullivan, Xiaolin Cao:
Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE. Financial Cryptography Workshops 2013: 226-237 - [c7]Xiaolin Cao, Zeyao Mo, Aiqing Zhang:
Component-based Parallel Programming for Peta-scale Particle Simulations. ICSOFT 2013: 334-339 - [i1]Xiaolin Cao, Ciara Moore, Máire O'Neill, Elizabeth O'Sullivan, Neil Hanley:
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction. IACR Cryptol. ePrint Arch. 2013: 616 (2013) - 2012
- [c6]Xiaolin Cao, Máire O'Neill:
Application-oriented SHA-256 hardware design for low-cost RFID. ISCAS 2012: 1412-1415 - 2011
- [j2]Xiaolin Cao, Zeyao Mo, Xu Liu, Xiaowen Xu, Aiqing Zhang:
Parallel implementation of fast multipole method based on JASMIN. Sci. China Inf. Sci. 54(4): 757-766 (2011) - [c5]Xiaolin Cao, Máire O'Neill:
A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . SECRYPT 2011: 287-292 - [c4]Xiaolin Cao, Máire O'Neill:
A Private and Scalable Authentication for RFID Systems Using Reasonable Storage. TrustCom 2011: 373-380 - 2010
- [j1]Zeyao Mo, Aiqing Zhang, Xiaolin Cao, Qingkai Liu, Xiaowen Xu, Hengbin An, Wenbing Pei, Shaoping Zhu:
JASMIN: a parallel software infrastructure for scientific computing. Frontiers Comput. Sci. China 4(4): 480-488 (2010) - [c3]Xiaolin Cao, Shuangwei Wang, Xiaobo Shen, Zhigang Wei:
The research on wavelet-based coin-tap nondestructive testing of carbon electrode. ICNC 2010: 728-732
2000 – 2009
- 2006
- [c2]Zeyao Mo, Aiqing Zhang, Xiaolin Cao:
Towards a parallel framework of grid-based numerical algorithms on DAGs. IPDPS 2006 - 2004
- [c1]Xiaolin Cao, Zeyao Mo:
A New Scalable Parallel Method for Molecular Dynamics Based on Cell-Block Data Structure. ISPA 2004: 757-764
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint