BibTeX records: Zhenxing Luo

download as .bib file

@inproceedings{DBLP:conf/spml/LuoZTYCYL19,
  author    = {Zhenxing Luo and
               Lulu Zhao and
               Wanyong Tian and
               Dan Yang and
               Yiyuan Chen and
               Jiabin Yu and
               Jianjun Li},
  title     = {Data Link Modeling and Simulation Based on {DEVS}},
  booktitle = {2nd International Conference on Signal Processing and Machine Learning,
               {SPML} 2019, Hangzhou, China, November, 27-29, 2019},
  pages     = {35--40},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372806.3374911},
  doi       = {10.1145/3372806.3374911},
  timestamp = {Thu, 23 Jan 2020 16:32:27 +0100},
  biburl    = {https://dblp.org/rec/conf/spml/LuoZTYCYL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengCYZLHY18,
  author    = {Shilian Zheng and
               Shichuan Chen and
               Lifeng Yang and
               Jiawei Zhu and
               Zhenxing Luo and
               Junjie Hu and
               Xiaoniu Yang},
  title     = {Big Data Processing Architecture for Radio Signals Empowered by Deep
               Learning: Concept, Experiment, Applications and Challenges},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {55907--55922},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2872769},
  doi       = {10.1109/ACCESS.2018.2872769},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/ZhengCYZLHY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/WangYL18,
  author    = {Jietai Wang and
               Xiaoniu Yang and
               Zhenxing Luo},
  title     = {A Parameter-Irrelevant Range-Based Normalized Wireless Positioning
               Algorithm},
  booktitle = {11th International Symposium on Computational Intelligence and Design,
               {ISCID} 2018, Hangzhou, China, December 8-9, 2018, Volume 2},
  pages     = {315--319},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/ISCID.2018.10173},
  doi       = {10.1109/ISCID.2018.10173},
  timestamp = {Fri, 28 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iscid/WangYL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/LiWLTL18,
  author    = {Jianjun Li and
               Chenyan Wang and
               Zhenxing Luo and
               Zhuo Tang and
               Haojie Li},
  editor    = {Klaus Schoeffmann and
               Thanarat H. Chalidabhongse and
               Chong{-}Wah Ngo and
               Supavadee Aramvith and
               Noel E. O'Connor and
               Yo{-}Sung Ho and
               Moncef Gabbouj and
               Ahmed Elgammal},
  title     = {Accurate Detection for Scene Texts with a Cascaded {CNN} Networks},
  booktitle = {MultiMedia Modeling - 24th International Conference, {MMM} 2018, Bangkok,
               Thailand, February 5-7, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10705},
  pages     = {36--47},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-73600-6\_4},
  doi       = {10.1007/978-3-319-73600-6\_4},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/conf/mmm/LiWLTL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenML16,
  author    = {Shuo Chen and
               Maode Ma and
               Zhenxing Luo},
  title     = {An authentication scheme with identity-based cryptography for {M2M}
               security in cyber-physical systems},
  journal   = {Secur. Commun. Networks},
  volume    = {9},
  number    = {10},
  pages     = {1146--1157},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1407},
  doi       = {10.1002/sec.1407},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/ChenML16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/YuLM15,
  author    = {Qixiang Yu and
               Zhenxing Luo and
               Paul S. Min},
  title     = {Intrusion detection in wireless sensor networks for destructive intruders},
  booktitle = {Asia-Pacific Signal and Information Processing Association Annual
               Summit and Conference, {APSIPA} 2015, Hong Kong, December 16-19, 2015},
  pages     = {68--75},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/APSIPA.2015.7415410},
  doi       = {10.1109/APSIPA.2015.7415410},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/apsipa/YuLM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChenML15,
  author    = {Shuo Chen and
               Maode Ma and
               Zhenxing Luo},
  title     = {An Authentication Framework for Multi-Domain Machine-to-Machine Communication
               in Cyber-Physical Systems},
  booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
               2015},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/GLOCOMW.2015.7414062},
  doi       = {10.1109/GLOCOMW.2015.7414062},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/globecom/ChenML15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CaoMLZL14,
  author    = {Jin Cao and
               Maode Ma and
               Hui Li and
               Yueyu Zhang and
               Zhenxing Luo},
  title     = {A Survey on Security Aspects for {LTE} and {LTE-A} Networks},
  journal   = {{IEEE} Commun. Surv. Tutorials},
  volume    = {16},
  number    = {1},
  pages     = {283--302},
  year      = {2014},
  url       = {https://doi.org/10.1109/SURV.2013.041513.00174},
  doi       = {10.1109/SURV.2013.041513.00174},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/comsur/CaoMLZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LuoML13,
  author    = {Zhenxing Luo and
               Paul S. Min and
               Shu{-}Jun Liu},
  title     = {Target Localization in Wireless Sensor Networks for Industrial Control
               with Selected Sensors},
  journal   = {Int. J. Distributed Sens. Networks},
  volume    = {9},
  year      = {2013},
  url       = {https://doi.org/10.1155/2013/304631},
  doi       = {10.1155/2013/304631},
  timestamp = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdsn/LuoML13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/LuoM13,
  author    = {Zhenxing Luo and
               Paul S. Min},
  title     = {Survey of sensor selection methods in wireless sensor networks},
  booktitle = {19th {IEEE} International Conference on Networks, {ICON} 2013, Singapore,
               December 11-13, 2013},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/ICON.2013.6781987},
  doi       = {10.1109/ICON.2013.6781987},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/icon/LuoM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/LuoM13a,
  author    = {Zhenxing Luo and
               Paul S. Min},
  title     = {Survey of target localization methods in wireless sensor networks},
  booktitle = {19th {IEEE} International Conference on Networks, {ICON} 2013, Singapore,
               December 11-13, 2013},
  pages     = {1--4},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/ICON.2013.6781940},
  doi       = {10.1109/ICON.2013.6781940},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icon/LuoM13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rws/LuoJ12,
  author    = {Zhenxing Luo and
               Thomas C. Jannett},
  title     = {Modeling sensor position uncertainty for robust target localization
               in wireless sensor networks},
  booktitle = {2012 {IEEE} Radio and Wireless Symposium, {RWS} 2012, Santa Clara,
               CA, USA, January 15-18, 2012},
  pages     = {239--242},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/RWS.2012.6175293},
  doi       = {10.1109/RWS.2012.6175293},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/rws/LuoJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rws/LuoJ12a,
  author    = {Zhenxing Luo and
               Thomas C. Jannett},
  title     = {Energy-based target localization in multi-hop wireless sensor networks},
  booktitle = {2012 {IEEE} Radio and Wireless Symposium, {RWS} 2012, Santa Clara,
               CA, USA, January 15-18, 2012},
  pages     = {243--246},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/RWS.2012.6175316},
  doi       = {10.1109/RWS.2012.6175316},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rws/LuoJ12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/LuoLCZL11,
  author    = {Zhenxing Luo and
               Caiyi Lou and
               Shichuan Chen and
               Shilian Zheng and
               Shaowei Li},
  title     = {Specific primary user sensing for wireless security in {IEEE} 802.22
               network},
  booktitle = {11th International Symposium on Communications and Information Technologies,
               {ISCIT} 2011, Hangzhou, China, October 12-14, 2011},
  pages     = {18--22},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://doi.org/10.1109/ISCIT.2011.6089728},
  doi       = {10.1109/ISCIT.2011.6089728},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/iscit/LuoLCZL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LuoCL08,
  author    = {Zhenxing Luo and
               Jing Chen and
               Zuoquan Lin},
  title     = {Hybrid role hierarchy for the extended role based access control model},
  booktitle = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks,
               The Conference on Leading Edge and Practical Computer Networking,
               Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008,
               Proceedings},
  pages     = {566--567},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/LCN.2008.4664239},
  doi       = {10.1109/LCN.2008.4664239},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/lcn/LuoCL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/LuoHL07,
  author    = {Zhenxing Luo and
               NuerMaimaiti Heilili and
               Zuoquan Lin},
  title     = {A Flexible Applicable {RBAC} Model and Its Administration},
  booktitle = {18th International Workshop on Database and Expert Systems Applications
               {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany},
  pages     = {192--196},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://doi.org/10.1109/DEXA.2007.7},
  doi       = {10.1109/DEXA.2007.7},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dexaw/LuoHL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/HeililiCZLL06,
  author    = {NuerMaimaiti Heilili and
               Yang Chen and
               Chen Zhao and
               Zhenxing Luo and
               Zuoquan Lin},
  editor    = {J{\'{e}}r{\^{o}}me Lang and
               Fangzhen Lin and
               Ju Wang},
  title     = {An OWL-Based Approach for {RBAC} with Negative Authorization},
  booktitle = {Knowledge Science, Engineering and Management, First International
               Conference, {KSEM} 2006, Guilin, China, August 5-8, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4092},
  pages     = {164--175},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11811220\_15},
  doi       = {10.1007/11811220\_15},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/ksem/HeililiCZLL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngits/LuoHXZL06,
  author    = {Zhenxing Luo and
               NuerMaimaiti Heilili and
               Dawei Xu and
               Chen Zhao and
               Zuoquan Lin},
  editor    = {Opher Etzion and
               Tsvi Kuflik and
               Amihai Motro},
  title     = {Web Application Security Gateway with Java Non-blocking {IO}},
  booktitle = {Next Generation Information Technologies and Systems, 6th International
               Workshop, {NGITS} 2006, Kibbutz Shefayim, Israel, July 4-6, 2006,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4032},
  pages     = {96--105},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11780991\_9},
  doi       = {10.1007/11780991\_9},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/ngits/LuoHXZL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics