


Остановите войну!
for scientists:


default search action
Hui Xia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j60]Xin Zhang
, Chencong Ding, Hui Xia, Hao Liu, Yao Yao:
INS-Aided Multi-Antenna GNSS Carrier Phase Double Difference Spoofing Detection. IEEE Access 11: 19523-19533 (2023) - [j59]Run Du, Shuo Xu, Rui Zhang, Lijuan Xu
, Hui Xia
:
A dynamic adaptive iterative clustered federated learning scheme. Knowl. Based Syst. 276: 110741 (2023) - [j58]Zewei Liu
, Chunqiang Hu
, Ruinian Li
, Tao Xiang
, Xingwang Li
, Jiguo Yu
, Hui Xia
:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Trans. Cloud Comput. 11(3): 2325-2336 (2023) - [j57]Yuanyuan Li
, Shuaiyu Bu
, Xuelong Han
, Hui Xia
, Wenting Ren
, Guoqiang Liu
:
Magneto-Acousto-Electrical Tomography With Nonuniform Static Magnetic Field. IEEE Trans. Instrum. Meas. 72: 1-12 (2023) - [j56]Hui Xia
, Shu-shu Shao, Chunqiang Hu
, Rui Zhang
, Tie Qiu
, Fu Xiao
:
Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network. IEEE Trans. Knowl. Data Eng. 35(5): 5203-5215 (2023) - 2022
- [j55]Hui Xia, Hui Ma, Ping Cheng:
PE-EDD: An efficient peer-effect-based financial fraud detection approach in publicly traded China firms. CAAI Trans. Intell. Technol. 7(3): 469-480 (2022) - [j54]Xinglei Zhao
, Hui Xia, Jianhu Zhao
, Fengnian Zhou:
Adaptive Wavelet Threshold Denoising for Bathymetric Laser Full-Waveforms With Weak Bottom Returns. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j53]Xinglei Zhao
, Jianfei Gao
, Hui Xia, Fengnian Zhou:
Retrieval of Suspended Sediment Concentration from Bathymetric Bias of Airborne LiDAR. Sensors 22(24): 10005 (2022) - [j52]Rui Zhang
, Hui Xia
, Chunqiang Hu
, Cheng Zhang
, Chao Liu
, Fu Xiao
:
Generating Adversarial Examples With Shadow Model. IEEE Trans. Ind. Informatics 18(9): 6283-6289 (2022) - [j51]Yanting Chen
, Zhaoyuan Xu
, Jianbo Wu
, Sha He
, Maciej Roskosz
, Hui Xia
, Yihua Kang
:
A Scanning Induction Thermography System for Thread Defects of Drill Pipes. IEEE Trans. Instrum. Meas. 71: 1-9 (2022) - [j50]Hui Xia, Yasemin M. Akay, Metin Akay
:
Investigating miRNA-mRNA Interactions and Gene Regulatory Networks From VTA Dopaminergic Neurons Following Perinatal Nicotine and Alcohol Exposure Using Bayesian Network Analysis. IEEE J. Biomed. Health Informatics 26(7): 3550-3555 (2022) - [j49]Zewei Liu
, Chunqiang Hu
, Hui Xia
, Tao Xiang
, Baolin Wang
, Jiajun Chen
:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. IEEE Trans. Netw. Serv. Manag. 19(4): 5196-5207 (2022) - [c37]Ning Huang
, Xue-cai Feng
, Rui Zhang
, Xiugui Yang
, Hui Xia
:
Network Defense Resource Allocation Scheme with Multi-armed Bandits. WASA (1) 2022: 326-337 - [c36]Xiugui Yang
, Xiangyun Qian
, Rui Zhang
, Ning Huang
, Hui Xia
:
Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons. WASA (2) 2022: 375-383 - [i3]Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang:
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? CoRR abs/2206.10809 (2022) - [i2]Hui Xia, Rui Zhang, Shuliang Jiang, Zi Kang:
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture. CoRR abs/2206.10988 (2022) - [i1]Hui Xia, Xiugui Yang, Xiangyun Qian, Rui Zhang:
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair. CoRR abs/2207.12863 (2022) - 2021
- [j48]Hui Xia, Yasemin M. Akay, Metin Akay
:
Selecting Relevant Genes From Microarray Datasets Using a Random Forest Model. IEEE Access 9: 97813-97821 (2021) - [j47]Jufu Cui, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168: 136-145 (2021) - [j46]Min Liu
, Hui Xia:
Design and validation of the tubular linear vibration generator applied to energy harvester based on VIV. Int. J. Circuit Theory Appl. 49(12): 4316-4329 (2021) - [j45]Jianguo Wei, Song Shi, Hui Xia:
The integration of Building Information Modeling (BIM) and Integrated Project Delivery (IPD) in industrial buildings: Evidence from China. J. Comput. Methods Sci. Eng. 21(6): 1711-1726 (2021) - [j44]Rui Zhang
, Hui Xia
, Chao Liu
, Ruobing Jiang
, Xiangguo Cheng
:
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning. Wirel. Commun. Mob. Comput. 2021: 6619715:1-6619715:9 (2021) - [c35]Shu-shu Shao, Hui Xia, Rui Zhang, Xiangguo Cheng:
Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. WASA (2) 2021: 96-106 - 2020
- [j43]Rui Zhang
, Hui Xia
, Fei Chen
, Li Li
, Xiangguo Cheng
:
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System. IEEE Access 8: 12316-12326 (2020) - [j42]Li Li
, Jufu Cui
, Rui Zhang
, Hui Xia
, Xiangguo Cheng
:
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things. IEEE Access 8: 64184-64192 (2020) - [j41]Yizhe Li, Hui Xia
, Rui Zhang
, Benxu Hu, Xiangguo Cheng
:
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things. IEEE Access 8: 123938-123951 (2020) - [j40]Hui Xia
:
Improve the Resilience of Multilayer Supply Chain Networks. Complex. 2020: 6596483:1-6596483:9 (2020) - [j39]Hui Xia, Weiji Yang:
Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone. Int. J. Netw. Secur. 22(2): 201-211 (2020) - [j38]Hui Xia
, Li Li
, Xiangguo Cheng
, Xiuzhen Cheng
, Tie Qiu
:
Modeling and Analysis Botnet Propagation in Social Internet of Things. IEEE Internet Things J. 7(8): 7470-7481 (2020) - [j37]Hui Xia
, Li Li
, Xiangguo Cheng
, Chao Liu
, Tie Qiu
:
A Dynamic Virus Propagation Model Based on Social Attributes in City IoT. IEEE Internet Things J. 7(9): 8036-8048 (2020) - [j36]Rui Zhang, Hui Xia
, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng
:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. Mob. Inf. Syst. 2020: 8844116:1-8844116:9 (2020) - [j35]Hui Xia
, Fu Xiao
, Sanshun Zhang
, Xiangguo Cheng, Zhenkuan Pan:
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 792-804 (2020) - [j34]Hui Xia
, Rui Zhang
, Xiangguo Cheng
, Tie Qiu
, Dapeng Oliver Wu
:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. IEEE/ACM Trans. Netw. 28(6): 2741-2754 (2020) - [j33]Hui Xia
, Zhetao Li, Yuhui Zheng
, Anfeng Liu
, Young-June Choi, Hiroo Sekiya:
A Novel Light-Weight Subjective Trust Inference Framework in MANETs. IEEE Trans. Sustain. Comput. 5(2): 236-248 (2020) - [c34]Xintang Lin, Haibo Zhang, Hui Xia, Liangjiang Yu, Xiangyan Fang, Xuan Chen, Zhikai Wang:
Test Case Minimization for Regression Testing of Composite Service Based on Modification Impact Analysis. WISA 2020: 15-26 - [c33]Haibo Zhang, Hui Xia, Xintang Lin, Liangjiang Yu, Xiangyan Fang, Xuan Chen, Hongquan Zhu:
Test Case Generation of Composite Web Services Based on Semantic Matching and Condition Recognition. WISA 2020: 27-35 - [c32]Rui Zhang, Hui Xia, Jufu Cui, Yizhe Li, Shu-shu Shao, Hang Ren:
A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server. ML4CS (3) 2020: 183-192 - [c31]Rui Zhang, Hui Xia, Jufu Cui, Xiangguo Cheng:
A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems. WASA (2) 2020: 105-112
2010 – 2019
- 2019
- [j32]Hui Xia
, Chun-qiang Hu, Fu Xiao
, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j31]Tao Sun, Hui Xia, Lin Li, Hang Shen, Yu Liu:
A Semantic Expansion Model for VGI Retrieval. ISPRS Int. J. Geo Inf. 8(12): 589 (2019) - [j30]Hui Xia, Weiji Yang:
Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants. Int. J. Netw. Secur. 21(5): 719-727 (2019) - [j29]Xiaonan Li, Guoqiang Liu, Hui Xia, Lili Hu, Shiqiang Li, Shilong Zhao, Haiyan Chen:
Investigation in Radio Frequency Magnetic Field Mapping Towards Tissue Magnetic Resonance Electric Properties Tomography. J. Medical Imaging Health Informatics 9(1): 78-83 (2019) - [j28]Hui Xia, Guangxin Ding, Guoqiang Liu:
Magneto-Acousto-Electrical Tomography with Magnetic Induction Based on Laser-Generated Ultrasound Transducer. J. Medical Imaging Health Informatics 9(1): 183-187 (2019) - [j27]Jianbo Wu
, Junzhen Zhu
, Hui Xia, Chengyong Liu, Xiaoming Huang, Gui Yun Tian:
DC-Biased Magnetization Based Eddy Current Thermography for Subsurface Defect Detection. IEEE Trans. Ind. Informatics 15(12): 6252-6259 (2019) - [j26]Hui Xia
, Sanshun Zhang
, Ye Li, Zhenkuan Pan, Xin Peng, Xiuzhen Cheng
:
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(7): 7108-7120 (2019) - [c30]Rongyi Yan, Hui Xia, Tong Liang, Xiao He:
Detecting and Estimating Intermittent Actuator Faults in Linear Stochastic Systems. CAA SAFEPROCESS 2019: 625-630 - [c29]Lili Wang, Xian Zhang, Zhaohui Wang, Hui Xia, Guoqiang Liu:
Characteristics of Spatial Magnetic Field of Coupling Mechanism with Magnetic Shield in Wireless Charging System. ICITEE 2019: 131:1-131:6 - [c28]Hui Xia, Bin Fang:
A Trend Filtering Based Prediction Model on Network Traffic. ICNC-FSKD 2019: 874-882 - [c27]Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. INFOCOM 2019: 838-846 - [c26]Li Li, Hui Xia, Rui Zhang, Ye Li:
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. WASA 2019: 596-604 - 2018
- [j25]Hui Xia, Bin Fang, Matthew Roughan, Kenjiro Cho
, Paul Tune:
A BasisEvolution framework for network traffic anomaly detection. Comput. Networks 135: 15-31 (2018) - [j24]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j23]Hui Xia, Weiji Yang:
Implicit Privacy Protection in Spatio-temporal Data Distribution. J. Inf. Hiding Multim. Signal Process. 9(5): 1199-1211 (2018) - [j22]Hui Xia, Weiji Yang:
Secure Cloud Storage Model Based on TPKE and ECE. J. Inf. Hiding Multim. Signal Process. 9(6): 1549-1558 (2018) - [j21]Hui Xia
, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. Secur. Commun. Networks 2018: 7608198:1-7608198:12 (2018) - [j20]Wei Luo, Yang Yuan
, Yi Wang, Qiuyun Fu, Hui Xia, Honglang Li:
Fast and Accurate Finite Transducer Analysis Method for Wireless Passive Impedance-Loaded SAW Sensors. Sensors 18(11): 3988 (2018) - [c25]Hui Xia, Ligang He, Bin Wang, Cheng Chang, Xie Han, Carsten Maple:
Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices. HPCC/SmartCity/DSS 2018: 416-421 - [c24]Hao Wang, Fenlan Jin, Zeping Gong, Hui Xia, Wei Chen, Lin Zhao:
Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid. ICSAI 2018: 161-165 - [c23]Xiaonan Li, Guoqiang Liu, Shiqiang Li, Hui Xia, Yong Wang:
Planar-coil-based Micro-detection in Nuclear Magnetic Resonance Spectroscopy. ICSAI 2018: 895-899 - [c22]Sanshun Zhang, Shiwen Wang, Hui Xia, Xiangguo Cheng:
An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks. IIKI 2018: 473-479 - [c21]Shiwen Wang, Hui Xia:
A Reputation Management Framework for MANETs. PAC 2018: 119-120 - [c20]Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. WASA 2018: 893-906 - 2017
- [j19]Hui Xia, Xin Dai, Qing Ye, Shenyao Feng
, Rui Li, Xiaomeng Suo:
Design and control of entrainer-assisted reactive distillation for N-propyl propionate production. Comput. Chem. Eng. 106: 559-571 (2017) - [j18]Lin Li, Yu Liu, Haihong Zhu, Shen Ying, Qinyao Luo, Heng Luo, Xi Kuai, Hui Xia, Hang Shen:
A bibliometric and visual analysis of global geo-ontology research. Comput. Geosci. 99: 1-8 (2017) - [j17]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - [j16]Jianbo Wu, Hui Fang, Xiaoming Huang, Hui Xia, Yihua Kang, Chaoqing Tang
:
An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect. Sensors 17(12): 2911 (2017) - [c19]Xiaonan Li, Guoqiang Liu, Lili Hu, Hui Xia:
Sensor instrumentation for micro magnetic resonance imaging towards tissue biopsies. CISP-BMEI 2017: 1-5 - 2016
- [j15]Lin Li
, Xiaoyu Xing
, Hui Xia, Xiaoying Huang:
Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest. Entropy 18(2): 45 (2016) - [j14]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j13]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j12]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j11]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c18]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - [c17]Yao Qin, Hua Wang, Zhiping Jia, Hui Xia:
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP. IPCCC 2016: 1-8 - [c16]Hui Xia, Guo-Dong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. Trustcom/BigDataSE/ISPA 2016: 50-56 - 2015
- [j10]Hui Xia, Bin Fang, Min Gao, Hui Ma, Yuanyan Tang, Jing Wen:
A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306: 150-165 (2015) - [j9]Lin Li, Hui Xia, Zheng Li, Zhijun Zhang:
Temporal-Spatial Evolution Analysis of Lake Size-Distribution in the Middle and Lower Yangtze River Basin Using Landsat Imagery Data. Remote. Sens. 7(8): 10364-10384 (2015) - [j8]Liang Guo
, Guoqiang Liu, Hui Xia:
Magneto-Acousto-Electrical Tomography With Magnetic Induction for Conductivity Reconstruction. IEEE Trans. Biomed. Eng. 62(9): 2114-2124 (2015) - [c15]Hui Xia, Tao Huang, Gang Chen:
A method of extracting human facial feature points based on 3D laser scanning point cloud data. Geoinformatics 2015: 1-3 - 2014
- [j7]Hui Xia, Zhiping Jia, Edwin Hsing-Mean Sha:
Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 8(2): 88-103 (2014) - [j6]Hui Xia, Shoujun Xia, Jia Yu, Zhiping Jia, Edwin Hsing-Mean Sha:
Applying link stability estimation mechanism to multicast routing in MANETs. J. Syst. Archit. 60(5): 467-480 (2014) - [j5]Kiwoong Kim
, Samo Begus, Hui Xia, Seung-Kyun Lee
, Vojko Jazbinsek
, Zvonko Trontelj, Michael V. Romalis:
Multi-channel atomic magnetometer for magnetoencephalography: A configuration study. NeuroImage 89: 143-151 (2014) - [c14]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480 - 2013
- [j4]Hui Xia, Zhiping Jia, Xin Li, Lei Ju, Edwin Hsing-Mean Sha:
Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks 11(7): 2096-2114 (2013) - [j3]Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin Hsing-Mean Sha:
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9): 1078-1093 (2013) - [c13]Longpeng Zheng, Zhiping Jia, Ruihua Zhang, Hui Xia, Lei Ju, Chuanhao Qu:
Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering. TrustCom/ISPA/IUCC 2013: 1307-1314 - [c12]Chong Yan, Zhiping Jia, Lei Ju, Hui Xia, Huaqiang Xu:
TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator. TrustCom/ISPA/IUCC 2013: 1741-1746 - 2012
- [j2]Feng Zhang, Zhiping Jia, Hui Xia, Xin Li, Edwin Hsing-Mean Sha:
Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model. Comput. Commun. 35(5): 589-596 (2012) - [c11]Yuancan Huang, Yiqun Zhang, Hui Xia, Tong Liang, Dongfang Cheng:
LQ-based optimization for linear impulsive control systems mixed with continuous-time controls and fixed-time impulses. CDC 2012: 6144-6150 - [c10]Zhiyong Zhang, Zhiping Jia, Hui Xia:
Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks. TrustCom 2012: 1570-1577 - 2011
- [j1]Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4): 248-266 (2011) - [c9]Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Youqin Zhu:
A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules. GreenCom 2011: 124-130 - [c8]Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:
Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks. TrustCom 2011: 1277-1282 - 2010
- [c7]Feng Zhang, Zhiping Jia, Xin Li, Hui Xia:
Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making. EUC 2010: 511-516 - [c6]Bo Xu, Congcong Tao, Hui Xia:
A Method for Dam Safety Evaluation Based on Dempster-Shafer Theory. ICIC (2) 2010: 580-589 - [c5]Li-Li Sheng, Wu-Qun Cheng, Hui Xia, Xian-Bing Wu, Xi-Ping Zhang:
Prediction of annual precipitation based on fuzzy and grey Markov process. ICMLC 2010: 1136-1140 - [c4]Hui Xia, Hui-Ling Han, Lu-Hua Yang, Li-Li Sheng, Hong-Sheng Wang:
Soil water division by SPSS statistics analysis software in Hebei Province. ICMLC 2010: 1980-1986 - [c3]Zhiguo Sun, Hui Xia, Wensheng Wang:
An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things. CCTA (1) 2010: 9-15
2000 – 2009
- 2007
- [c2]Yikun Zhang, Peng Yin, Du-Wu Cui, Hui Xia:
A Method of Requirement Inconsistency Analysis. COMPSAC (1) 2007: 211-214 - 2006
- [c1]Peiyu Qin, Chuanbo Chen, Zehua Lv, Hui Xia:
Physically Based Animation of Tongue on Fire in a Periodic Domain. ICAT Workshops 2006: 496-500