Xiaoyun Wang

ORCID: 0000-0002-7846-269X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Complexity and Algorithms in Graphs
  • Cryptography and Residue Arithmetic
  • Intelligence, Security, War Strategy
  • Speech Recognition and Synthesis
  • Network Security and Intrusion Detection
  • Advanced Computational Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Occupational Health and Safety Research
  • graph theory and CDMA systems
  • Quantum Computing Algorithms and Architecture
  • Semantic Web and Ontologies
  • Natural Language Processing Techniques
  • Security and Verification in Computing
  • Advanced Steganography and Watermarking Techniques
  • Topic Modeling
  • Advanced Graph Neural Networks
  • Optimization and Search Problems
  • Recommender Systems and Techniques
  • Speech and Audio Processing

Shandong University
2016-2025

University of Alberta
2025

Qilu Hospital of Shandong University
2025

Tsinghua University
2015-2024

China Mobile (China)
2023-2024

Anhui Business College
2024

State Key Laboratory of Cryptology
2012-2023

Beijing Sport University
2023

Shandong Institute of Metrology
2023

Shandong University of Science and Technology
2021-2022

Determining whether inputs are out-of-distribution (OOD) is an essential building block for safely deploying machine learning models in the open world. However, previous methods relying on softmax confidence score suffer from overconfident posterior distributions OOD data. We propose a unified framework detection that uses energy score. show scores better distinguish in- and samples than traditional approach using scores. Unlike scores, theoretically aligned with probability density of less...

10.48550/arxiv.2010.03759 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Abstract Grounded in the interactionist paradigm, this study shows that emotional exhaustion and perceived safety climate constitute important moderators of relationship between proactive personality work performance. More specifically, analyzes its behavioural outcomes—organizational citizenship behaviour (OCB) job performance—and investigates interactive effects climate. The involves 485 Chinese airline employees including pilots, flight attendants, engineers, service employees. Proactive...

10.1002/cjas.90 article EN Canadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l Administration 2009-03-01

Objective: This paper presents an asynchronous electrooculography (EOG)-based human-machine interface (HMI) for smart home environmental control with the purpose of providing daily assistance severe spinal cord injury (SCI) patients. Methods: The proposed HMI allows users to interact a environment through eye blinking. Specifically, several buttons, each corresponding command, randomly flash on graphical user interface. Each buttons functions as visual cue blink. To issue can blink...

10.1109/tbme.2018.2834555 article EN IEEE Transactions on Biomedical Engineering 2018-05-09

10.1007/s11432-017-9468-y article EN Science China Information Sciences 2018-08-31

10.1007/s10623-020-00741-y article EN Designs Codes and Cryptography 2020-03-09

State-of-the-art Byzantine fault-tolerant (BFT) protocols assuming partial synchrony such as SBFT and HotStuff use regular certificates obtained from 2f + 1 (partial) signatures. We show that one can weak only f signatures to assist in designing more robust efficient BFT protocols. design implement two systems: Dashing (a family of HotStuff-style protocols) Star parallel framework).

10.1145/3627703.3650073 article EN 2024-04-18

In this paper, we present an improvement of the Nguyen-Vidick heuristic sieve algorithm for shortest vector problem in general lattices, which time complexity is 20.3836n polynomial computations, and space 20.2557n. new algorithm, introduce a technique with two-level instead previous one-level sieve, complete estimation by calculating irregular spherical cap covering.

10.1145/1966913.1966915 article EN 2011-03-22

In this paper, we study the robustness of graph convolutional networks (GCNs). Previous work have shown that GCNs are vulnerable to adversarial perturbation on adjacency or feature matrices existing nodes; however, such attacks usually unrealistic in real applications. For instance, social network applications, attacker will need hack into either client server change links features. propose a new type "fake node attacks" attack by adding malicious fake nodes. This is much more realistic than...

10.48550/arxiv.1810.10751 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Abstract L2 teachers employ various multimodal resources, including designedly incomplete utterances (DIUs), to elicit student response in classroom interaction. Building on the work of Wang et al. (2024) , this study further investigates how Chinese-as-a-second-language (CSL) use resources responses when DIUs fail prompt a response. A two-step pattern has been observed data. First, routinely scanning gaze and body holds enhance participation while they wait for After that, interrogatives,...

10.1075/csl.00059.wan article EN cc-by Chinese as a Second Language (漢語教學研究—美國中文教師學會學報) The journal of the Chinese Language Teachers Association USA 2025-04-01

10.1007/s11432-018-9611-3 article EN Science China Information Sciences 2019-01-29
Coming Soon ...