Xueli Wang

ORCID: 0000-0003-1921-4968
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Algebra and Geometry
  • Algebraic Geometry and Number Theory
  • Analytic Number Theory Research
  • Chaos-based Image/Signal Encryption
  • Complexity and Algorithms in Graphs
  • Security in Wireless Sensor Networks
  • Distributed Control Multi-Agent Systems
  • graph theory and CDMA systems
  • Advanced Mathematical Identities
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • Neural Networks Stability and Synchronization
  • Nonlinear Dynamics and Pattern Formation
  • Stability and Control of Uncertain Systems
  • stochastic dynamics and bifurcation
  • Plant Ecology and Soil Science
  • Energy Efficient Wireless Sensor Networks
  • Video Surveillance and Tracking Methods
  • Geology and Paleoclimatology Research
  • Cloud Data Security Solutions
  • Finite Group Theory Research
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Service-Oriented Architecture and Web Services
  • Distributed systems and fault tolerance

Beijing University of Technology
2018-2024

East China Normal University
2024

Guizhou University
2024

Chinese Academy of Sciences
2019-2024

Institute of Zoology
2024

Shaanxi University of Science and Technology
2023

Nanjing University of Posts and Telecommunications
2021-2022

Anhui Institute of Information Technology
2022

South China Normal University
2007-2021

Chifeng University
2021

Abstract In this paper, we modify the proof methods of some previously weakly consistent variants random forest into strongly methods, and improve data utilization these in order to obtain better theoretical properties experimental performance. addition, propose Data-driven Multinomial Random Forest (DMRF) algorithm, which has same complexity with BreimanRF (proposed by Breiman) while satisfying strong consistency probability 1. It performance classification regression tasks than previous RF...

10.1186/s40537-023-00874-6 article EN cc-by Journal Of Big Data 2024-02-23

Terrestrial dissolved organic matter (tDOM) holds great promise for controlling cyanobacteria blooms through watershed management. To identify tDOM that could inhibit the growth, photosynthesis and colony formation, unicellular Microcystis aeruginosa Kützing (FACHB-469) was cultivated treated with varying concentrations of gallic acid, proline tea polyphenols at different levels iron. The results indicated acid growth by suppressing formation reducing extracellular polysaccharides (EPS)...

10.1016/j.ecoenv.2024.116790 article EN cc-by-nc Ecotoxicology and Environmental Safety 2024-07-30

10.1007/s11390-008-9168-1 article EN Journal of Computer Science and Technology 2008-09-01

With the assistance of edge computing which reduces heavy burden cloud center server by using network servers, Internet Things (IoTs) architectures enable low latency for real-time devices and applications. However, there still exist security challenges on data access control IoT. Multiauthority attribute-based encryption (MA-ABE) is a promising technique to achieve over encrypted in cross-domain Based characteristics technical requirements IoT, we propose an efficient fine-grained revocable...

10.1155/2021/8872699 article EN cc-by Security and Communication Networks 2021-02-02

Among the classification algorithms in machine learning, KNN (K nearest neighbor) algorithm is one of most frequent used methods for its characteristics simplicity and efficiency. Even though very effective many situations while it still has two shortcomings, not only efficiency this obviously affected by redundant dimensional features, but also categorization accuracy seriously influenced distribution training samples. In paper, we proposed a stepwise based on kernel attribute reduction...

10.1109/imccc.2015.125 article EN 2015-09-01

As one of the three pillars information technology, wireless sensor networks (WSNs) have been widely used in environmental detection, healthcare, military surveillance, industrial data sampling, and many other fields due to their unparalleled advantages deployment cost, network power consumption, versatility. The advent 5G standard era Industry 4.0 brought new opportunities for development networks. However, limited capacity nodes themselves, harsh environment will bring a great difficulty...

10.1155/2021/7633054 article EN cc-by Journal of Sensors 2021-01-01

Abstract Callosobruchus maculatus is one of the most competitive stored grain pests, which causes a great loss to agricultural economy. However, due an inadequacy high-quality reference genome, molecular mechanisms for olfactory and hypoxic adaptations environments are unknown require be revealed urgently, will contribute detection prevention invasive pests C. . Here, we presented chromosome-level genome based on Illumina, Nanopore Hi-C sequencing data. The total size was 1.2 Gb, 65.17%...

10.1038/s41597-024-03638-w article EN cc-by Scientific Data 2024-07-18

Shrinking the size of photoelectrodes into nanoscale will enable precise modulation cellular and subcellular behaviors a single neuron neural circuits. However, compared to photovoltaic devices, reduced causes compromised efficiencies. Here, we present highly efficient nanoelectrode based on bimetallic zinc gold porphyrin (ZnAuPN). Upon light excitation, observe ultrafast energy transfer (~66 ps) charge (~0.5 through ring, enabling 97% efficiency in separating transferring photoinduced...

10.1038/s41467-024-54325-8 article EN cc-by-nc-nd Nature Communications 2024-11-26

10.1007/s11390-007-9015-9 article EN Journal of Computer Science and Technology 2007-01-01

In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in random oracle model under Diffie-Hellman assumption.Our adopts approach that private key associated with an identity rather than master of PKG shared.Comparing to the-state-of-art work by Baek and Zheng, our has following advantages.(1) The round-complexity signing protocol optimal.Namely, during procedure, each party broadcasts only one message.(2) communication...

10.15388/informatica.2009.260 article EN Informatica 2009-01-01

We propose a new identity-based threshold signature (IBTHS) scheme from bilinear pairings enjoying the following advantages in efficiency, security and functionality. The round-complexity of signing protocol is optimal since each party pays no other communication cost except broadcasting one single message. computational complexity procedure considerably low there appears time-consuming pairing two for verifying shares. channel requirement lowest broadcast among signers enough. It provably...

10.1504/ijipt.2014.066373 article EN International Journal of Internet Protocol Technology 2014-01-01

This paper considers the problem of robust control synthesis such that time-delay multi-agent systems are consensus and capture finite frequency domain H∞ performance. Using a linear transformation, is first transformed into partial stability problem. Then, based on dual version generalised Kalman–Yakubovich–Popov (GKYP) lemma multiplier expansion method, new sufficient conditions guaranteeing existence static output feedback controller proposed in terms matrix inequalities (LMIs) without...

10.1080/00207721.2019.1657200 article EN International Journal of Systems Science 2019-09-06

With the development of new generation Internet technology, Digital Object Architecture (DOA)/Handle system plays an important role in industrial system. The and technical characteristics DOA/Handle technology is studied this paper. Then function architecture distributed data acquisition based on proposed. Through detailed design functions architecture, core such as acquisition, management, security sharing, governance are realized environment. At end paper, typical scenarios summarized, a...

10.1051/matecconf/202133605018 article EN cc-by MATEC Web of Conferences 2021-01-01

Real-time detecting objects on captured images UAV (Unmanned Aerial Vehicle) platforms, rather than barely transmitting back to supporting equipment for post-processing, is a core requirement advanced applications. However, due limited computing capacity and memory of it very challenging deploy real-time detection models them. In addition, there are more small in aerial images, which makes difficult detect accurately. To solve these problems, this paper brings dense connection Yolo(You Only...

10.1109/ccai50917.2021.9447518 article EN 2021-05-07

With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a network. In typical wormhole attack, attacker receives packets network, forward them through wired link with high-bandwidth low-latency links than network links, relay to another point this paper, we propose use key techniques probabilistic multi-path redundancy transmission (PMRT) detect...

10.1109/mines.2010.111 article EN International Conference on Multimedia Information Networking and Security 2010-01-01

At present, it is a great challenge that solving high-dimension and text sparsity problems in short classification. To resolve these problems, this paper proposes method which takes the correlation between lexical items tags before completing Latent Dirichlet Allocation(LDA) topic model. Meanwhile, adjusts parameters of Support Vector Machine(SVM) to find optimal values by K-fold cross validation. Besides, using kernel SVM as classifier, we successfully categorize labeled Chinese documents....

10.1109/icisce.2017.96 article EN 2017-07-01
Coming Soon ...