default search action
Meihua Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Chenghuan Li, Meihua Xiao, Zehuan Li, Fangping Chen, Dingli Wang:
Single-view 3D reconstruction via dual attention. PeerJ Comput. Sci. 10: e2403 (2024) - 2023
- [j10]Ke Yang, Meihua Xiao, Xiaomei Zhong, Yingqiang Zhong:
A novel formal logic for formal analysis of timeliness in non-repudiation protocols. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101664 (2023) - [c8]Meihua Xiao, Shanshan Qiao, Tao Liu, Ke Yang, Zehuan Li, Dongming Zhan:
Modeling and Verification of WPA3 Security Protocol Based on SPIN. NCTCS 2023: 248-265 - [i1]Chenhuan Li, Meihua Xiao, Zehuan Li, Fangping Chen, Shanshan Qiao, Dingli Wang, Mengxi Gao, Siyi Zhang:
R3D-SWIN: Use Shifted Window Attention for Single-View 3D Reconstruction. CoRR abs/2312.02725 (2023) - 2022
- [j9]Guoliang Luo, Rui Wang, Meihua Xiao, Hui Yang, Qian Xiao, Jiangyou Zeng, Chenghui Liao:
An efficient cutting scheme for a section view of the large-scale infrastructure models. Comput. Aided Civ. Infrastructure Eng. 37(2): 245-260 (2022) - [j8]Meihua Xiao, Ruixiao Tan, Huo-Sheng Ye, Lihua Gong, Zhiliang Zhu:
Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality. Entropy 24(7): 941 (2022) - [j7]Meihua Xiao, Hanxiao Yi, Ying Huang, Guoliang Luo, Qian Xiao:
Effective Key Region-Guided Face Detail Optimization Algorithm for 3D Face Reconstruction. J. Sensors 2022: 1-13 (2022) - [j6]Jiawen Song, Meihua Xiao, Tong Zhang, Haoyang Zhou:
Proving authentication property of PUF-based mutual authentication protocol based on logic of events. Soft Comput. 26(2): 841-852 (2022) - 2021
- [c7]Tong Zhang, Meihua Xiao, Ri Ouyang:
Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL. NCTCS 2021: 222-233 - 2020
- [c6]Ke Yang, Meihua Xiao, Zifan Song, Ri Ouyang:
Deriving Security Protocols Based on Protocol Derivation System. NCTCS 2020: 172-184
2010 – 2019
- 2019
- [j5]Jiawen Song, Meihua Xiao, Ke Yang, Xizhong Wang, Xiaomei Zhong:
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols. IEEE Access 7: 59871-59883 (2019) - 2018
- [j4]Ke Yang, Meihua Xiao, Jiawen Song, Jia Chen, Xiaomei Zhong, Xizhong Wang:
Proving Mutual Authentication Property of KerNeeS Protocol Based on Logic of Events. IEEE Access 6: 51853-51863 (2018) - [j3]Qing Huang, Bo Huang, Zhijun Fang, Meihua Xiao, Ying Yu:
Exploiting abstract change pattern from code changes. J. Intell. Fuzzy Syst. 35(2): 1597-1608 (2018) - [c5]Jia Chen, Meihua Xiao, Ke Yang, Wei Li, Xiaomei Zhong:
Formal Analysis and Verification for Three-Party Authentication Protocol of RFID. NCTCS 2018: 46-60 - [c4]Ke Yang, Meihua Xiao, Jia Chen:
Security Proof of KerNeeS Protocol Based on Logic of Events. NCTCS 2018: 61-79 - 2017
- [c3]Yu Ding, Yuting Zhang, Meihua Xiao, Zhigang Deng:
A Multifaceted Study on Eye Contact based Speaker Identification in Three-party Conversations. CHI 2017: 3011-3021 - [c2]Wei Li, Meihua Xiao, Yanan Li, Yingtian Mei, Xiaomei Zhong, Jimin Tu:
Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID. NCTCS 2017: 119-132 - 2015
- [j2]Meihua Xiao, Ke Zhu, Chenglin Ma:
基于SPIN的Andrew Secure RPC协议并行攻击模型检测 (Model Checking of Parallel Attack in Andrew Secure RPC Protocol Based on SPIN). 计算机科学 42(7): 103-107 (2015) - 2014
- [j1]Meihua Xiao, Zilong Wan, Hongling Liu:
The Formal Verification and Improvement of Simplified SET Protocol. J. Softw. 9(9): 2302-2308 (2014)
2000 – 2009
- 2006
- [c1]Meihua Xiao, Jinyun Xue:
Formal automatic verification of security protocols. GrC 2006: 566-569
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint