default search action
Kan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c50]Kan Zhang, Lin Cheng:
Research on Optimal Site Selection for Electric Vehicle Charging Stations. PEAI 2024: 781-785 - 2023
- [j15]Hai Wang, Yan Wang, Yuhui Ma, Chenguang Qin, Kan Zhang, Ling Gao, Jie Ren:
Noise processing and multitask learning for far-field dialect classification. Concurr. Comput. Pract. Exp. 35(13) (2023) - [j14]Yuerong Zhao, Hongbo Guo, Ling Gao, Hai Wang, Jie Zheng, Kan Zhang, Yong Zheng:
Multifeature fusion action recognition based on key frames. Concurr. Comput. Pract. Exp. 35(21) (2023) - [j13]Weilin Hao, Jia Sun, Zichao Zhang, Kan Zhang, Feng Qiu, Jin Xu:
Novel Hybrid Model to Estimate Leaf Carotenoids Using Multilayer Perceptron and PROSPECT Simulations. Remote. Sens. 15(20): 4997 (2023) - [c49]Kan Zhang, Hongyuan Li:
Condition Monitoring and Fault Diagnosis of Rough Rolling Mill Split Bearing Based on Stress Wave Technology. SAFEPROCESS 2023: 1-5 - 2022
- [j12]Hai Wang, Hongbo Guo, Kan Zhang, Ling Gao, Jie Zheng:
Automatic sleep staging method of EEG signal based on transfer learning and fusion network. Neurocomputing 488: 183-193 (2022) - [c48]Xuan Zhang, Kai Su, Feng Qian, Yanru Zhang, Kan Zhang:
Collaborative Filtering Algorithm Based on Item Popularity and Dynamic Changes of Interest. MMBD 2022: 132-140 - 2021
- [c47]Liang Zhang, Xiaolei Ma, Ningxuan Zhang, Huajun Cao, Chao Ai, Jingyu Zhang, Wenwei Xu, Kan Zhang:
The Vista of Information Communication Technology in the Ageing Society: A Perspective from Elderly's Basic Needs. HCI (11) 2021: 423-440 - 2020
- [c46]Hai Wang, Chenguang Qin, Kan Zhang, Ling Gao, Jie Ren:
Noise processing and multi-task learning for far-field dialect classification. CBD 2020: 143-148 - [c45]Xinyue Cui, Yan Ge, Weina Qu, Kan Zhang:
Effects of Recipient Information and Urgency Cues on Phishing Detection. HCI (40) 2020: 520-525
2010 – 2019
- 2018
- [j11]Zhengyao He, Geng Chen, Yun Wang, Kan Zhang, Wenqiang Tian:
Finite Element Calculation with Experimental Verification for a Free-Flooded Transducer Based on Fluid Cavity Structure. Sensors 18(9): 3128 (2018) - [c44]Yifan Zhang, Kan Zhang, Xinyi Zou:
Structural Brain Network Mining Based on Core Theory. DSC 2018: 161-168 - 2017
- [c43]Kan Zhang, Zichao Zhang, Yanlei Wu, Jin Xu, Yunyun Niu:
A Core Theory Based Algorithm for Influence Maximization in Social Networks. CIT 2017: 31-36 - [c42]Kan Zhang, Zichao Zhang, Kaigui Bian, Jin Xu, Jie Gao:
A Personalized Next-Song Recommendation System Using Community Detection and Markov Model. DSC 2017: 118-123 - [c41]Xiaofang Sun, Yi Yuan, Zhuxi Yao, Kan Zhang, Jianhui Wu:
Greater Heart Rate Responses to Acute Stress is Correlated with Worse Performance of Visual Search in Special Police Cadets. HCI (5) 2017: 200-208 - 2016
- [j10]Caihong Jiang, Wenguo Zhao, Xianghong Sun, Kan Zhang, Rui Zheng, Weina Qu:
The effects of the self and social identity on the intention to microblog: An extension of the theory of planned behavior. Comput. Hum. Behav. 64: 754-759 (2016) - [j9]Xue Wu, Changxu Wu, Kan Zhang, Dong Wei:
Residents' numeric inputting error in computerized physician order entry prescription. Int. J. Medical Informatics 88: 25-33 (2016) - [c40]Kan Zhang, Fei Jiang, Yang Zuo, Yunyun Niu:
Structural Vulnerability Analysis in Complex Networks Based on Core Theory. DSC 2016: 149-154 - [c39]Yang Zuo, Kan Zhang:
Using Structural Features to Characterize Social Ties. DSC 2016: 235-242 - 2015
- [j8]Jianhui Wu, Shen Zhang, Wanqing Li, Shaozheng Qin, Yong He, Zhi Yang, Tony W. Buchanan, Chao Liu, Kan Zhang:
Cortisol awakening response predicts intrinsic functional connectivity of the medial prefrontal cortex in the afternoon of the same day. NeuroImage 122: 158-165 (2015) - [c38]Yankui Sun, Kan Zhang, Ye Feng:
Interactive Browsing System of 3D Lunar Model with Texture and Labels on Mobile Device. ICIG (2) 2015: 446-452 - 2014
- [c37]Yiran Yuan, Jianhui Wu, Kan Zhang:
Long-Term Psychosocial Stress Attenuates Attention Resource of Post-Error. HCI (23) 2014: 114-122 - [c36]Haifeng Li, Yanan Chen, Kan Zhang:
The Time Course of Selective Consolidation on Visual Working Memory. HCI (23) 2014: 195-201 - [c35]Weina Qu, Huiting Zhang, Feng Du, Kan Zhang:
Two Types of Cell Phone Conversation Have Differential Effect on Driving. HCI (23) 2014: 522-532 - [c34]Zhuxi Yao, Liang Zhang, Kan Zhang:
The crossmodal spatial attention affects face processing. ICNC 2014: 969-973 - 2013
- [j7]Kan Zhang, Nick Antonopoulos:
A novel bartering exchange ring based incentive mechanism for peer-to-peer systems. Future Gener. Comput. Syst. 29(1): 361-369 (2013) - [j6]Guangquan Zhang, Kan Zhang, Xueyang Zhu, Mingcai Chen, Chengkai Xu, Yuzhen Shao:
Modeling and Analyzing Method for CPS Software Architecture Energy Consumption. J. Softw. 8(11): 2974-2981 (2013) - [c33]Jun Kong, Kan Zhang, Xuefeng Chen:
Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers. HCI (22) 2013: 38-44 - [c32]Liang Zhang, Kan Zhang:
The Effects of Spatial Attention on Face Processing: An ERPs Study. HCI (24) 2013: 541-550 - 2012
- [j5]Juan Liu, Yajun Liu, Wei Pan, Xianghong Sun, Kan Zhang:
Future Computer-aided Decision-making Support Systems: Concerning more about the Mechanism of Human Behavior. J. Softw. 7(3): 712-717 (2012) - [c31]Juan Liu, Xianghong Sun, Yan Ge, Kan Zhang:
More cooperative, or more uncooperative: decision-making after subliminal priming with emotional faces. UbiComp 2012: 1133-1137 - [c30]Xianghong Sun, Yan Ge, Kan Zhang, Juan Liu:
Affective priming with subliminal auditory stimulus exposure. UbiComp 2012: 1138 - 2011
- [c29]Fan Yang, Xianghong Sun, Kan Zhang, Biyun Zhu:
The Number of Trials with Target Affects the Low Prevalence Effect. HCI (21) 2011: 126-131 - [c28]Lu Yu, Xianghong Sun, Kan Zhang:
Driving Distraction Analysis by ECG Signals: An Entropy Analysis. HCI (15) 2011: 258-264 - [c27]Ying Wang, Huiting Zhang, Lu Yu, Kan Zhang, Xianghong Sun, Thomas Plocher:
Believe What You Hear, Not What You See - Vision Interferes with Auditory Route Guidance in Complex Environment. HCI (3) 2011: 346-354 - [i1]Lin Wang, Xiang Li, Yi-Qing Zhang, Yan Zhang, Kan Zhang:
Evolution of scaling emergence in large-scale spatial epidemic spreading. CoRR abs/1105.4965 (2011) - 2010
- [c26]Kan Zhang, Nick Antonopoulos:
A Lightweight Reputation System for Bartering Exchange Based Incentive Mechanisms in Peer-to-Peer Systems. INCoS 2010: 443-448
2000 – 2009
- 2009
- [c25]Kan Zhang, Nick Antonopoulos, Zaigham Mahmood:
A Review of Incentive Mechanism in Peer-to-Peer Systems. AP2PS 2009: 45-50 - [c24]Liang Zhang, Brigitte Röder, Kan Zhang:
Effects of Attention on Dynamic Emotional Expressions Processing. Brain Informatics 2009: 45-52 - [c23]Kan Zhang, Nick Antonopoulos:
Towards a Cluster Based Incentive Mechanism for P2P Networks. CCGRID 2009: 532-537 - [c22]Xianggang Xu, Xianghong Sun, Kan Zhang:
Spatial Categorization and Computation - Empirical Evidence from Artificial Label. ICNC (5) 2009: 93-98 - [c21]Qiping Zhang, Weina Qu, Kan Zhang:
Do strangers trust in video-mediated communication? IWIC 2009: 325-328 - 2008
- [c20]Kyriakos Koukoumpetsos, Nick Antonopoulos, Kan Zhang, Georgios Exarchakos:
Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility. ICN 2008: 602-607 - [c19]Georgios Exarchakos, Nick Antonopoulos, Kan Zhang:
Firewalks: Discovery Mechanism for Non-Replicable Reusable Resources. INC 2008: 65-76 - [c18]Nick Antonopoulos, Georgios Exarchakos, Kan Zhang:
Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments. INC 2008: 125-137 - 2007
- [c17]Yan Ge, Ronggang Zhou, Xi Liu, Kan Zhang:
Chinese Color Preference in Software Design. HCI (13) 2007: 62-68 - [c16]Xueqin Hao, Zhiguo Wang, Fan Yang, Ying Wang, Yanru Guo, Kan Zhang:
The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study. HCI (13) 2007: 288-296 - [c15]Huiyang Li, Xianghong Sun, Kan Zhang:
Voice Alarm System in Emergency Evacuation. HCI (13) 2007: 723-730 - [c14]Ronggang Zhou, Kan Zhang:
Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data. HCI (3) 2007: 789-798 - [c13]Huiyang Li, Xianghong Sun, Kan Zhang:
Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. SNPD (3) 2007: 1084-1088 - 2006
- [j4]Qiping Zhang, Thippaya Chintakovid, Xiaoning Sun, Yan Ge, Kan Zhang:
Saving Face or Sharing Personal Information? A Cross-Cultural Study on Knowledge Sharing. J. Inf. Knowl. Manag. 5(1): 73-79 (2006) - 2005
- [j3]Jiancheng Zhuang, Stephen LaConte, Scott Peltier, Kan Zhang, Xiaoping Hu:
Connectivity exploration with structural equation modeling: an fMRI study of bimanual motor coordination. NeuroImage 25(2): 462-470 (2005) - 2004
- [c12]Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang:
Controlling Who Tracks Me. Security Protocols Workshop 2004: 151-154 - [e1]Kan Zhang, Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3225, Springer 2004, ISBN 3-540-23208-7 [contents] - 2003
- [j2]Changxu Wu, Kan Zhang, Yongge Hu:
Human performance modeling in temporary segmentation Chinese character handwriting recognizers. Int. J. Hum. Comput. Stud. 58(4): 483-508 (2003) - [c11]Tim Kindberg, Kan Zhang:
Secure Spontaneous Device Association. UbiComp 2003: 124-131 - [c10]Tim Kindberg, Kan Zhang:
Validating and Securing Spontaneous Associations between Wireless Devices. ISC 2003: 44-53 - 2002
- [j1]William A. Arbaugh, Narendar Shankar, Yung-Chun (Justin) Wan, Kan Zhang:
Your 80211 wireless network has no clothes. IEEE Wirel. Commun. 9(6): 44-51 (2002) - [c9]Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das:
Authentication and Authorization of Mobile Clients in Public Data Networks. InfraSec 2002: 115-128 - [c8]Kan Zhang, Tim Kindberg:
An authorization infrastructure for nomadic computing. SACMAT 2002: 107-113 - [c7]Tim Kindberg, Kan Zhang, Narendar Shankar:
Context Authentication Using Constrained Channels. WMCSA 2002: 14-21 - 2000
- [b1]Kan Zhang:
On secure information flow in computer systems. University of Cambridge, UK, 2000
1990 – 1999
- 1998
- [c6]Kan Zhang:
Efficient Protocols for Signing Routing Messages. NDSS 1998 - [c5]Fabien A. P. Petitcolas, Kan Zhang:
WebGroup: A Secure Group Access Control Tool for the World-Wide Web. WETICE 1998: 301-305 - 1997
- [c4]Kan Zhang:
A Theory for System Security. CSFW 1997: 148-155 - [c3]Kan Zhang:
IRI: A Quantitative Approach to Inference Analysis in Relational Databases. DBSec 1997: 279-290 - [c2]Kan Zhang:
On Rough Sets and Inference Analysis. ISW 1997: 256-265 - [c1]Kan Zhang:
Threshold Proxy Signature Schemes. ISW 1997: 282-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint