default search action
Xingyuan Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xingyuan Wang 0001 (aka: Xing-Yuan Wang 0001) — Guangxi Normal University, Guangxi Key Laboratory of Multi-Source Information Mining and Security, China (and 5 more)
- Xingyuan Wang 0002 — Shandong University, School of Management, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Yining Su, Xingyuan Wang, Hao Gao:
Chaotic image encryption algorithm based on bit-level feedback adjustment. Inf. Sci. 679: 121088 (2024) - [j90]Yuhe Fan, Lixun Zhang, Canxing Zheng, Yunqin Zu, Keyi Wang, Xingyuan Wang:
Real-time and accurate model of instance segmentation of foods. J. Real Time Image Process. 21(3): 80 (2024) - [j89]Yuhe Fan, Lixun Zhang, Canxing Zheng, Xingyuan Wang, Jinghui Zhu, Lan Wang:
Instance segmentation of faces and mouth-opening degrees based on improved YOLOv8 method. Multim. Syst. 30(5): 269 (2024) - [j88]Rong Chen, Xiaomeng Li, Lin Teng, Xingyuan Wang:
An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion. Multim. Tools Appl. 83(2): 3681-3706 (2024) - [j87]Xingyuan Wang, Maochang Zhao:
A new spatiotemporal chaos model and its application in bit-level image encryption. Multim. Tools Appl. 83(4): 10481-10502 (2024) - [j86]Xingyuan Wang, Ziyu Leng:
Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence. Multim. Tools Appl. 83(11): 31603-31627 (2024) - [j85]Jiawei Xiong, Feng Liu, Xingyuan Wang, Chaozhong Yang:
Siamese Transformer-Based Building Change Detection in Remote Sensing Images. Sensors 24(4): 1268 (2024) - [j84]Yafei Wang, Lin Teng, Xingyuan Wang:
An image encryption algorithm based on circular rotation and generalized Feistel structure. Soft Comput. 28(5): 4335-4358 (2024) - [j83]Xingyuan Wang, Yufei Xue, Jie Zhang, Yan Hong, Song Guo, Xianyi Zeng:
A Sustainable Supply Chain Design for Personalized Customization in Industry 5.0 Era. IEEE Trans. Ind. Informatics 20(6): 8786-8797 (2024) - [c5]Han Xu, Xingyuan Wang, Haipeng Chen:
Towards Real-Time and Personalized Code Generation. CIKM 2024: 5568-5569 - [c4]Han Xu, Xingyuan Wang, Shihao Ji:
Towards Energy-Efficient Llama2 Architecture on Embedded FPGAs. CIKM 2024: 5570-5571 - 2023
- [j82]Xingyuan Wang, Yafei Wang:
Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points. Expert Syst. Appl. 213(Part): 118924 (2023) - [j81]Jinling Leng, Xingyuan Wang, Shiping Wu, Chun Jin, Meng Tang, Rui Liu, Alexander Vogl, Huiyu Liu:
A multi-objective reinforcement learning approach for resequencing scheduling problems in automotive manufacturing systems. Int. J. Prod. Res. 61(15): 5156-5175 (2023) - [j80]Xingyuan Wang, Nana Guan:
2D sine-logistic-tent-coupling map for image encryption. J. Ambient Intell. Humaniz. Comput. 14(10): 13399-13419 (2023) - [j79]Xingyuan Wang, Xuan Chen, Maochang Zhao:
A new two-dimensional sine-coupled-logistic map and its application in image encryption. Multim. Tools Appl. 82(23): 35719-35755 (2023) - [j78]Yining Su, Xingyuan Wang:
Quantum color image encryption based on controlled two-particle quantum walks. Multim. Tools Appl. 82(27): 42679-42697 (2023) - [j77]Rong Chen, Fan Zhang, Lin Teng, Xingyuan Wang:
Medical image characteristic region recognition encryption algorithm based on intra and inter blocks scrambling and LSCC chaotic map. Multim. Tools Appl. 82(29): 45839-45867 (2023) - [j76]Abdurrahim Toktas, Ugur Erkan, Deniz Ustun, Xingyuan Wang:
Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm. Neural Comput. Appl. 35(18): 13207-13223 (2023) - [j75]Xingyuan Wang, Maochang Zhao, Sijia Feng, Xuan Chen:
An image encryption scheme using bit-plane cross-diffusion and spatiotemporal chaos system with nonlinear perturbation. Soft Comput. 27(3): 1223-1240 (2023) - [j74]Xingyuan Wang, Shengnan Chen:
An image encryption algorithm based on pixel bit operation and nonlinear chaotic system. Vis. Comput. 39(7): 3123-3144 (2023) - [j73]Xingyuan Wang, Xuan Chen:
Image encryption algorithm based on cross-scrambling and rapid-mode diffusion. Vis. Comput. 39(10): 5041-5068 (2023) - [c3]Xingyuan Wang, Chunyu Wang, Chunyan Wang, Huaiying Shang:
Joint Optimization Method of Task Sequencing and Assignment for Power Measurement Laboratory. ICBAR 2023: 212-219 - 2022
- [j72]Hongjun Liu, Xingyuan Wang, Mengdi Zhao, Yujun Niu:
Constructing Strong S-Box by 2D Chaotic Map with Application to Irreversible Parallel Key Expansion. Int. J. Bifurc. Chaos 32(11): 2250163:1-2250163:12 (2022) - [j71]Xingyuan Wang, Xiaohui Du:
Chaotic image encryption method based on improved zigzag permutation and DNA rules. Multim. Tools Appl. 81(30): 43777-43803 (2022) - 2021
- [j70]Xingyuan Wang, Jingjing Yang:
A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 569: 217-240 (2021) - [j69]Xingyuan Wang, Wenhua Xue, Jubai An:
Image encryption algorithm based on LDCML and DNA coding sequence. Multim. Tools Appl. 80(1): 591-614 (2021) - [j68]Xingyuan Wang, Shujuan Lin, Yong Li:
Bit-level image encryption algorithm based on BP neural network and gray code. Multim. Tools Appl. 80(8): 11655-11670 (2021) - [j67]Xingyuan Wang, Lin Liu:
Application of chaotic Josephus scrambling and RNA computing in image encryption. Multim. Tools Appl. 80(15): 23337-23358 (2021) - [j66]Hongjun Liu, Xingyuan Wang, Abdurahman Kadir:
Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput. 25(16): 11077-11086 (2021) - [i1]Hongjun Liu, Xingyuan Wang, Yuxuan Li:
Cryptanalyze and design strong S-Box using 2D chaotic map and apply to irreversible key expansion. CoRR abs/2111.05015 (2021) - 2020
- [j65]Xingyuan Wang, Hongyu Zhao:
Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multim. Tools Appl. 79(27-28): 19005-19024 (2020) - [j64]Chao Luo, Nannan Zhang, Xingyuan Wang:
Time series prediction based on intuitionistic fuzzy cognitive map. Soft Comput. 24(9): 6835-6850 (2020)
2010 – 2019
- 2019
- [j63]Xingyuan Wang, Hongyu Zhao:
Cracking and Improvement of an Image Encryption Algorithm Based on Bit-Level Permutation and Chaotic System. IEEE Access 7: 112836-112847 (2019) - [j62]Chao Luo, Chenhao Tan, Xingyuan Wang, Yuanjie Zheng:
An evolving recurrent interval type-2 intuitionistic fuzzy neural network for online learning and time series prediction. Appl. Soft Comput. 78: 150-163 (2019) - [j61]Haiyue Wang, Chao Luo, Xingyuan Wang:
Synchronization and identification of nonlinear systems by using a novel self-evolving interval type-2 fuzzy LSTM-neural network. Eng. Appl. Artif. Intell. 81: 79-93 (2019) - [j60]Guanghui Cao, Xingyuan Wang:
Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multim. Tools Appl. 78(8): 10625-10647 (2019) - [j59]Xingyuan Wang, Mingxiao Xu, Yong Li:
Fast encryption scheme for 3D models based on chaos system. Multim. Tools Appl. 78(23): 33865-33884 (2019) - [j58]Xingyuan Wang, Huaihuai Sun:
A chaotic image encryption algorithm based on zigzag-like transform and DNA-like coding. Multim. Tools Appl. 78(24): 34981-34997 (2019) - 2018
- [j57]Chao Luo, Xingyuan Wang, Yuanjie Zheng:
Co-evolution of cooperation and limited resources on interdependent networks. Appl. Math. Comput. 316: 174-185 (2018) - [j56]Fuchen Zhang, Rui Chen, Xingyuan Wang, Xiusu Chen, Chunlai Mu, Xiaofeng Liao:
Dynamics of a New 5D Hyperchaotic System of Lorenz Type. Int. J. Bifurc. Chaos 28(3): 1850036:1-1850036:12 (2018) - [j55]Dongyan Li, Xingyuan Wang, Penghe Huang:
A Max-Min ant colony algorithm for fractal dimension of complex networks. Int. J. Comput. Math. 95(10): 1927-1936 (2018) - [j54]Xiangjun Wu, Kunshu Wang, Xingyuan Wang, Haibin Kan, Jürgen Kurths:
Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 148: 272-287 (2018) - 2017
- [j53]Xingyuan Wang, Tianfang Zhao:
Model for multi-messages spreading over complex networks considering the relationship between messages. Commun. Nonlinear Sci. Numer. Simul. 48: 63-69 (2017) - [j52]Fuchen Zhang, Xingyuan Wang, Xiaofeng Liao, Guangyun Zhang, Chunlai Mu:
Dynamical Behaviors of a Modified Lorenz-Stenflo Chaotic System. Int. J. Bifurc. Chaos 27(5): 1750074:1-1750074:10 (2017) - 2016
- [j51]Shi-Bing Wang, Xingyuan Wang, Yufei Zhou, Bo Han:
A Memristor-Based Hyperchaotic Complex Lü System and Its Adaptive Complex Generalized Synchronization. Entropy 18(2): 58 (2016) - [j50]Xingyuan Wang, Siwei Wang, Zhanjie Wang, Mengcan Zhang:
A new key agreement protocol based on Chebyshev chaotic maps. Secur. Commun. Networks 9(18): 5028-5035 (2016) - 2015
- [j49]Shi-Bing Wang, Xingyuan Wang, Yufei Zhou:
A Memristor-Based Complex Lorenz System and Its Modified Projective Synchronization. Entropy 17(11): 7628-7644 (2015) - [j48]Xing-Yuan Wang, Dou-Dou Zhang, Na Wei:
Fractal image coding algorithm using particle swarm optimisation and hybrid quadtree partition scheme. IET Image Process. 9(2): 153-161 (2015) - 2014
- [j47]Yi Liang, Xingyuan Wang:
A method of quickly calculating the number of pinning nodes on pinning synchronization in complex networks. Appl. Math. Comput. 246: 743-751 (2014) - [j46]Qiang Wei, Xingyuan Wang, Xiao-Peng Hu:
Chaos Synchronization in Complex Oscillators Networks with Time Delay via Adaptive Complex Feedback Control. Circuits Syst. Signal Process. 33(8): 2427-2447 (2014) - [j45]Xingyuan Wang, Dapeng Luan, Xuemei Bao:
Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 25: 244-247 (2014) - [j44]Xing-Yuan Wang, Sheng-Xian Gu:
New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inf. Secur. 8(3): 213-216 (2014) - [j43]Fuchen Zhang, Xingyuan Wang, Min Xiao, Xiangkai Sun:
On the New Results of Global Exponential Attractive Sets of the T Chaotic System. Int. J. Bifurc. Chaos 24(7) (2014) - [j42]Yi Liang, Xingyuan Wang, Justine Eustace:
Adaptive synchronization in complex networks with non-delay and variable delay couplings via pinning control. Neurocomputing 123: 292-298 (2014) - [j41]Xiaoyuan Wang, Guangyi Wang, Xingyuan Wang:
Dynamic Character Analysis of a LDR, memristor-Based Chaotic System. J. Circuits Syst. Comput. 23(6) (2014) - [j40]Justine Eustace, Xingyuan Wang, Junqiu Li:
Approximating web communities using subspace decomposition. Knowl. Based Syst. 70: 118-127 (2014) - [j39]Xingyuan Wang, Zongyu Wang:
The method for image retrieval based on multi-factors correlation utilizing block truncation coding. Pattern Recognit. 47(10): 3293-3303 (2014) - [c2]Yongqing Liu, Yipin Li, Xingyuan Wang, Xiaotian Shao, Aihua Wang:
Work in progress: Iterative threshold setting strategy based on second-order statistics for interference suppression in frequency domain. ChinaCom 2014: 373-376 - 2013
- [j38]Xingyuan Wang, Dapeng Luan:
A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(11): 3075-3085 (2013) - [j37]Xingyuan Wang, Dandan Zhang, Xing Guo:
Authentication and recovery of images using standard deviation. J. Electronic Imaging 22(3): 033012 (2013) - [j36]Chao Luo, Xingyuan Wang:
Hybrid modified function projective synchronization of two different dimensional complex nonlinear systems with parameters identification. J. Frankl. Inst. 350(9): 2646-2663 (2013) - [j35]Hongjun Liu, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J. Syst. Softw. 86(3): 826-834 (2013) - [j34]Xingyuan Wang, Zongyu Wang:
A novel method for image retrieval based on structure elements' descriptor. J. Vis. Commun. Image Represent. 24(1): 63-74 (2013) - [j33]Xinjun Zhang, Xingyuan Wang:
Chaos-based partial encryption of SPIHT coded color images. Signal Process. 93(9): 2422-2431 (2013) - [j32]Chao Luo, Xingyuan Wang:
Algebraic Representation of Asynchronous Multiple-Valued Networks and Its Dynamics. IEEE ACM Trans. Comput. Biol. Bioinform. 10(4): 927-938 (2013) - 2012
- [j31]Xingyuan Wang, Mogei Wang:
Attaining chaos synchronization by using the non-generating partitions. Appl. Math. Lett. 25(12): 2312-2316 (2012) - [j30]Hongjun Liu, Xingyuan Wang, Abdurahman Kadir:
Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5): 1457-1466 (2012) - [j29]Xing-Yuan Wang, Zhi-Feng Chen, Jiao-Jiao Yun:
An effective method for color image retrieval based on texture. Comput. Stand. Interfaces 34(1): 31-35 (2012) - [j28]Xingyuan Wang, Zhifeng Chen, Xuemei Bao:
An Improved Edge-Directed Image interpolation Algorithm. Int. J. Image Graph. 12(4) (2012) - 2011
- [j27]Xing-Yuan Wang, Zhi-Feng Chen, Jiao-Jiao Yun:
A Novel Two-Level Color Image Retrieval Method. Int. J. Image Graph. 11(3): 339-353 (2011) - 2010
- [j26]Hongjun Liu, Xingyuan Wang:
Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10): 3320-3327 (2010) - [j25]Xing-Yuan Wang, Jian-Feng Zhao:
Cryptanalysis on a parallel keyed hash function based on chaotic neural network. Neurocomputing 73(16-18): 3224-3228 (2010) - [j24]Xing-Yuan Wang, Yuan-Xing Wang, Jiao-Jiao Yun:
An improved no-search fractal image coding method based on a fitting plane. Image Vis. Comput. 28(8): 1303-1308 (2010) - [j23]Tianzhi Yang, Bo Fang, Xingyuan Wang, Wenhu Huang:
Approximate analytical solutions for Kolmogorov's equations. J. Comput. Appl. Math. 235(3): 747-755 (2010) - [j22]Yingchun Wang, Huaguang Zhang, Xingyuan Wang, Dongsheng Yang:
Networked Synchronization Control of Coupled Dynamic Networks With Time-Varying Delay. IEEE Trans. Syst. Man Cybern. Part B 40(6): 1468-1479 (2010)
2000 – 2009
- 2009
- [j21]Xingyuan Wang, Luo Chao, Meng Juan:
Nonlinear dynamic research on EEG signals in HAI experiment. Appl. Math. Comput. 207(1): 63-74 (2009) - [j20]Xingyuan Wang, Ruihong Jia, Zhenfeng Zhang:
The generalized Mandelbrot set perturbed by composing noise of additive and multiplicative. Appl. Math. Comput. 210(1): 107-118 (2009) - [j19]Xingyuan Wang, Canghai Yu:
Cryptanalysis and improvement on a cryptosystem based on a chaotic map. Comput. Math. Appl. 57(3): 476-482 (2009) - [j18]Xingyuan Wang, Wenjing Song, Lixian Zou:
Julia Set of the Newton Method for Solving Some Complex Exponential equation. Int. J. Image Graph. 9(2): 153-169 (2009) - [j17]Xing-Yuan Wang, Fanping Li, Shuguo Wang:
Fractal image compression based on spatial correlation and hybrid genetic algorithm. J. Vis. Commun. Image Represent. 20(8): 505-510 (2009) - [j16]Xing-Yuan Wang, Zhi-Feng Chen:
An improved image interpolation algorithm. Multidimens. Syst. Signal Process. 20(4): 385-396 (2009) - 2008
- [j15]Xingyuan Wang, Xu Zhang, Yuanyuan Sun, Fanping Li:
Dynamics of the generalized M set on escape-line diagram. Appl. Math. Comput. 206(1): 474-484 (2008) - [j14]Xing-Yuan Wang, Shuguo Wang:
An improved no-search fractal image coding method based on a modified gray-level transform. Comput. Graph. 32(3): 445-450 (2008) - [j13]Xingyuan Wang, Meng Juan:
A 2-D ECG compression algorithm based on wavelet transform and vector quantization. Digit. Signal Process. 18(2): 179-188 (2008) - [c1]Tiankai Sun, Xiaogen Shao, Xingyuan Wang:
A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic Encryption. ICYCS 2008: 2797-2802 - 2007
- [j12]Xingyuan Wang, Xu Zhang:
The divisor periodic point of escape-time N of the Mandelbrot set. Appl. Math. Comput. 187(2): 1552-1556 (2007) - [j11]Xingyuan Wang, Xuejing Yu:
Visualizing generalized 3x+1 function dynamics based on fractal. Appl. Math. Comput. 188(1): 234-243 (2007) - [j10]Xingyuan Wang, Peijun Chang, Ni-ni Gu:
Additive perturbed generalized Mandelbrot-Julia sets. Appl. Math. Comput. 189(1): 754-765 (2007) - [j9]Xingyuan Wang, Xuejing Yu:
Julia sets for the standard Newton's method, Halley's method, and Schröder's method. Appl. Math. Comput. 189(2): 1186-1195 (2007) - [j8]Xing-Yuan Wang, Yuan-Yuan Sun:
The general quaternionic M-J sets on the mapping z : = zalpha+c (alpha in N). Comput. Math. Appl. 53(11): 1718-1732 (2007) - 2006
- [j7]Xingyuan Wang, Wei Liu:
The Julia set of Newton's method for multiple root. Appl. Math. Comput. 172(1): 101-110 (2006) - [j6]Xingyuan Wang, Peijun Chang:
Research on fractal structure of generalized M-J sets utilized Lyapunov exponents and periodic scanning techniques. Appl. Math. Comput. 175(2): 1007-1025 (2006) - [j5]Xingyuan Wang:
The generalized M sets from a class complex mapping system. Appl. Math. Comput. 175(2): 1484-1494 (2006) - [j4]Xingyuan Wang, Bo Liu:
Julia sets of the Schröder iteration functions of a class of one-parameter polynomials with high degree. Appl. Math. Comput. 178(2): 461-473 (2006) - [j3]Xingyuan Wang, Chao Luo:
Generalized Julia sets from a non-analytic complex mapping. Appl. Math. Comput. 181(1): 113-122 (2006) - [j2]Xingyuan Wang, Shi Qijiang:
The generalized Mandelbort-Julia sets from a class of complex exponential map. Appl. Math. Comput. 181(2): 816-825 (2006) - [j1]Xingyuan Wang, Luo Chao:
Researches on chaos phenomenon of EEG dynamics model. Appl. Math. Comput. 183(1): 30-41 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint