Name
Affiliation
Papers
XIYANG LIU
Xidian Univ, Inst Software Engn, Xian 710071, Shaanxi, Peoples R China
41
Collaborators
Citations 
PageRank 
105
159
18.55
Referers 
Referees 
References 
396
678
346
Search Limit
100678
Title
Citations
PageRank
Year
Automatic zipper tape defect detection using two-stage multi-scale convolutional networks00.342021
A human-in-the-loop deep learning paradigm for synergic visual evaluation in children.10.412020
Breaking Text-based CAPTCHAs using Average Vertical Partition.00.342019
Research on the Security of Microsoft’s Two-Layer Captcha50.442017
Improved Ctt-Sp Algorithm With Critical Path Method For Massive Data Storage In Scientific Workflow Systems00.342016
A Hybrid Evolutionary Algorithm Based On Dominated Clustering For Constrained Bi-Objective Optimization Problems00.342016
A Disease Module Detection Algorithm For Lung Adenocarcinoma Tumor Network With Significance Of Connections And Network Controllability Methodology00.342016
Community Detection Algorithm Based On The Scale Free Property Of Networks00.342015
The Robustness Of Face-Based Captchas10.352015
Pso Based Multiobjective Reliable Optimization Model For Cloud Storage10.342015
Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems.00.342015
The Robustness of "Connecting Characters Together" CAPTCHAs.30.422014
On an integrated mapping and scheduling solution to large-scale scientific workflows in resource sharing environments20.372013
The robustness of hollow CAPTCHAs110.522013
An Audio CAPTCHA to Distinguish Humans from Computers150.682013
An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems00.342013
Draw a line on your PDA to authenticate00.342013
The effect of baroque music on the PassPoints graphical password10.392013
A GPU-based implementation of an enhanced GEP algorithm50.512012
A Novel Cued-recall Graphical Password Scheme.30.372011
An enhanced drawing reproduction graphical password strategy30.402011
Exploration of a hand-based graphical password scheme10.352011
A New Graphical Password Scheme Resistant to Shoulder-Surfing100.592010
Cluster based architecture synthesis minimizing the resources under time constraint20.392010
A Novel Image Based CAPTCHA Using Jigsaw Puzzle90.522010
Against Spyware Using CAPTCHA in Graphical Password Scheme80.472010
Analysis and Evaluation of the ColorLogin Graphical Password Scheme60.502009
A new graphical password scheme against spyware by using CAPTCHA130.612009
An Effective Reversible Debugger of Cross Platform Based on Virtualization10.362009
Towards a Reversible BPEL Debugger00.342008
YAGP: Yet Another Graphical Password Strategy312.032008
DTAD: A Dynamic Taint Analysis Detector for Information Security10.392008
Fitness calculation approach for the switch-case construct in evolutionary testing40.442008
Fitness calculation approach for nested if-else construct in evolutionary testing10.362007
DFTL: a Description Language for Transformation of Data Formats00.342007
PORD: a Reversible Debugging Tool using Dynamic Binary Translation10.372007
Function Call Flow based Fitness Function Design in Evolutionary Testing10.352007
Fifi: an architecture to realize self-evolving of Java program10.372006
A unified fitness function calculation rule for flag conditions to improve evolutionary testing140.762005
Evolutionary Testing of Unstructured Programs in the Presence of Flag Problems30.402005
Octopus Architecture: A New Attempt to Achieve Reliable OS10.372005