default search action
Kai Xi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c6]Kai Xi, Stephen Gould, Sylvie Thiébaux:
Neuro-Symbolic Learning of Lifted Action Models from Visual Traces. ICAPS 2024: 653-662 - [i1]Yannick Emonds, Kai Xi, Holger Fröning:
Implications of Noise in Resistive Memory on Deep Neural Networks for Image Classification. CoRR abs/2401.05820 (2024) - 2023
- [c5]Peng Ling, Kai Xi, Peng Chen, Xi Yu, Kang Li:
The Effect of Channel Ordering Based on the Entropy Weight Graph on the MI-EEG Classification. ICIRA (6) 2023: 518-526 - 2022
- [j14]Xueqin Yang, Yannan Xu, Jinshun Bi, Kai Xi, Linjie Fan, Lanlong Ji, Gaobo Xu:
Total ionizing dose effects on aluminum oxide/zirconium-doped hafnium oxide stack ferroelectric tunneling junctions. Sci. China Inf. Sci. 65(6): 1-2 (2022) - [c4]Hongyang Hu, Zi Wang, Xiaoxin Xu, Kai Xi, Kun Zhang, Junyu Zhang, Chunmeng Dou:
A 55nm 32Mb Digital Flash CIM Using Compressed LUT Multiplier and Low Power WL Voltage Trimming Scheme for AI Edge Inference. APCCAS 2022: 1-5 - [c3]Kai Xi, Xiaofeng Gong, Qiuhua Lin:
An Algebraic Coupled Canonical Polyadic Decomposition Algorithm via Joint Eigenvalue Decomposition. ICDSP 2022: 29-34 - 2021
- [j13]Jianjian Wang, Jinshun Bi, Gang Liu, Hua Bai, Kai Xi, Bo Li, Sandip Majumdar, Lanlong Ji, Ming Liu, Zhangang Zhang:
Simulations of single event effects on the ferroelectric capacitor-based non-volatile SRAM design. Sci. China Inf. Sci. 64(4) (2021) - 2020
- [j12]Gangping Yan, Jinshun Bi, Gaobo Xu, Kai Xi, Bo Li, Linjie Fan, Huaxiang Yin:
Simulation of Total Ionizing Dose (TID) Effects Mitigation Technique for 22 nm Fully-Depleted Silicon-on-Insulator (FDSOI) Transistor. IEEE Access 8: 154898-154905 (2020) - [j11]Guoliang Tian, Jinshun Bi, Gaobo Xu, Kai Xi, Xueqin Yang, Sandip Majumdar, Huaxiang Yin, Qiuxia Xu, Wenwu Wang:
Single-event-transient effects in silicon-on-insulator ferroelectric double-gate vertical tunneling field effect transistors. Sci. China Inf. Sci. 63(12) (2020) - [j10]Linjie Fan, Jinshun Bi, Kai Xi, Sandip Majumdar, Bo Li:
Performance Optimization of FD-SOI Hall Sensors Via 3D TCAD Simulations. Sensors 20(10): 2751 (2020) - [j9]Linjie Fan, Jinshun Bi, Kai Xi, Gangping Yan:
Investigation of Radiation Effects on FD-SOI Hall Sensors by TCAD Simulations. Sensors 20(14): 3946 (2020)
2010 – 2019
- 2019
- [j8]Kai Xi, Jinshun Bi, Sandip Majumdar, Bo Li, Jing Liu, Yannan Xu, Ming Liu:
Total ionizing dose effects on graphene-based charge-trapping memory. Sci. China Inf. Sci. 62(12): 222401 (2019) - 2018
- [j7]Jinshun Bi, Yuan Duan, Kai Xi, Bo Li:
Total ionizing dose and single event effects of 1 Mb HfO2-based resistive-random-access memory. Microelectron. Reliab. 88-90: 891-897 (2018) - 2017
- [j6]Yannan Xu, Jinshun Bi, Gaobo Xu, Kai Xi, Bo Li, Ming Liu:
Total ionizing dose effects and annealing behaviors of HfO2-based MOS capacitor. Sci. China Inf. Sci. 60(12): 120401:1-120401:3 (2017) - 2016
- [j5]Hanxu Ji, Feng Zhou, Jiangjiang Gu, Chen Shu, Kai Xi, Xudong Jia:
Nitrogen-Doped Carbon Dots as A New Substrate for Sensitive Glucose Determination. Sensors 16(5): 630 (2016) - [j4]Kai Xi, Jiankun Hu, B. V. K. Vijaya Kumar:
FE-SViT: A SViT-Based Fuzzy Extractor Framework. ACM Trans. Embed. Comput. Syst. 15(4): 78:1-78:24 (2016) - 2012
- [b1]Kai Xi:
Biometric Security System Design: From Mobile to Cloud Computing Environment. University of New South Wales, Canberra, Australia, 2012 - [j3]Kai Xi, Jiankun Hu, Fengling Han:
Mobile device access control: an improved correlation based face authentication scheme and its Java ME application. Concurr. Comput. Pract. Exp. 24(10): 1066-1085 (2012) - 2011
- [j2]Kai Xi, Yan Tang, Jiankun Hu:
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment. Comput. J. 54(10): 1632-1644 (2011) - [j1]Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu:
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Networks 4(5): 487-499 (2011) - 2010
- [p1]Kai Xi, Jiankun Hu:
Bio-Cryptography. Handbook of Information and Communication Security 2010: 129-157
2000 – 2009
- 2009
- [c2]Kai Xi, Jiankun Hu:
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault. ICC 2009: 1-5 - 2007
- [c1]Yi Wang, Jiankun Hu, Kai Xi, Vijayakumar Bhagavatula:
Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology. AutoID 2007: 35-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint