Description of gluon propagation in the presence of an A 2 condensate X Li, CM Shakin Physical Review D 71 (7), 074007, 2005 | 38 | 2005 |
RFID applications in cyber-physical system N Wu, X Li RFID Applications in Cyber-Physical System, 291-302, 2011 | 26 | 2011 |
Calculation of the properties of the σ meson in a generalized Nambu–Jona-Lasinio model with Lorentz-vector confinement LS Celenza, XD Li, CM Shakin Physical Review C 55 (6), 3083, 1997 | 17 | 1997 |
Chiral symmetry breaking in the presence of a confining interaction LS Celenza, XD Li, CM Shakin Physical Review C 55 (3), 1492, 1997 | 16 | 1997 |
Cloud computing: introduction, application and security from industry perspectives X Li International Journal of Computer Science and Network Security 11 (5), 224-228, 2011 | 15 | 2011 |
Singlet-octet mixing of scalar mesons in a generalized Nambu–Jona-Lasinio model LS Celenza, XD Li, CM Shakin Physical Review C 56 (6), 3326, 1997 | 14 | 1997 |
Radial excitations in the analysis of φ-ω and mixing B Huang, XD Li, CM Shakin Physical Review C 58 (6), 3648, 1998 | 13 | 1998 |
An elementary electronc voting protocol using RFID X Li, M Carlisle, AC Kwan, L Leung, A Enemuo, M Anshel 2007 IEEE SMC Information Assurance and Security Workshop, 234-238, 2007 | 12 | 2007 |
Quark propagation in the presence of a⟨ A μ a A a μ⟩ condensate X Li, CM Shakin Physical Review D 70 (11), 114011, 2004 | 9 | 2004 |
An improved architecture of a realizable quantum computer for quantum programming languages N Wu, FM Song, X Li Quantum Information and Computation VII 7342, 132-141, 2009 | 6 | 2009 |
Quark propagation in the quark-gluon plasma X Li, H Li, CM Shakin, Q Sun Physical Review C 69 (6), 065201, 2004 | 6 | 2004 |
Quantum software framework: a tentative study N Wu, H Hu, F Song, H Zheng, X Li Frontiers of Computer Science 7, 341-349, 2013 | 4 | 2013 |
Study of a quantum framework for search based software engineering N Wu, F Song, X Li International Journal of Theoretical Physics 52, 2181-2186, 2013 | 3 | 2013 |
Post-Quantum Diffie-Hellman and Symmetric Key Exchange Protocols X Li, L Leung, X Zhang 2006 IEEE Information Assurance Workshop, 382-383, 2006 | 3 | 2006 |
A novel quantum random number generation algorithm used by smartphone camera N Wu, K Wang, H Hu, F Song, X Li Quantum Information and Computation XIII 9500, 324-329, 2015 | 2 | 2015 |
The New Trend of Security in Cloud Computing X Li Intern. J. Engin. Innov. & Res 1, 2012 | 2 | 2012 |
The Computing Journey: From Abacus to Quantum Computer. N Wu, FM Song, X Li GSTF Journal on Computing 1 (2), 2011 | 2 | 2011 |
A novel model of node location service based on wireless sensor networks and statistical method X Lai, J Li, X Li, N Wu Wireless Sensing, Localization, and Processing V 7706, 210-215, 2010 | 2 | 2010 |
A new software-based architecture for quantum computer N Wu, FM Song, X Li Quantum Information and Computation VIII 7702, 263-269, 2010 | 2 | 2010 |
A simulating model of pollutant diffusion in coastal water based on cellular automata HH Shi, XQ Li Disaster Adv 3 (4), 297-300, 2010 | 2 | 2010 |