


default search action
Xiaohui Han
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Lijuan Xu
, Baolong An
, Xin Li
, Dawei Zhao
, Haipeng Peng
, Weizhao Song
, Fenghua Tong
, Xiaohui Han:
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT. IEEE Internet Things J. 12(1): 30-44 (2025) - [j17]Xinhua Wang, Houping Yue, Lei Guo, Feng Guo, Chen He
, Xiaohui Han:
User identification network with contrastive clustering for shared-account recommendation. Inf. Process. Manag. 62(3): 104055 (2025) - [j16]Linlin Ren
, Lei Guo
, Hui Yu, Feng Guo, Xinhua Wang, Xiaohui Han:
Collaborating with top scientists may not improve paper novelty: A causal analysis based on the propensity score matching method. J. Informetrics 19(1): 101609 (2025) - [j15]Ziang Lu
, Lei Guo
, Xu Yu
, Zhiyong Cheng
, Xiaohui Han
, Lei Zhu
:
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation. ACM Trans. Inf. Syst. 43(4): 103:1-103:27 (2025) - [j14]Lei Guo, Chenlong Song, Feng Guo, Xiaohui Han, Xiaojun Chang, Lei Zhu:
Semantic-enhanced Co-attention Prompt Learning for Non-overlapping Cross-domain Recommendation. ACM Trans. Inf. Syst. 43(5): 137:1-137:27 (2025) - [c24]Lin Chen, Peipei Wang, Xiaohui Han, Lijuan Xu:
Multi-Relational Variational Contrastive Learning for Next POI Recommendation. ICASSP 2025: 1-5 - [c23]Jinghui Ni, Hui Cui, Lihai Zhao, Fengling Li
, Xiaohui Han, Lijuan Xu:
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval. ICASSP 2025: 1-5 - [i3]Ziang Lu, Lei Guo, Xu Yu, Zhiyong Cheng, Xiaohui Han, Lei Zhu:
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation. CoRR abs/2503.23026 (2025) - [i2]Lei Guo, Chenlong Song, Feng Guo, Xiaohui Han, Xiaojun Chang, Lei Zhu:
Semantic-enhanced Co-attention Prompt Learning for Non-overlapping Cross-Domain Recommendation. CoRR abs/2505.19085 (2025) - 2024
- [j13]Qiuling Liu, Lei Guo
, Yiping Sun, Linlin Ren, Xinhua Wang, Xiaohui Han:
Do scholars' collaborative tendencies impact the quality of their publications? A generalized propensity score matching analysis. J. Informetrics 18(1): 101487 (2024) - [j12]Xuejiao Luo
, Xiaohui Han
, Wenbo Zuo, Xiaoming Wu, Wenyin Liu
:
MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training. IEEE Trans. Inf. Forensics Secur. 19: 4518-4533 (2024) - [c22]Hui Cui, Lihai Zhao, Fengling Li
, Lei Zhu, Xiaohui Han, Jingjing Li:
Effective Comparative Prototype Hashing for Unsupervised Domain Adaptation. AAAI 2024: 8329-8337 - [c21]Weihua Liu, Xiaohui Han, Wenbo Zuo, Yu Sun:
HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network Traffic. CSCWD 2024: 693-698 - [c20]Yang Liu, Xiaohui Han, Wenbo Zuo, Haiqing Lv, Jing Guo:
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence. CSCWD 2024: 2728-2733 - [c19]Haiqing Lv, Xiaohui Han, Hui Cui, Peipei Wang, Wenbo Zuo, Yang Zhou:
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier Network. IJCNN 2024: 1-8 - [c18]Yuecheng Wen, Xiaohui Han, Wenbo Zuo, Weihua Liu:
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted Network Traffic. IJCNN 2024: 1-8 - [c17]Haiqing Lv, Xiaohui Han, Peipei Wang, Wenbo Zuo, Jing Guo, Lijuan Xu:
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement. ISPA 2024: 1584-1590 - [c16]Menglu Wang, Xiaohui Han, Peipei Wang, Wenbo Zuo:
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference. SMC 2024: 3839-3844 - 2023
- [j11]Xiaohui Han, Jianping Dong
:
Applications of fractional gradient descent method with adaptive momentum in BP neural networks. Appl. Math. Comput. 448: 127944 (2023) - [j10]Xiaohui Han
, Song Huang, Xu Zhang, Yingkuo Zhu, Guoqing An, Zhenbin Du:
A transformer condition recognition method based on dissolved gas analysis features selection and multiple models fusion. Eng. Appl. Artif. Intell. 123(Part C): 106518 (2023) - [c15]Xiaohui Han, Yanran Li, Shuyu Li:
A mobile crowdsensing task allocation method in the scenario of environmental protection. DSIT 2023: 13-19 - [c14]Yu Sun, Guangqi Liu, Xiaohui Han, Wenbo Zuo, Weihua Liu:
FusionNet: An Effective Network Phishing Website Detection Framework Based on Multi-Modal Fusion. HPCC/DSS/SmartCity/DependSys 2023: 474-481 - [c13]Meng Liu, Xiaohui Han, Wenbo Zuo, Xuejiao Luo, Lei Guo:
An Interpretable Vulnerability Detection Framework Based on Multi-task Learning. ICONIP (13) 2023: 228-242 - [c12]Xiao Cui, Xiaohui Han, Guangqi Liu, Wenbo Zuo, Zhiwen Wang:
Communication-Efficient Federated Learning for Network Traffic Anomaly Detection. MSN 2023: 398-405 - 2022
- [c11]Xuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu:
A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection. TrustCom 2022: 818-826 - [i1]Lianxin Song, Xiaohui Han, Guangqi Liu, Wentong Wang, Chaoran Cui, Yilong Yin:
Sequential Multi-task Learning with Task Dependency for Appeal Judgment Prediction. CoRR abs/2204.07046 (2022) - 2020
- [j9]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. Comput. Secur. 92: 101749 (2020) - [j8]Dawei Zhao
, Shumian Yang, Xiaohui Han, Shuhui Zhang
, Zhen Wang
:
Dismantling and Vertex Cover of Network Through Message Passing. IEEE Trans. Circuits Syst. 67-II(11): 2732-2736 (2020)
2010 – 2019
- 2019
- [j7]Xiaohui Han
, Lianhai Wang, Shujiang Xu
, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. Comput. Secur. 87 (2019) - [c10]Yongchao Xu, Qizheng Yang, Chaoran Cui, Cheng Shi, Guangle Song, Xiaohui Han, Yilong Yin:
Visual Urban Perception with Deep Semantic-Aware Network. MMM (2) 2019: 28-40 - [c9]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [j6]Zhenwu Wang, Xiaohua Lv, Xiaohui Han:
基于四叉树分割的地形LOD技术综述 (Survey of Terrain LOD Technology Based on Quadtree Segmentation). 计算机科学 45(4): 34-45 (2018) - [j5]Shuhui Zhang
, Xiangxu Meng
, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. Secur. Commun. Networks 2018: 9410278:1-9410278:16 (2018) - [j4]Ben Guan, Yong Zang, Xiaohui Han, Kailun Zheng:
Cold-Rolled Strip Steel Stress Detection Technology Based on a Magnetoresistance Sensor and the Magnetoelastic Effect. Sensors 18(5): 1638 (2018) - [c8]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ICICS 2018: 584-597 - 2017
- [j3]Xiaohui Han
, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. IEEE Trans. Inf. Forensics Secur. 12(9): 2242-2255 (2017) - [c7]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - [c6]Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. ISI 2017: 19-24 - 2016
- [j2]Jin Zhang, Wei Li, Hong-Liang Cui
, Changcheng Shi, Xiaohui Han, Yuting Ma, Jiandong Chen, Tianying Chang, Dongshan Wei
, Yumin Zhang, Yufeng Zhou:
Nondestructive Evaluation of Carbon Fiber Reinforced Polymer Composites Using Reflective Terahertz Imaging. Sensors 16(6): 875 (2016) - [c5]Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang:
Social Media account linkage using user-generated geo-location data. ISI 2016: 157-162 - 2014
- [j1]Xiaohui Han, Jun Ma, Yun Wu, Chaoran Cui:
A novel machine learning approach to rank web forum posts. Soft Comput. 18(5): 941-959 (2014) - [c4]Shuhui Zhang, Lianhai Wang, Xiaohui Han:
A KVM Virtual Machine Memory Forensics Method Based on VMCS. CIS 2014: 657-661 - 2011
- [c3]Zhaochun Ren, Jun Ma, Gang Wang, Chaoran Cui, Xiaohui Han:
Dynamically Modeling Semantic Dependencies in Web Forum Threads. Web Intelligence 2011: 348-351
2000 – 2009
- 2008
- [c2]Zhumin Chen, Jun Ma, Xiaohui Han, Dongmei Zhang:
An Effective Relevance Prediction Algorithm Based on Hierarchical Taxonomy for Focused Crawling. AIRS 2008: 613-619 - [c1]Cuiling Zhu, Jun Ma, Dongmei Zhang, Xiaohui Han, Xiaofei Niu:
Hierarchical Document Classification Based on a Backtracking Algorithm. FSKD (2) 2008: 467-471
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-12 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint