


Остановите войну!
for scientists:


default search action
Xianxian Li
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j44]Jing Liu, Xianxian Li, Quanmin Wei
, Songfeng Liu, Zhaohui Liu, Jinyan Wang
:
A two-phase random forest with differential privacy. Appl. Intell. 53(10): 13037-13051 (2023) - [j43]Yanxia Gong
, Xianxian Li, Li-e Wang
:
FedMBC: Personalized federated learning via mutually beneficial collaboration. Comput. Commun. 205: 108-117 (2023) - [j42]Quanmin Wei
, Jinyan Wang
, Xingcheng Fu
, Jun Hu, Xianxian Li:
AIC-GNN: Adversarial information completion for graph neural networks. Inf. Sci. 626: 166-179 (2023) - [j41]Li-e Wang, Yuelan Qi, Yan Bai, Zhigang Sun
, Dongcheng Li, Xianxian Li:
MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain. Inf. Sci. 638: 118915 (2023) - [j40]Yuecen Wei, Xingcheng Fu, Dongqi Yan, Qingyun Sun, Hao Peng, Jia Wu, Jinyan Wang, Xianxian Li:
Heterogeneous graph neural network with semantic-aware differential privacy guarantees. Knowl. Inf. Syst. 65(10): 4085-4110 (2023) - [j39]Zedu Chen
, Bineng Zhong
, Guorong Li
, Shengping Zhang
, Rongrong Ji
, Zhenjun Tang
, Xianxian Li
:
SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network. IEEE Trans. Pattern Anal. Mach. Intell. 45(4): 5158-5173 (2023) - [j38]Jinyu Wang
, Minquan Cheng
, Youlong Wu
, Xianxian Li
:
Multi-Access Coded Caching With Optimal Rate and Linear Subpacketization Under PDA and Consecutive Cyclic Placement. IEEE Trans. Commun. 71(6): 3178-3190 (2023) - [j37]Yaozong Zheng, Bineng Zhong
, Qihua Liang, Zhenjun Tang
, Rongrong Ji
, Xianxian Li
:
Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1671-1683 (2023) - [j36]Jie Ma
, Xiangyuan Lan
, Bineng Zhong
, Guorong Li
, Zhenjun Tang
, Xianxian Li
, Rongrong Ji
:
Robust Tracking via Uncertainty-Aware Semantic Consistency. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1740-1751 (2023) - [j35]Binfei Chu
, Yiting Lin
, Bineng Zhong
, Zhenjun Tang
, Xianxian Li
, Jing Wang
:
Robust Long-Term Tracking via Localizing Occluders. ACM Trans. Multim. Comput. Commun. Appl. 19(2s): 89:1-89:15 (2023) - [c46]Hongyan Peng, Tongtong Wu, Zhenkui Shi, Xianxian Li:
FedEF: Federated Learning for Heterogeneous and Class Imbalance Data. ISCC 2023: 619-624 - [c45]Jun Hu, Jinyan Wang, Quanmin Wei, Du Kai, Xianxian Li:
Learning Graph Neural Networks on Feature-Missing Graphs. KSEM (1) 2023: 255-262 - [c44]Li-E Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu, Zhigang Sun, Tianran Liu:
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S). SEKE 2023: 323-328 - [i5]Minquan Cheng, Youlong Wu, Xianxian Li:
Asymptotically Optimal Cascaded Coded Distributed Computing via Combinatorial Designs. CoRR abs/2302.05826 (2023) - [i4]Yaozong Zheng, Bineng Zhong, Qihua Liang, Guorong Li, Rongrong Ji, Xianxian Li:
Towards Unified Token Learning for Vision-Language Tracking. CoRR abs/2308.14103 (2023) - 2022
- [j34]Chunpei Li
, Xianxian Li, Peng Liu, Wangjie Qiu, Chuanjian Yao, Bo Yuan:
Efficient and traceable data sharing for the Internet of Things in smart cities. Comput. Electr. Eng. 103: 108389 (2022) - [j33]Bin Qu
, Yan Bai, Yul Chu, Li-e Wang, Feng Yu, Xianxian Li:
Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach. Comput. Networks 215: 109181 (2022) - [j32]Jiawen Qin, Jinyan Wang
, Qiyu Li, Shijian Fang, Xianxian Li, Lei Lei
:
Differentially private frequent episode mining over event streams. Eng. Appl. Artif. Intell. 110: 104681 (2022) - [j31]Xianxian Li, Bing Cai, Li-e Wang, Lei Lei:
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication. Frontiers Comput. Sci. 16(4): 164816 (2022) - [j30]Qihuang Chen, Bineng Zhong, Qihua Liang, Qingyong Deng, Xianxian Li:
Teacher-student knowledge distillation for real-time correlation tracking. Neurocomputing 500: 537-546 (2022) - [j29]Quanmin Wei
, Jinyan Wang
, Jun Hu, Xianxian Li, Tong Yi:
OGT: optimize graph then training GNNs for node classification. Neural Comput. Appl. 34(24): 22209-22222 (2022) - [j28]De Li, Jinyan Wang
, Qiyu Li, Yuhang Hu, Xianxian Li:
A privacy preservation framework for feedforward-designed convolutional neural networks. Neural Networks 155: 14-27 (2022) - [j27]Zhenkui Shi
, Xuemei Fu
, Xianxian Li
, Kai Zhu:
ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption. IEEE Trans. Knowl. Data Eng. 34(7): 3241-3254 (2022) - [c43]Xianxian Li, Jie Lei, Zhenkui Shi, Feng Yu:
An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree. BigCom 2022: 365-371 - [c42]Matej Kristan, Ales Leonardis, Jirí Matas, Michael Felsberg, Roman P. Pflugfelder, Joni-Kristian Kämäräinen, Hyung Jin Chang, Martin Danelljan, Luka Cehovin Zajc, Alan Lukezic, Ondrej Drbohlav, Johanna Björklund, Yushan Zhang, Zhongqun Zhang, Song Yan, Wenyan Yang, Dingding Cai, Christoph Mayer, Gustavo Fernández, Kang Ben, Goutam Bhat, Hong Chang, Guangqi Chen, Jiaye Chen, Shengyong Chen, Xilin Chen, Xin Chen, Xiuyi Chen, Yiwei Chen, Yu-Hsi Chen, Zhixing Chen, Yangming Cheng, Angelo Ciaramella, Yutao Cui, Benjamin Dzubur, Mohana Murali Dasari, Qili Deng, Debajyoti Dhar, Shangzhe Di, Emanuel Di Nardo, Daniel K. Du, Matteo Dunnhofer, Heng Fan, Zhen-Hua Feng, Zhihong Fu, Shang Gao, Rama Krishna Gorthi, Eric Granger
, Q. H. Gu, Himanshu Gupta, Jianfeng He, Keji He, Yan Huang, Deepak Jangid, Rongrong Ji, Cheng Jiang, Yingjie Jiang, Felix Järemo Lawin, Ze Kang, Madhu Kiran, Josef Kittler, Simiao Lai, Xiangyuan Lan, Dongwook Lee, Hyunjeong Lee, Seohyung Lee, Hui Li, Ming Li, Wangkai Li, Xi Li, Xianxian Li, Xiao Li, Zhe Li, Liting Lin, Haibin Ling, Bo Liu, Chang Liu, Si Liu, Huchuan Lu, Rafael M. O. Cruz, Bingpeng Ma, Chao Ma, Jie Ma, Yinchao Ma, Niki Martinel, Alireza Memarmoghadam
, Christian Micheloni, Payman Moallem, Le Thanh Nguyen-Meidine, Siyang Pan, ChangBeom Park, Danda Pani Paudel, Matthieu Paul, Houwen Peng, Andreas Robinson, Litu Rout, Shiguang Shan, Kristian Simonato, Tianhui Song, Xiaoning Song, Chao Sun, Jingna Sun, Zhangyong Tang, Radu Timofte, Chi-Yi Tsai, Luc Van Gool, Om Prakash Verma, Dong Wang, Fei Wang, Liang Wang, Liangliang Wang, Lijun Wang, Limin Wang, Qiang Wang, Gangshan Wu, Jinlin Wu, Xiaojun Wu, Fei Xie, Tianyang Xu, Wei Xu, Yong Xu, Yuanyou Xu, Wanli Xue, Zizheng Xun, Bin Yan, Dawei Yang, Jinyu Yang, Wankou Yang, Xiaoyun Yang, Yi Yang, Yichun Yang, Zongxin Yang, Botao Ye, Fisher Yu, Hongyuan Yu, Jiaqian Yu, Qianjin Yu, Weichen Yu, Kang Ze, Jiang Zhai, Chengwei Zhang, Chunhu Zhang, Kaihua Zhang, Tianzhu Zhang, Wenkang Zhang, Zhibin Zhang, Zhipeng Zhang, Jie Zhao, Shao-Chuan Zhao, Feng Zheng, Haixia Zheng, Min Zheng, Bineng Zhong, Jiawen Zhu, Xuefeng Zhu, Yueting Zhuang:
The Tenth Visual Object Tracking VOT2022 Challenge Results. ECCV Workshops (8) 2022: 431-460 - [c41]Yuecen Wei, Xingcheng Fu
, Qingyun Sun, Hao Peng, Jia Wu
, Jinyan Wang, Xianxian Li:
Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation. ICDM 2022: 528-537 - [c40]Xianxian Li, Tianran Liu, Li-e Wang, Zhigang Sun, Huachang Zeng:
Next POI Recommendation with Neighbor and Location Popularity. ICONIP (2) 2022: 367-378 - [c39]Peng Liu, Shuyi Zhang, Chuanjian Yao, Wenzhe Ye, Xianxian Li:
Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography. ICPR 2022: 68-74 - [c38]De Li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang:
A Green Neural Network with Privacy Preservation and Interpretability. TrustCom 2022: 606-614 - [i3]Yuecen Wei, Xingcheng Fu, Qingyun Sun, Hao Peng, Jia Wu, Jinyan Wang, Xianxian Li:
Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation. CoRR abs/2210.00538 (2022) - 2021
- [j26]Xianxian Li, Jing Liu, Songfeng Liu, Jinyan Wang:
Differentially private ensemble learning for classification. Neurocomputing 430: 34-46 (2021) - [j25]Guoqiu Wen, Xianxian Li, Yonghua Zhu, Linjun Chen, Qimin Luo, Malong Tan:
One-step spectral rotation clustering for imbalanced high-dimensional data. Inf. Process. Manag. 58(1): 102388 (2021) - [j24]Jinhuan Duan, Xianxian Li
, Shiqi Gao, Zili Zhong, Jinyan Wang
:
SSGD: A Safe and Efficient Method of Gradient Descent. Secur. Commun. Networks 2021: 5404061:1-5404061:11 (2021) - [j23]Li-e Wang
, Yan Bai
, Quan Jiang, Victor C. M. Leung
, Wei Cai
, Xianxian Li
:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1154-1166 (2021) - [c37]Jiahui Peng, Chunpei Li, Bo Yuan, Hongwei Meng, Feng Yu, Xianxian Li:
SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric. CBD 2021: 224-229 - [c36]Xianxian Li, Jie Li, Feng Yu, Xuemei Fu, Junhao Yang, Yue Chen:
BEIR: A Blockchain-based Encrypted Image Retrieval Scheme. CSCWD 2021: 452-457 - [c35]Xianxian Li, Xuemei Fu, Feng Yu, Zhenkui Shi, Jie Li, Junhao Yang:
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System. CSCWD 2021: 1033-1039 - [c34]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning To Filter: Siamese Relation Network for Robust Tracking. CVPR 2021: 4421-4431 - [c33]Matej Kristan, Jirí Matas
, Ales Leonardis, Michael Felsberg, Roman P. Pflugfelder, Joni-Kristian Kämäräinen, Hyung Jin Chang, Martin Danelljan, Luka Cehovin Zajc, Alan Lukezic, Ondrej Drbohlav, Jani Käpylä, Gustav Häger, Song Yan, Jinyu Yang, Zhongqun Zhang, Gustavo Fernández, Mohamed H. Abdelpakey, Goutam Bhat, Llukman Cerkezi, Hakan Cevikalp, Shengyong Chen, Xin Chen, Miao Cheng, Ziyi Cheng, Yu-Chen Chiu, Ozgun Cirakman, Yutao Cui, Kenan Dai, Mohana Murali Dasari, Qili Deng, Xingping Dong, Daniel K. Du, Matteo Dunnhofer, Zhen-Hua Feng, Zhiyong Feng, Zhihong Fu, Shiming Ge, Rama Krishna Gorthi, Yuzhang Gu, Bilge Günsel, Qing Guo, Filiz Gurkan, Wencheng Han, Yanyan Huang, Felix Järemo Lawin, Shang-Jhih Jhang, Rongrong Ji, Cheng Jiang, Yingjie Jiang, Felix Juefei-Xu, J. Yin, Xiao Ke, Fahad Shahbaz Khan, Byeong Hak Kim, Josef Kittler, Xiangyuan Lan, Jun Ha Lee, Bastian Leibe
, Hui Li, Jianhua Li, Xianxian Li, Yuezhou Li, Bo Liu, Chang Liu, Jingen Liu, Li Liu, Qingjie Liu, Huchuan Lu, Wei Lu, Jonathon Luiten, Jie Ma, Ziang Ma, Niki Martinel, Christoph Mayer, Alireza Memarmoghadam
, Christian Micheloni, Yuzhen Niu, Danda Pani Paudel, Houwen Peng, Shoumeng Qiu, Aravindh Rajiv, Muhammad Rana, Andreas Robinson, Hasan Saribas, Ling Shao, Mohamed S. Shehata
, Furao Shen, Jianbing Shen, Kristian Simonato, Xiaoning Song, Zhangyong Tang, Radu Timofte
, Philip H. S. Torr, Chi-Yi Tsai
, Bedirhan Uzun, Luc Van Gool, Paul Voigtlaender, Dong Wang, Guangting Wang, Liangliang Wang, Lijun Wang, Limin Wang, Linyuan Wang, Yong Wang, Yunhong Wang, Chenyan Wu, Gangshan Wu, Xiaojun Wu, Fei Xie, Tianyang Xu, Xiang Xu, Wanli Xue, Bin Yan, Wankou Yang, Xiaoyun Yang, Yu Ye, Jun Yin, Chengwei Zhang, Chunhui Zhang, Haitao Zhang, Kaihua Zhang, Kangkai Zhang, Xiaohan Zhang, Xiaolin Zhang, Xinyu Zhang
, Zhibin Zhang, Shao-Chuan Zhao, Ming Zhen, Bineng Zhong, Jiawen Zhu, Xuefeng Zhu:
The Ninth Visual Object Tracking VOT2021 Challenge Results. ICCVW 2021: 2711-2738 - [c32]Li-e Wang, Yihui Wang, Yan Bai, Peng Liu, Xianxian Li:
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation. INFOCOM Workshops 2021: 1-6 - [c31]Xianxian Li, Junhao Yang, Shiqi Gao, Zhenkui Shi, Jie Li, Xuemei Fu:
DBS: Blockchain-Based Privacy-Preserving RBAC in IoT. QSHINE 2021: 94-110 - [c30]Xianxian Li, Jiahui Peng, Zhenkui Shi, Chunpei Li:
Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain. QSHINE 2021: 111-125 - [c29]Xiaohong Liu, Hanbo Cai, De Li, Xianxian Li, Jinyan Wang:
Differential Privacy Preservation in Adaptive K-Nets Clustering. TrustCom 2021: 405-412 - [c28]Yuhang Hu, De Li, Zhou Tan, Xianxian Li, Jinyan Wang:
Adaptive Clipping Bound of Deep Learning with Differential Privacy. TrustCom 2021: 428-435 - [i2]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning to Filter: Siamese Relation Network for Robust Tracking. CoRR abs/2104.00829 (2021) - 2020
- [j22]Bin Qu
, Li-e Wang
, Peng Liu
, Zhenkui Shi
, Xianxian Li
:
GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System. IEEE Access 8: 48325-48336 (2020) - [j21]Jinyan Wang, Shijian Fang, Chen Liu, Jiawen Qin, Xianxian Li, Zhenkui Shi:
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams. Future Gener. Comput. Syst. 111: 339-351 (2020) - [j20]Peng Liu, Yuanxin Xu, Quan Jiang, Yuwei Tang, Yameng Guo, Li-e Wang, Xianxian Li:
Local differential privacy for social network publishing. Neurocomputing 391: 273-279 (2020) - [c27]Hanbo Cai, Jinyan Wang, Xiaohong Liu, Xianxian Li:
DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering. BigDataSE 2020: 73-79 - [c26]Li-e Wang, Shan Lin, Yan Bai, Sang-Yoon Chang, Xianxian Li, Peng Liu:
A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network. ICC 2020: 1-7 - [c25]De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. TrustCom 2020: 631-638 - [i1]Jinhuan Duan, Xianxian Li, Shiqi Gao, Jinyan Wang, Zili Zhong:
SSGD: A safe and efficient method of gradient descent. CoRR abs/2012.02076 (2020)
2010 – 2019
- 2019
- [j19]Jinyan Wang, Chen Liu, Xingcheng Fu
, Xudong Luo, Xianxian Li:
A three-phase approach to differentially private crucial patterns mining over data streams. Comput. Secur. 82: 30-48 (2019) - [j18]Jinyan Wang, Kai Du, Xudong Luo, Xianxian Li:
Two privacy-preserving approaches for data publishing with identity reservation. Knowl. Inf. Syst. 60(2): 1039-1080 (2019) - [j17]Wei Ge, Xianxian Li, Chunfeng Yuan, Yihua Huang:
Correlation-aware partitioning for skewed range query optimization. World Wide Web 22(1): 125-151 (2019) - [c24]Xianxian Li, Chunfeng Luo, Peng Liu, Li-e Wang:
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory. DASC/PiCom/DataCom/CyberSciTech 2019: 918-923 - 2018
- [j16]Jinyan Wang
, Chaoji Deng, Xianxian Li:
Two Privacy-Preserving Approaches for Publishing Transactional Data Streams. IEEE Access 6: 23648-23658 (2018) - [j15]Li-e Wang
, Xianxian Li:
A graph-based multifold model for anonymizing data with attributes of multiple types. Comput. Secur. 72: 122-135 (2018) - [j14]Xianxian Li, Peipei Sui, Yan Bai, Li-E Wang:
M-generalization for multipurpose transactional data publication. Frontiers Comput. Sci. 12(6): 1241-1254 (2018) - [j13]Jinyan Wang
, Guoqing Cai, Chen Liu, Jingli Wu, Xianxian Li:
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory. Symmetry 10(8): 333 (2018) - [c23]Dongran Yu, Huaxing Zhao, Li-e Wang, Peng Liu, Xianxian Li:
A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing. MSPN 2018: 224-239 - [e1]Shichao Zhang, Tie-Yan Liu, Xianxian Li, Jiafeng Guo, Chenliang Li:
Information Retrieval - 24th China Conference, CCIR 2018, Guilin, China, September 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11168, Springer 2018, ISBN 978-3-030-01011-9 [contents] - 2017
- [j12]Peipei Sui
, Xianxian Li, Yan Bai:
A Study of Enhancing Privacy for Intelligent Transportation Systems: $k$ -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data. IEEE Access 5: 24555-24567 (2017) - [j11]Peipei Sui, Xianxian Li:
A privacy-preserving approach for multimodal transaction data integrated analysis. Neurocomputing 253: 56-64 (2017) - [j10]Peng Liu, Yan Bai, Lie Wang, Xianxian Li:
Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing. Int. J. Softw. Eng. Knowl. Eng. 27(1): 71-90 (2017) - [j9]Lie Wang, Yuanxin Xu, Xianxian Li, Peng Liu:
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System). 计算机科学 44(9): 178-183 (2017) - [c22]Li-e Wang, Yameng Guo, Xianxian Li:
Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model. BigDataService 2017: 204-209 - [c21]Xiaoyi Hu, Li-e Wang, Jiaqi Tang, Cong Lei, Peng Liu, Xianxian Li:
Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks. Healthcom 2017: 1-6 - [c20]Peng Liu, Li-e Wang, Xianxian Li:
Randomized Perturbation for Privacy-Preserving Social Network Data Publishing. ICBK 2017: 208-213 - 2016
- [j8]Zhenjun Tang, Xianquan Zhang, Xianxian Li, Shichao Zhang:
Robust Image Hashing With Ring Partition and Invariant Vector Distance. IEEE Trans. Inf. Forensics Secur. 11(1): 200-214 (2016) - [c19]Liuhua Chen, Shenghai Zhong, Li-e Wang, Xianxian Li:
A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data. Financial Cryptography 2016: 460-473 - [c18]Huanjie Wang, Peng Liu, Shan Lin, Xianxian Li:
A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks. QSHINE 2016: 36-45 - [c17]Peipei Sui, Xianxian Li:
ROAT: Road-Network-Based Anonymization of Trajectories. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 309-314 - 2015
- [j7]Peng Liu, Xianxian Li, Lie Wang:
社会网络分析软件研究 (Study of Social Network Analysis Software). 计算机科学 42(12): 171-174 (2015) - [c16]Li-e Wang, Xianxian Li:
A Hybrid Optimization Approach for Anonymizing Transactional Data. ICA3PP (Workshops and Symposiums) 2015: 120-132 - 2014
- [j6]Lie Wang, Xianxian Li:
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data. Int. J. Softw. Eng. Knowl. Eng. 24(7): 1091- (2014) - [c15]Li-e Wang, Xianxian Li:
Personalized Privacy Protection for Transactional Data. ADMA 2014: 253-266 - [c14]Peng Liu, Lei Cui, Xianxian Li:
A Hybrid Algorithm for Privacy Preserving Social Network Publication. ADMA 2014: 267-278 - [c13]Peipei Sui, Tianyu Wo, Zhangle Wen, Xianxian Li:
Privacy Risks in Publication of Taxi GPS Data. HPCC/CSS/ICESS 2014: 1189-1196 - [c12]Jia Jiao, Peng Liu, Xianxian Li:
A Personalized Privacy Preserving Method for Publishing Social Network Data. TAMC 2014: 141-157 - 2013
- [c11]Jilian Zhang, Xiaofeng Zhu
, Xianxian Li, Shichao Zhang:
Mining Item Popularity for Recommender Systems. ADMA (2) 2013: 372-383 - [c10]Peng Liu, Xianxian Li:
An Improved Privacy Preserving Algorithm for Publishing Social Network Data. HPCC/EUC 2013: 888-895 - [c9]Peipei Sui, Tianyu Wo, Zhangle Wen, Xianxian Li:
Privacy-Preserving Trajectory Publication against Parking Point Attacks. UIC/ATC 2013: 569-574 - 2012
- [j5]Jie Xu, Dacheng Zhang, Lu Liu
, Xianxian Li:
Dynamic Authentication for Cross-Realm SOA-Based Business Processes. IEEE Trans. Serv. Comput. 5(1): 20-32 (2012)
2000 – 2009
- 2009
- [j4]Jinpeng Huai, Ting Deng, Xianxian Li, Zongxia Du, Huipeng Guo:
AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee. Sci. China Ser. F Inf. Sci. 52(9): 1534-1549 (2009) - [c8]Ting Deng, Jinpeng Huai, Xianxian Li, Zongxia Du, Huipeng Guo:
Automated synthesis of composite services with correctness guarantee. WWW 2009: 1127-1128 - 2008
- [c7]Li Lin, Jinpeng Huai, Yanmin Zhu, Chunming Hu, Xianxian Li:
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks. OTM Conferences (1) 2008: 231-248 - 2007
- [c6]Dacheng Zhang, Jie Xu, Xianxian Li:
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. DSN 2007: 440-449 - 2006
- [j3]Xianxian Li, Jinpeng Huai:
Cryptographic protocol security analysis based on bounded constructing algorithm. Sci. China Ser. F Inf. Sci. 49(1): 26-47 (2006) - [c5]Xianxian Li, Lijun Liu:
A Multi-agent Cooperative Model and System for Integrated Security Monitoring. CANS 2006: 329-341 - [c4]Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang:
A Software Protocol of Goals and Operations Based on BDI Model. SUTC (1) 2006: 454-461 - 2005
- [c3]Yu Zhang, Xianxian Li, Jinpeng Huai, Yunhao Liu:
Access Control in Peer-to-Peer Collaborative Systems. ICDCS Workshops 2005: 835-840 - [c2]Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu:
Distributed Access Control in CROWN Groups. ICPP 2005: 435-442 - [c1]Jianxin Li, Jinpeng Huai, Qin Li, Xianxian Li:
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. MSN 2005: 1073-1080 - 2004
- [j2]Jinpeng Huai, Xianxian Li:
Algebra model and security analysis for cryptographic protocols. Sci. China Ser. F Inf. Sci. 47(2): 199-220 (2004) - 2002
- [j1]Xianxian Li, Jinpeng Huai:
Efficient Non-Repudiation Multicast Source Authentication Schemes. J. Comput. Sci. Technol. 17(6): 820-829 (2002)