default search action
Yijia Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu, Weipeng Cao:
Hacker group identification based on dynamic heterogeneous graph node update. Appl. Soft Comput. 158: 111587 (2024) - [j9]Hongyu Pan, Yong Fang, Wenbo Guo, Yijia Xu, Changhui Wang:
Few-shot graph classification on cross-site scripting attacks detection. Comput. Secur. 140: 103749 (2024) - [j8]Kaiyang Wang, Huaxin Deng, Yijia Xu, Zhonglin Liu, Yong Fang:
Multi-target label backdoor attacks on graph neural networks. Pattern Recognit. 152: 110449 (2024) - [j7]Yijia Xu, Hamid Ebrahimy, Zhou Zhang:
Bayesian Joint Adaptation Network for Crop Mapping in the Absence of Mapping Year Ground-Truth Samples. IEEE Trans. Geosci. Remote. Sens. 62: 1-20 (2024) - 2023
- [j6]Zhonglin Liu, Yong Fang, Cheng Huang, Yijia Xu:
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. Comput. Secur. 124: 103015 (2023) - [j5]Yijia Xu, Yong Fang, Zhonglin Liu, Qiang Zhang:
PWAGAT: Potential Web attacker detection based on graph attention network. Neurocomputing 557: 126725 (2023) - [i1]Yijia Xu, Liqiang Zhang, Wuming Zhang, Suhong Liu, Jingwen Li, Xingang Li, Yuebin Wang, Yang Li:
Fine-Grained Extraction of Road Networks via Joint Learning of Connectivity and Segmentation. CoRR abs/2312.04744 (2023) - 2022
- [j4]Qi Wang, Shubing Jia, Jie Zheng, Rongwu Xiang, Yong Cui, Jinghai Zhang, Yijia Xu, Mingyi Zhao:
Analysis of CFTR gene expression as an immunological and prognostic biomarker in pan-cancers. Comput. Biol. Medicine 146: 105614 (2022) - [j3]Han Zhong, Zheng Li, Peng Chen, Hao Lu, Yijia Xu:
The selection of burglary cases based on multidimensional features and PageRank. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j2]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu:
HGHAN: Hacker group identification based on heterogeneous graph attention network. Inf. Sci. 612: 848-863 (2022) - [c10]Zhonglin Liu, Yong Fang, Yijia Xu:
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. FCS 2022: 89-104 - [c9]Shaohua Wang, Yong Fang, Yijia Xu, Yaxian Wang:
Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 653-662 - [c8]Yijia Xu, Yong Fang, Zhonglin Liu:
Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network. MSN 2022: 398-407 - 2020
- [c7]Karine Ip, Abhijith Asok, Yijia Xu, Duc Le, Natalie Mionis, Roman Batoukov:
ML-Assisted Monitoring and Characterization of IoT Sensor Networks. EAIS 2020: 1-8
2010 – 2019
- 2019
- [j1]Yong Fang, Cheng Huang, Yijia Xu, Yang Li:
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet 11(8): 177 (2019) - [c6]Yong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ICICT (2) 2019: 99-115 - 2018
- [c5]Teck-Yian Lim, Raymond A. Yeh, Yijia Xu, Minh N. Do, Mark Hasegawa-Johnson:
Time-Frequency Networks for Audio Super-Resolution. ICASSP 2018: 646-650 - [c4]Yijia Xu, Mark Hasegawa-Johnson, Nancy McElwain:
Infant Emotional Outbursts Detection in Infant-parent Spoken Interactions. INTERSPEECH 2018: 242-246 - 2012
- [c3]Yijia Xu, Ming Jiang, Meiling Ding, Yushan Yang:
An efficient OSD-aided iterative decoding algorithm for LTE turbo codes. WCSP 2012: 1-4 - [c2]Huang Zhou, Ming Jiang, Yijia Xu, Meiling Ding:
An SLVA-aided turbo decoding scheme for free-space optical communications. WCSP 2012: 1-4
2000 – 2009
- 2005
- [b1]Yijia Xu:
A simulation Platform for Experimentation and Evaluation of Distributed-Computing Systems. University of Arizona, Tucson, USA, 2005 - [c1]Yijia Xu, Suvrajeet Sen:
A distributed computing architecture for simulation and optimization. WSC 2005: 365-373
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint