Hui Xia

Orcid: 0000-0001-7326-5796

Affiliations:
  • Ocean University of China, Qingdao, China
  • Qingdao University, College of Computer Science and Technology, China (2013 - 2020)
  • Shandong University, School of Computer Science and Technology, Jinan, China (PhD 2013)


According to our database1, Hui Xia authored at least 68 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CATIL: Customized adversarial training based on instance loss.
Inf. Sci., 2025

AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices.
Future Gener. Comput. Syst., 2025

KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning.
Future Gener. Comput. Syst., 2025

2024
Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform.
IEEE Trans. Consumer Electron., November, 2024

FMDADA: Federated multi-discriminative adversarial domain adaptation.
Appl. Intell., September, 2024

Guest Editorial of the Special Section on Consumer Electronics in the Era of the Internet of Everything (IoE) and Massive Data.
IEEE Trans. Consumer Electron., August, 2024

DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation.
IEEE Internet Things J., April, 2024

Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices.
IEEE Trans. Consumer Electron., February, 2024

MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users.
IEEE Trans. Consumer Electron., February, 2024

Guest Editorial of the Special Section on AI Powered Edge Computing for IoT.
IEEE Trans. Sustain. Comput., 2024

A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2024

Classification optimization node injection attack on graph neural networks.
Knowl. Based Syst., 2024

FedNor: A robust training framework for federated learning based on normal aggregation.
Inf. Sci., 2024

Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack.
IEEE Internet Things J., 2024

FLPM: A property modification scheme for data protection in federated learning.
Future Gener. Comput. Syst., 2024

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation.
Future Gener. Comput. Syst., 2024

Multi-agent DRL for edge computing: A real-time proportional compute offloading.
Comput. Networks, 2024

Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2024

DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Scalable Attack on Graph Data by Important Nodes.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Collaborative Adversarial Learning for Unsupervised Federated Domain Adaptation.
Proceedings of the Knowledge Science, Engineering and Management, 2024

An Invisible Backdoor Attack on Cloud Computing in the Internet of Things.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

2023
Reinvigorating sustainability in Internet of Things marketing: Framework for multi-round real-time bidding with game machine learning.
Internet Things, December, 2023

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023

FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition.
Comput. Secur., December, 2023

FedME<sup>2</sup>: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN.
IEEE J. Sel. Areas Commun., November, 2023

Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network.
IEEE Trans. Knowl. Data Eng., May, 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

A dynamic adaptive iterative clustered federated learning scheme.
Knowl. Based Syst., 2023

QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading.
IEEE Trans. Netw. Serv. Manag., December, 2022

Generating Adversarial Examples With Shadow Model.
IEEE Trans. Ind. Informatics, 2022

FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair.
CoRR, 2022

AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture.
CoRR, 2022

SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
CoRR, 2022

Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Network Defense Resource Allocation Scheme with Multi-armed Bandits.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning.
Wirel. Commun. Mob. Comput., 2021

Optimization scheme for intrusion detection scheme GBDT in edge computing center.
Comput. Commun., 2021

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
A Novel Light-Weight Subjective Trust Inference Framework in MANETs.
IEEE Trans. Sustain. Comput., 2020

Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas.
IEEE/ACM Trans. Netw., 2020

A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

An Intrusion Detection Scheme Based on Repeated Game in Smart Home.
Mob. Inf. Syst., 2020

A Dynamic Virus Propagation Model Based on Social Attributes in City IoT.
IEEE Internet Things J., 2020

Modeling and Analysis Botnet Propagation in Social Internet of Things.
IEEE Internet Things J., 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019

DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Towards a Novel Trust-Based Multicast Routing for VANETs.
Secur. Commun. Networks, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

Node Trust Prediction Framework in Mobile Ad Hoc Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2014
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014


  Loading...