Xianxian Li
Orcid: 0000-0002-7083-3847
According to our database1,
Xianxian Li
authored at least 136 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Mach. Learn. Cybern., November, 2024
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag., October, 2024
IEEE Trans. Circuits Syst. Video Technol., October, 2024
A reputation-based and privacy-preserving incentive scheme for mobile crowd sensing: a deep reinforcement learning approach.
Wirel. Networks, August, 2024
Wirel. Networks, August, 2024
IEEE/ACM Trans. Netw., August, 2024
Achieving fair and accountable data trading for educational multimedia data based on blockchain.
Wirel. Networks, July, 2024
A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things.
IEEE Trans. Computers, July, 2024
IEEE Trans. Commun., May, 2024
IEEE Trans. Circuits Syst. Video Technol., April, 2024
IEEE Trans. Circuits Syst. Video Technol., March, 2024
Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: A Method Combining Multisource Data Prediction and Deep Reinforcement Learning.
IEEE Internet Things J., March, 2024
IEEE Trans. Circuits Syst. Video Technol., February, 2024
IEEE Trans. Multim., 2024
MKNBL: Joint multi-channel knowledge-aware network and broad learning for sparse knowledge graph-based recommendation.
Neurocomputing, 2024
Rethinking the impact of noisy labels in graph classification: A utility and privacy perspective.
CoRR, 2024
Comput. J., 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
CRFLOE: Context Region Filter and Relation Word Aware for Document-Level Relation Extraction.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
DocBAN: An Efficient Biaffine Attention Network for Document-Level Named Entity Recognition.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Multi-perspective Information and Multi-task Contrastive Learning for Sequential Recommendations.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential Recommendations.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur., December, 2023
Heterogeneous graph neural network with semantic-aware differential privacy guarantees.
Knowl. Inf. Syst., October, 2023
MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain.
Inf. Sci., August, 2023
Inf. Sci., May, 2023
Comput. Commun., May, 2023
Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network.
IEEE Trans. Circuits Syst. Video Technol., April, 2023
IEEE Trans. Circuits Syst. Video Technol., April, 2023
IEEE Trans. Pattern Anal. Mach. Intell., April, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Multi-Access Coded Caching With Optimal Rate and Linear Subpacketization Under PDA and Consecutive Cyclic Placement.
IEEE Trans. Commun., 2023
Asymptotically Optimal Cascaded Coded Distributed Computing via Combinatorial Designs.
CoRR, 2023
FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Proceedings of the Knowledge Science, Engineering and Management, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023
Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
LTNI-FGML: Federated Graph Machine Learning on Long-Tailed and Non-IID Data via Logit Calibration.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
GFedKRL: Graph Federated Knowledge Re-Learning for Effective Molecular Property Prediction via Privacy Protection.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
A privacy preservation framework for feedforward-designed convolutional neural networks.
Neural Networks, 2022
Neural Comput. Appl., 2022
Neurocomputing, 2022
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication.
Frontiers Comput. Sci., 2022
Eng. Appl. Artif. Intell., 2022
Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach.
Comput. Networks, 2022
Comput. Electr. Eng., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the IEEE International Conference on Data Mining, 2022
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
Inf. Process. Manag., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021
2020
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams.
Future Gener. Comput. Syst., 2020
IEEE Access, 2020
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020
A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
2019
World Wide Web, 2019
Knowl. Inf. Syst., 2019
A three-phase approach to differentially private crucial patterns mining over data streams.
Comput. Secur., 2019
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory.
Symmetry, 2018
Frontiers Comput. Sci., 2018
A graph-based multifold model for anonymizing data with attributes of multiple types.
Comput. Secur., 2018
IEEE Access, 2018
A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017
Int. J. Softw. Eng. Knowl. Eng., 2017
Neurocomputing, 2017
A Study of Enhancing Privacy for Intelligent Transportation Systems: $k$ -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data.
IEEE Access, 2017
Proceedings of the IEEE International Conference on Big Knowledge, 2017
Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data.
Int. J. Softw. Eng. Knowl. Eng., 2014
Proceedings of the Theory and Applications of Models of Computation, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013
2012
IEEE Trans. Serv. Comput., 2012
2009
AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee.
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
2008
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Sci. China Ser. F Inf. Sci., 2006
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
2005
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2004
Sci. China Ser. F Inf. Sci., 2004
2002
J. Comput. Sci. Technol., 2002