Xianxian Li

Orcid: 0000-0002-7083-3847

According to our database1, Xianxian Li authored at least 136 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CausalFD: causal invariance-based fraud detection against camouflaged preference.
Int. J. Mach. Learn. Cybern., November, 2024

A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag., October, 2024

Toward Modalities Correlation for RGB-T Tracking.
IEEE Trans. Circuits Syst. Video Technol., October, 2024

A reputation-based and privacy-preserving incentive scheme for mobile crowd sensing: a deep reinforcement learning approach.
Wirel. Networks, August, 2024

A fair and verifiable federated learning profit-sharing scheme.
Wirel. Networks, August, 2024

Asymptotically Optimal Coded Distributed Computing via Combinatorial Designs.
IEEE/ACM Trans. Netw., August, 2024

Achieving fair and accountable data trading for educational multimedia data based on blockchain.
Wirel. Networks, July, 2024

A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things.
IEEE Trans. Computers, July, 2024

Coded Caching for Dense-User Combination Network in Binary Field.
IEEE Trans. Commun., May, 2024

Toward Unified Token Learning for Vision-Language Tracking.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

Positive-Sample-Free Object Tracking via a Soft Constraint.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: A Method Combining Multisource Data Prediction and Deep Reinforcement Learning.
IEEE Internet Things J., March, 2024

Transformer Tracking via Frequency Fusion.
IEEE Trans. Circuits Syst. Video Technol., February, 2024

Robust Tracking via Bidirectional Transduction With Mask Information.
IEEE Trans. Multim., 2024

Contrastive learning of graphs under label noise.
Neural Networks, 2024

RGB-T tracking with frequency hybrid awareness.
Image Vis. Comput., 2024

MKNBL: Joint multi-channel knowledge-aware network and broad learning for sparse knowledge graph-based recommendation.
Neurocomputing, 2024

SEMSO: A Secure and Efficient Multi-Data Source Blockchain Oracle.
CoRR, 2024

Personalized federated learning based on feature fusion.
CoRR, 2024

Rethinking the impact of noisy labels in graph classification: A utility and privacy perspective.
CoRR, 2024

Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation.
Comput. J., 2024

Higher-order Semantic-aware Adaptive Graph Contrastive Learning.
Proceedings of the International Joint Conference on Neural Networks, 2024

Hyperbolic Geometric Latent Diffusion Model for Graph Generation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

CRFLOE: Context Region Filter and Relation Word Aware for Document-Level Relation Extraction.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

DocBAN: An Efficient Biaffine Attention Network for Document-Level Named Entity Recognition.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

SpanMRC: Query with Entity Length for MRC-Based Named Entity Recognition.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Personalized federated learning based on feature fusion.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Multi-perspective Information and Multi-task Contrastive Learning for Sequential Recommendations.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential Recommendations.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

ODTrack: Online Dense Temporal Token Learning for Visual Tracking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Poincaré Differential Privacy for Hierarchy-Aware Graph Embedding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Explicit Visual Prompts for Visual Object Tracking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur., December, 2023

Heterogeneous graph neural network with semantic-aware differential privacy guarantees.
Knowl. Inf. Syst., October, 2023

MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain.
Inf. Sci., August, 2023

AIC-GNN: Adversarial information completion for graph neural networks.
Inf. Sci., May, 2023

FedMBC: Personalized federated learning via mutually beneficial collaboration.
Comput. Commun., May, 2023

A two-phase random forest with differential privacy.
Appl. Intell., May, 2023

Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network.
IEEE Trans. Circuits Syst. Video Technol., April, 2023

Robust Tracking via Uncertainty-Aware Semantic Consistency.
IEEE Trans. Circuits Syst. Video Technol., April, 2023

SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network.
IEEE Trans. Pattern Anal. Mach. Intell., April, 2023

Robust Long-Term Tracking via Localizing Occluders.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Multi-Access Coded Caching With Optimal Rate and Linear Subpacketization Under PDA and Consecutive Cyclic Placement.
IEEE Trans. Commun., 2023

A Microgrid Trading Framework Based on PoC Consensus.
CoRR, 2023

Towards Unified Token Learning for Vision-Language Tracking.
CoRR, 2023

Asymptotically Optimal Cascaded Coded Distributed Computing via Combinatorial Designs.
CoRR, 2023

FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Robustness and Privacy for Green Learning under Noisy Labels.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Dynamic Social Recommendation with High-Matching Inhomogeneous Relations.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Learning Graph Neural Networks on Feature-Missing Graphs.
Proceedings of the Knowledge Science, Engineering and Management, 2023

FedEF: Federated Learning for Heterogeneous and Class Imbalance Data.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Node Classification in Graph Neural Networks under Dual Consistency.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Relaxed Graph Semi-Supervised Contrastive Learning for Node Classification.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

PGUD: Personalized Graph Universal Defense.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

LTNI-FGML: Federated Graph Machine Learning on Long-Tailed and Non-IID Data via Logit Calibration.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

GFedKRL: Graph Federated Knowledge Re-Learning for Effective Molecular Property Prediction via Privacy Protection.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

2022
ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption.
IEEE Trans. Knowl. Data Eng., 2022

A privacy preservation framework for feedforward-designed convolutional neural networks.
Neural Networks, 2022

OGT: optimize graph then training GNNs for node classification.
Neural Comput. Appl., 2022

Teacher-student knowledge distillation for real-time correlation tracking.
Neurocomputing, 2022

Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication.
Frontiers Comput. Sci., 2022

Differentially private frequent episode mining over event streams.
Eng. Appl. Artif. Intell., 2022

Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach.
Comput. Networks, 2022

Efficient and traceable data sharing for the Internet of Things in smart cities.
Comput. Electr. Eng., 2022

A Green Neural Network with Privacy Preservation and Interpretability.
Proceedings of the IEEE International Conference on Trust, 2022

Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Next POI Recommendation with Neighbor and Location Popularity.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation.
Proceedings of the IEEE International Conference on Data Mining, 2022

The Tenth Visual Object Tracking VOT2022 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks.
IEEE Trans. Netw. Sci. Eng., 2021

SSGD: A Safe and Efficient Method of Gradient Descent.
Secur. Commun. Networks, 2021

One-step spectral rotation clustering for imbalanced high-dimensional data.
Inf. Process. Manag., 2021

Differentially private ensemble learning for classification.
Neurocomputing, 2021

Differential Privacy Preservation in Adaptive K-Nets Clustering.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Adaptive Clipping Bound of Deep Learning with Differential Privacy.
Proceedings of the 20th IEEE International Conference on Trust, 2021

DBS: Blockchain-Based Privacy-Preserving RBAC in IoT.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

The Ninth Visual Object Tracking VOT2021 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Learning To Filter: Siamese Relation Network for Robust Tracking.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

BEIR: A Blockchain-based Encrypted Image Retrieval Scheme.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Private Statistic Query Scheme for Encrypted Electronic Medical Record System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
Local differential privacy for social network publishing.
Neurocomputing, 2020

Top-k closed co-occurrence patterns mining with differential privacy over multiple streams.
Future Gener. Comput. Syst., 2020

GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.
IEEE Access, 2020

Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Groupchain: A Blockchain Model with Privacy-preservation and Supervision.
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020

DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
Correlation-aware partitioning for skewed range query optimization.
World Wide Web, 2019

Two privacy-preserving approaches for data publishing with identity reservation.
Knowl. Inf. Syst., 2019

A three-phase approach to differentially private crucial patterns mining over data streams.
Comput. Secur., 2019

Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory.
Symmetry, 2018

M-generalization for multipurpose transactional data publication.
Frontiers Comput. Sci., 2018

A graph-based multifold model for anonymizing data with attributes of multiple types.
Comput. Secur., 2018

Two Privacy-Preserving Approaches for Publishing Transactional Data Streams.
IEEE Access, 2018

A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing.
Int. J. Softw. Eng. Knowl. Eng., 2017

A privacy-preserving approach for multimodal transaction data integrated analysis.
Neurocomputing, 2017

A Study of Enhancing Privacy for Intelligent Transportation Systems: $k$ -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data.
IEEE Access, 2017

Randomized Perturbation for Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE International Conference on Big Knowledge, 2017

Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Robust Image Hashing With Ring Partition and Invariant Vector Distance.
IEEE Trans. Inf. Forensics Secur., 2016

ROAT: Road-Network-Based Anonymization of Trajectories.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
社会网络分析软件研究 (Study of Social Network Analysis Software).
计算机科学, 2015

A Hybrid Optimization Approach for Anonymizing Transactional Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data.
Int. J. Softw. Eng. Knowl. Eng., 2014

A Personalized Privacy Preserving Method for Publishing Social Network Data.
Proceedings of the Theory and Applications of Models of Computation, 2014

Privacy Risks in Publication of Taxi GPS Data.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Personalized Privacy Protection for Transactional Data.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

A Hybrid Algorithm for Privacy Preserving Social Network Publication.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Privacy-Preserving Trajectory Publication against Parking Point Attacks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

An Improved Privacy Preserving Algorithm for Publishing Social Network Data.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Mining Item Popularity for Recommender Systems.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
Dynamic Authentication for Cross-Realm SOA-Based Business Processes.
IEEE Trans. Serv. Comput., 2012

2009
AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee.
Sci. China Ser. F Inf. Sci., 2009

Automated synthesis of composite services with correctness guarantee.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Cryptographic protocol security analysis based on bounded constructing algorithm.
Sci. China Ser. F Inf. Sci., 2006

A Software Protocol of Goals and Operations Based on BDI Model.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Distributed Access Control in CROWN Groups.
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005

Access Control in Peer-to-Peer Collaborative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Algebra model and security analysis for cryptographic protocols.
Sci. China Ser. F Inf. Sci., 2004

2002
Efficient Non-Repudiation Multicast Source Authentication Schemes.
J. Comput. Sci. Technol., 2002


  Loading...