Xiaohui Han

Orcid: 0000-0002-5883-9218

According to our database1, Xiaohui Han authored at least 34 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Do scholars' collaborative tendencies impact the quality of their publications? A generalized propensity score matching analysis.
J. Informetrics, February, 2024

MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training.
IEEE Trans. Inf. Forensics Secur., 2024

A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2024

Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier Network.
Proceedings of the International Joint Conference on Neural Networks, 2024

HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network Traffic.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Effective Comparative Prototype Hashing for Unsupervised Domain Adaptation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Applications of fractional gradient descent method with adaptive momentum in BP neural networks.
Appl. Math. Comput., July, 2023

A transformer condition recognition method based on dissolved gas analysis features selection and multiple models fusion.
Eng. Appl. Artif. Intell., 2023

Communication-Efficient Federated Learning for Network Traffic Anomaly Detection.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

An Interpretable Vulnerability Detection Framework Based on Multi-task Learning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

FusionNet: An Effective Network Phishing Website Detection Framework Based on Multi-Modal Fusion.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

A mobile crowdsensing task allocation method in the scenario of environmental protection.
Proceedings of the 6th International Conference on Data Science and Information Technology, 2023

2022
Sequential Multi-task Learning with Task Dependency for Appeal Judgment Prediction.
CoRR, 2022

A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection.
Proceedings of the IEEE International Conference on Trust, 2022

2020
Dismantling and Vertex Cover of Network Through Message Passing.
IEEE Trans. Circuits Syst., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019

Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Visual Urban Perception with Deep Semantic-Aware Network.
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019

2018
Cold-Rolled Strip Steel Stress Detection Technology Based on a Magnetoresistance Sensor and the Magnetoelastic Effect.
Sensors, 2018

Secure Virtualization Environment Based on Advanced Memory Introspection.
Secur. Commun. Networks, 2018

基于四叉树分割的地形LOD技术综述 (Survey of Terrain LOD Technology Based on Quadtree Segmentation).
计算机科学, 2018

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Inf. Forensics Secur., 2017

Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Nondestructive Evaluation of Carbon Fiber Reinforced Polymer Composites Using Reflective Terahertz Imaging.
Sensors, 2016

Social Media account linkage using user-generated geo-location data.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2014
A novel machine learning approach to rank web forum posts.
Soft Comput., 2014

A KVM Virtual Machine Memory Forensics Method Based on VMCS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
Dynamically Modeling Semantic Dependencies in Web Forum Threads.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

2008
Hierarchical Document Classification Based on a Backtracking Algorithm.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

An Effective Relevance Prediction Algorithm Based on Hierarchical Taxonomy for Focused Crawling.
Proceedings of the Information Retrieval Technology, 2008


  Loading...