Xiaohui Kuang
Orcid: 0000-0003-3816-402X
According to our database1,
Xiaohui Kuang
authored at least 99 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Estimating Maize Crop Height and Aboveground Biomass Using Multi-Source Unmanned Aerial Vehicle Remote Sensing and Optuna-Optimized Ensemble Learning Algorithms.
Remote. Sens., September, 2024
Neurocomputing, 2024
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
A New Perspective of Deep Learning Testing Framework: Human-Computer Interaction Based Neural Network Testing.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
2023
When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach.
IEEE J. Sel. Areas Commun., October, 2023
A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes.
IEEE Trans. Computers, July, 2023
IEEE Trans. Ind. Informatics, 2023
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2023
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Risk Scenario Generation for Autonomous Driving Systems based on Scenario Evaluation Model.
Proceedings of the International Joint Conference on Neural Networks, 2023
ADV-POST: Physically Realistic Adversarial Poster for Attacking Semantic Segmentation Models in Autonomous Driving.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Joint Geometrical and Statistical Domain Adaptation for Cross-domain Code Vulnerability Detection.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Proceedings of the Database and Expert Systems Applications, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
2022
Toward Attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2022
Int. J. Intell. Syst., 2022
An intelligent proactive defense against the client-side DNS cache poisoning attack via self-checking deep reinforcement learning.
Int. J. Intell. Syst., 2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Detecting Backdoor Attacks on Deep Neural Networks Based on Model Parameters Analysis.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
Mob. Networks Appl., 2021
Inf. Sci., 2021
A discrete cosine transform-based query efficient attack on black-box object detectors.
Inf. Sci., 2021
IEEE Internet Things J., 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical Approach.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Pattern Recognit., 2020
J. Netw. Comput. Appl., 2020
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes.
Inf. Sci., 2020
Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service.
IEEE Commun. Mag., 2020
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020
Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Intelligent-driven Adapting Defense Against the Client-side DNS Cache Poisoning in the Cloud.
Proceedings of the IEEE Global Communications Conference, 2020
2019
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing).
计算机科学, 2019
J. Parallel Distributed Comput., 2019
Inf. Sci., 2019
IEEE Access, 2019
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019
SE-PSO: Resource Scheduling Strategy for Multimedia Cloud Platform Based on Security Enhanced Virtual Migration.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
An Intelligent Route Mutation Mechanism against Mixed Attack Based on Security Awareness.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Network and Parallel Computing, 2018
Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment.
Proceedings of the Intelligence Science and Big Data Engineering, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal Processing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
2016
一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 (Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System).
计算机科学, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
A clustering approach based on convergence degree chain for wireless sensor networks.
Secur. Commun. Networks, 2015
2014
On Effectiveness of Clustering Principles in Maximizing Wireless Sensor Network Lifespan.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
2010
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010
2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009
2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005