Xiaolong Lan

Orcid: 0000-0003-3483-1710

According to our database1, Xiaolong Lan authored at least 41 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution".
IEEE Internet Things J., December, 2024

IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems.
Int. J. Comput. Intell. Syst., December, 2024

A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution.
IEEE Internet Things J., October, 2024

An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model.
IEEE Internet Things J., September, 2024

Optimal Age of Information and Throughput Scheduling in Heterogeneous Traffic Wireless Physical-Layer Security Communications.
IEEE Internet Things J., July, 2024

Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication.
IEEE Internet Things J., May, 2024

On the AoI-Aware Status Update in Buffer-Aided Wireless-Powered Internet of Things Network.
IEEE Internet Things J., April, 2024

BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024

An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm.
IEEE Trans. Dependable Secur. Comput., 2024

A fast dual-module hybrid high-dimensional feature selection algorithm.
Inf. Sci., 2024

Automating the Deployment of Cyber Range with OpenStack.
Comput. J., 2024

SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning.
Comput. J., 2024

2023
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection.
Knowl. Based Syst., October, 2023

MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection.
Appl. Intell., October, 2023

DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range.
Comput. Secur., June, 2023

Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation.
Appl. Intell., June, 2023

Comprehensive Android Malware Detection Based on Federated Learning Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

Uniformity-Comprehensive Multiobjective Optimization Evolutionary Algorithm Based on Machine Learning.
Int. J. Intell. Syst., 2023

A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
XSS adversarial example attacks based on deep reinforcement learning.
Comput. Secur., 2022

Optimal Offloading Percentage for Fresh Status Updates in Mobile Edge Computing Networks.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

On the Energy Constrained Data Collection in Multi-UAV-enabled Wireless Sensor Networks.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks.
IEEE Trans. Inf. Forensics Secur., 2021

SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique.
Knowl. Based Syst., 2021

GNN-DBSCAN: A new density-based algorithm using grid and the nearest neighbor.
J. Intell. Fuzzy Syst., 2021

An immune-based risk assessment method for digital virtual assets.
Comput. Secur., 2021

On the Adaptive AoI-aware Buffer-aided Transmission Scheme for NOMA Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Secure Offloading Design in Multi-user Mobile-Edge Computing Systems.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

On the Achievable Rate of Multi-Hop Buffer-Aided Relay Networks.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Throughput-Optimal H-QMW Scheduling for Hybrid Wireless Networks With Persistent and Dynamic Flows.
IEEE Trans. Wirel. Commun., 2020

Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks.
IEEE/ACM Trans. Netw., 2020

Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Energy Efficient Buffer-Aided Transmission Scheme in Wireless Powered Cooperative NOMA Relay Network.
IEEE Trans. Commun., 2020

Adaptive Transmission Design for Rechargeable Wireless Sensor Network With a Mobile Sink.
IEEE Internet Things J., 2020

2019
Buffer-Aided Adaptive Wireless Powered Communication Network With Finite Energy Storage and Data Buffer.
IEEE Trans. Wirel. Commun., 2019

Efficient Computation Resource Management in Mobile Edge-Cloud Computing.
IEEE Internet Things J., 2019

Execution Latency and Energy Consumption Tradeoff in Mobile-Edge Computing Systems.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Adaptive Content Placement in Edge Networks Based on Hybrid User Preference Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Achievable Rate Region of the Buffer-Aided Two-Way Energy Harvesting Relay Network.
IEEE Trans. Veh. Technol., 2018

Wireless Powered Buffer-Aided Communication Over $K$-User Interference Channel.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

2016
On the transmit power and delivery delay tradeoff in buffer-aided two-way relay networks.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016


  Loading...