Xiaoyong Li
Orcid: 0000-0001-5597-9306Affiliations:
- Bejing University of Posts and Telecommunications, MOE, Key Laboratory of Trustworthy Distributed Computing and Service, China
- Xi'an Jiaotong University, China (PhD 2009)
According to our database1,
Xiaoyong Li
authored at least 108 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT.
IEEE Internet Things J., October, 2024
IEEE Internet Things J., September, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
2023
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023
Cybersecur., December, 2023
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2023
A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
Sensors, 2023
An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment.
Future Gener. Comput. Syst., 2023
Entropy, 2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
NDRA: An Efficient Multi-Objective Optimal Routing Algorithm Using Pareto Domination.
Proceedings of the 18th Workshop on Mobility in the Evolving Internet Architecture, 2023
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023
2022
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback.
IEEE Trans. Cloud Comput., 2022
An Energy-Constrained Forwarding Scheme Based on Group Trustworthiness in Mobile Internet of Things.
IEEE Syst. J., 2022
A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Int. J. Pattern Recognit. Artif. Intell., 2022
FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022
2021
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the ICCDE 2021: 7th International Conference on Computing and Data Engineering, Phuket, Thailand, January 15, 2021
2020
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
Sensors, 2020
Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems.
Inf., 2020
Information Eye: A Hybrid Visualization Approach of Exploring Relational Information Space.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network.
Proceedings of the ICIAI 2020: The 4th International Conference on Innovation in Artificial Intelligence, 2020
An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Database and Expert Systems Applications, 2020
CTransE: An Effective Information Credibility Evaluation Method Based on Classified Translating Embedding in Knowledge Graphs.
Proceedings of the Database and Expert Systems Applications, 2020
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020
2019
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service.
IEEE Trans. Netw. Serv. Manag., 2019
Cross-layer collaboration handoff mechanism based on multi-attribute decision in mobile computation offloading.
Soft Comput., 2019
J. Netw. Comput. Appl., 2019
IEEE Internet Things J., 2019
Distributed and Efficient Minimum-Latency Data Aggregation Scheduling for Multichannel Wireless Sensor Networks.
IEEE Internet Things J., 2019
Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Information 2019, 10, 259.
Inf., 2019
Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees.
Inf., 2019
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers.
Future Internet, 2019
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment.
Future Gener. Comput. Syst., 2019
Clust. Comput., 2019
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources.
IEEE Access, 2019
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services.
IEEE Trans. Serv. Comput., 2018
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2018
Future Gener. Comput. Syst., 2018
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion.
IEEE Access, 2018
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things.
IEEE Access, 2018
Construction of Optimal Trees for Maximizing Aggregation Information in Deadline- and Energy-Constrained Unreliable Wireless Sensor Networks.
IEEE Access, 2018
Proceedings of the 26th Pacific Conference on Computer Graphics and Applications, 2018
A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree.
Proceedings of the 21st ACM International Conference on Modeling, 2018
Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 2018 International Conference on Algorithms, 2018
Proceedings of the 2018 International Conference on Algorithms, 2018
2017
Int. J. Distributed Sens. Networks, 2017
Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks.
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the International Conference on Big Data and Internet of Things, 2017
2016
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016
Proceedings of the 12th International Conference on Semantics, Knowledge and Grids, 2016
Proceedings of the 9th International Conference on Service Science, 2016
Research of User Request Algorithm in Mobile Cloud Computing Based on Improved FCM and Collaborative Filtering.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Energy-and-Time-Saving Task Scheduling Based on Improved Genetic Algorithm in Mobile Cloud Computing.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
2015
Wirel. Pers. Commun., 2015
IEEE Trans. Parallel Distributed Syst., 2015
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
2013
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing.
IET Inf. Secur., 2013
Spatio-temporal super-resolution reconstruction based on robust optical flow and Zernike moment for dynamic image sequences.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
2011
J. Parallel Distributed Comput., 2011
Research on Trust Prediction Model for Selecting Web Services Based on Multiple Decision Factors.
Int. J. Softw. Eng. Knowl. Eng., 2011
Pg-Trust: a Self-Adaptive and Scalable Trust Computing Model for Large-Scale Peer-to-Peer Grid Computing.
Int. J. Softw. Eng. Knowl. Eng., 2011
2009
J. Comput. Sci. Technol., 2009
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments.
Int. J. Comput. Appl. Technol., 2009
2007
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007
2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006