Xiaoyong Li

Orcid: 0000-0001-5597-9306

Affiliations:
  • Bejing University of Posts and Telecommunications, MOE, Key Laboratory of Trustworthy Distributed Computing and Service, China
  • Xi'an Jiaotong University, China (PhD 2009)


According to our database1, Xiaoyong Li authored at least 108 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT.
IEEE Internet Things J., October, 2024

Lattice-Based Semantic-Aware Searchable Encryption for Internet of Things.
IEEE Internet Things J., September, 2024

GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

A machine learning-based trust evaluation model for wireless sensor networks.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024

2023
PMU-Spill: A New Side Channel for Transient Execution Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

LayerCFL: an efficient federated learning with layer-wised clustering.
Cybersecur., December, 2023

A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2023

A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
Sensors, 2023

An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment.
Future Gener. Comput. Syst., 2023

An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning.
Entropy, 2023

A Lightweight Bit-Operation Abnormal Traffic Detection Method Based On XNOR-CNN.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

NDRA: An Efficient Multi-Objective Optimal Routing Algorithm Using Pareto Domination.
Proceedings of the 18th Workshop on Mobility in the Evolving Internet Architecture, 2023

Exploration and Exploitation of Hidden PMU Events.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Overtake: Achieving Meltdown-type Attacks with One Instruction.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., 2022

Adaptive Spatial Location With Balanced Loss for Video Captioning.
IEEE Trans. Circuits Syst. Video Technol., 2022

Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback.
IEEE Trans. Cloud Comput., 2022

An Energy-Constrained Forwarding Scheme Based on Group Trustworthiness in Mobile Internet of Things.
IEEE Syst. J., 2022

A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing.
IEEE Internet Things J., 2022

A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT.
IEEE Internet Things J., 2022

Towards an Intrinsic Interpretability Approach for Multimodal Hate Speech Detection.
Int. J. Pattern Recognit. Artif. Intell., 2022

FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems.
IEEE Access, 2022

Hierarchical Structure-Feature Aware Graph Neural Network for Node Classification.
IEEE Access, 2022

Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit.
Proceedings of the IEEE Smartworld, 2022

Bi-attention Modal Separation Network for Multimodal Video Fusion.
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022

A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
Deep Attributed Network Embedding with Community Information.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

Friends Recommendation Based on KBERT-CNN Text Classification Model.
Proceedings of the International Joint Conference on Neural Networks, 2021

An Improved Random Walk Algorithm for Resource Scheduling in Cloud Datacenter.
Proceedings of the ICCDE 2021: 7th International Conference on Computing and Data Engineering, Phuket, Thailand, January 15, 2021

2020
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
Sensors, 2020

Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems.
Inf., 2020

Information Eye: A Hybrid Visualization Approach of Exploring Relational Information Space.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Cross-Scale Correlation Stereo Network.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

P-DNN: An Effective Intrusion Detection Method based on Pruning Deep Neural Network.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network.
Proceedings of the ICIAI 2020: The 4th International Conference on Innovation in Artificial Intelligence, 2020

An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Expanding Training Set for Graph-Based Semi-supervised Classification.
Proceedings of the Database and Expert Systems Applications, 2020

CTransE: An Effective Information Credibility Evaluation Method Based on Classified Translating Embedding in Knowledge Graphs.
Proceedings of the Database and Expert Systems Applications, 2020

A High Accuracy DNS Tunnel Detection Method Without Feature Engineering.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

A Graph Convolution model considering label co-occurrence LC_GCN.
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020

2019
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service.
IEEE Trans. Netw. Serv. Manag., 2019

Cross-layer collaboration handoff mechanism based on multi-attribute decision in mobile computation offloading.
Soft Comput., 2019

A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things.
J. Netw. Comput. Appl., 2019

Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things.
IEEE Internet Things J., 2019

Distributed and Efficient Minimum-Latency Data Aggregation Scheduling for Multichannel Wireless Sensor Networks.
IEEE Internet Things J., 2019

Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Information 2019, 10, 259.
Inf., 2019

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing.
Inf., 2019

Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees.
Inf., 2019

Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers.
Future Internet, 2019

RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment.
Future Gener. Comput. Syst., 2019

SORD: a new strategy of online replica deduplication in Cloud-P2P.
Clust. Comput., 2019

Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources.
IEEE Access, 2019

VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services.
IEEE Trans. Serv. Comput., 2018

Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2018

DARS: A dynamic adaptive replica strategy under high load Cloud-P2P.
Future Gener. Comput. Syst., 2018

A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion.
IEEE Access, 2018

Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things.
IEEE Access, 2018

Construction of Optimal Trees for Maximizing Aggregation Information in Deadline- and Energy-Constrained Unreliable Wireless Sensor Networks.
IEEE Access, 2018

A Deep Learned Method for Video Indexing and Retrieval.
Proceedings of the 26th Pacific Conference on Computer Graphics and Applications, 2018

A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Deep Learning for Phishing Detection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Broker-guided Trust Calculation Model for Mobile Devices of D2D Communications.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

A multi-source feedback based trust calculation mechanism for edge computing.
Proceedings of the IEEE INFOCOM 2018, 2018

Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Trust Evaluation Model in Edge Computing Based on Integrated Trust.
Proceedings of the 2018 International Conference on Algorithms, 2018

Trust Evaluation in Online Social Networks Based on Knowledge Graph.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

A Context-Aware S-Health Service System for Drivers.
Sensors, 2017

The design of a context-aware service system in intelligent transportation system.
Int. J. Distributed Sens. Networks, 2017

Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks.
IEEE Access, 2017

Phishing Detection Method Based on Borderline-Smote Deep Belief Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Secure Transfer Protocol Between App and Device of Internet of Things.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

MTIV: A Trustworthiness Determination Approach for Threat Intelligence.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Rogue Access Points Detection Based on Theory of Semi-Supervised Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

DTRF: A dynamic-trust-based recruitment framework for Mobile Crowd Sensing system.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

A dynamic-trust-based recruitment framework for mobile crowd sensing.
Proceedings of the IEEE International Conference on Communications, 2017

A Novel Semi-Automatic Vulnerability Detection System for Smart Home.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

2016
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Community-Based Recommendations: A Solution to the Vulnerability Problem.
Proceedings of the 12th International Conference on Semantics, Knowledge and Grids, 2016

A Recommendation System Based on Multi-attribute.
Proceedings of the 9th International Conference on Service Science, 2016

Research of User Request Algorithm in Mobile Cloud Computing Based on Improved FCM and Collaborative Filtering.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Resource Scheduling Based on Improved FCM Algorithm for Mobile Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Energy-and-Time-Saving Task Scheduling Based on Improved Genetic Algorithm in Mobile Cloud Computing.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
LKH++ Based Group Key Management Scheme for Wireless Sensor Network.
Wirel. Pers. Commun., 2015

Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds.
IEEE Trans. Parallel Distributed Syst., 2015

T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services.
IEEE Trans. Inf. Forensics Secur., 2015

Analysis of the Performance of Hadoop Applications on Eucalyptus Cloud.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2013
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing.
IET Inf. Secur., 2013

Spatio-temporal super-resolution reconstruction based on robust optical flow and Zernike moment for dynamic image sequences.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

2012
Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management.
IEEE Trans. Parallel Distributed Syst., 2012

A BPNN-based dynamic trust predicting model for distributed systems.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2011
A multi-dimensional trust evaluation model for large-scale P2P computing.
J. Parallel Distributed Comput., 2011

Research on Trust Prediction Model for Selecting Web Services Based on Multiple Decision Factors.
Int. J. Softw. Eng. Knowl. Eng., 2011

Pg-Trust: a Self-Adaptive and Scalable Trust Computing Model for Large-Scale Peer-to-Peer Grid Computing.
Int. J. Softw. Eng. Knowl. Eng., 2011

2009
A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks.
J. Comput. Sci. Technol., 2009

Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments.
Int. J. Comput. Appl. Technol., 2009

2007
engineering trusted P2P system with fast reputation aggregating mechanism.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

2006
Merging Source and Shared Trees Multicast in MPLS Networks.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006


  Loading...