Xiuli Huang

Orcid: 0009-0008-8551-2238

According to our database1, Xiuli Huang authored at least 12 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A virtual classroom map-based immersive VR learning approach to fostering collaborative learning.
Comput. Educ. X Real., 2024

On the Security of Distributed Multi-Agent K-Means Clustering With Local Differential Privacy.
IEEE Access, 2024

2021
Sustainable Circular Business Model for Transparency and Uncertainty Reduction in Supply Chain Management.
J. Theor. Appl. Electron. Commer. Res., 2021

Universal Interactive Verification Framework for Federated Learning Protocol.
Proceedings of the ICNCC 2021: The 10th International Conference on Networks, Communication and Computing, Beijing, China, December 10, 2021

A JPEG compression-resistant data watermark embedding and detection algorithm.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

A Novel GAN based User Desensitization Data Generation Algorithm.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

A Novel CP-ABE Based Sidechain Protocol for Distributed Power System Data Storage Management with the Blockchain.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
Deep Reinforcement Learning based Green Resource Allocation Mechanism in Edge Computing driven Power Internet of Things.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Case Study: Students' Perception of a Collaborative Game-Based Virtual Learning Environment.
Proceedings of the 6th International Conference of the Immersive Learning Research Network, 2020

2018
A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

2016
电力智能单元传输规约安全性分析模型研究 (Security Analysis Model of Power Intelligent Unit Transmission Protocols).
计算机科学, 2016

2009
Access Control of Cloud Service Based on UCON.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009


  Loading...