Xuehui Du
Orcid: 0000-0003-4763-4302
According to our database1,
Xuehui Du
authored at least 51 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Dynamic fine-grained access control for smart contracts based on improved attribute-based signature.
J. Supercomput., January, 2025
2024
KPI-HGNN: Key provenance identification based on a heterogeneous graph neural network for big data access control.
Inf. Sci., February, 2024
Redactable consortium blockchain based on verifiable distributed chameleon hash functions.
J. Parallel Distributed Comput., January, 2024
Adversarial robust decision-making under uncertainty learning and dynamic ensemble selection.
Eng. Appl. Artif. Intell., 2024
Big Data, 2024
Proceedings of the 2024 5th International Conference on Computing, 2024
2023
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model.
Frontiers Neurorobotics, June, 2023
An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness.
Appl. Intell., May, 2023
J. Supercomput., March, 2023
Inf. Technol. Control., March, 2023
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level.
J. Syst. Archit., 2023
Inf. Sci., 2023
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness.
CoRR, 2023
A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs.
IEEE Access, 2023
2022
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine.
IEEE Trans. Cloud Comput., 2022
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model.
CoRR, 2021
IEEE Access, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
2020
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony.
Int. J. Distributed Sens. Networks, 2020
Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Data Science, 2020
2019
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model.
IEEE Trans. Inf. Forensics Secur., 2019
计算机科学, 2019
IEEE Access, 2019
Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection.
IEEE Access, 2019
Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network.
IEEE Access, 2019
Proceedings of the Data Science, 2019
Proceedings of the Data Science, 2019
An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019
2018
Comput. Secur., 2018
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2018
Proceedings of the 4th International Conference on Communication and Information Processing, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
基于混合流策略的按需分布式云信息流控制模型 (Mixed Flow Policy Based On-demand Distributed Cloud Information Flow Control Model).
计算机科学, 2017
A quality-of-service-aware dynamic evolution model for space-ground integrated network.
Int. J. Distributed Sens. Networks, 2017
Dynamic authenticated data structures with access control for outsourcing data stream.
IET Inf. Secur., 2017
2016
Int. J. Embed. Syst., 2016
Proceedings of the Space Information Networks - First International Conference, 2016
2015
基于半监督聚类的文档敏感信息推导方法 (Sensitive Information Inference Method Based on Semi-supervised Document Clustering).
计算机科学, 2015
2013
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure.
J. Comput., 2013
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008