Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xianxian Li
@article{DBLP:journals/iotj/QuLL24, author = {Bin Qu and De Li and Xianxian Li}, title = {Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: {A} Method Combining Multisource Data Prediction and Deep Reinforcement Learning}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {6}, pages = {9955--9968}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3324381}, doi = {10.1109/JIOT.2023.3324381}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/QuLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HuZLZLLJ24, author = {Xiantao Hu and Bineng Zhong and Qihua Liang and Shengping Zhang and Ning Li and Xianxian Li and Rongrong Ji}, title = {Transformer Tracking via Frequency Fusion}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {2}, pages = {1020--1031}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3289624}, doi = {10.1109/TCSVT.2023.3289624}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/HuZLZLLJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YeZLZLJ24, author = {Jiaxin Ye and Bineng Zhong and Qihua Liang and Shengping Zhang and Xianxian Li and Rongrong Ji}, title = {Positive-Sample-Free Object Tracking via a Soft Constraint}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {3}, pages = {1364--1375}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3294580}, doi = {10.1109/TCSVT.2023.3294580}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/YeZLZLJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/NingZLTL24, author = {TianYu Ning and Bineng Zhong and Qihua Liang and Zhenjun Tang and Xianxian Li}, title = {Robust Tracking via Bidirectional Transduction With Mask Information}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {4308--4319}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3321497}, doi = {10.1109/TMM.2023.3321497}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/NingZLTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ShiZLLZL24, author = {Liangtao Shi and Bineng Zhong and Qihua Liang and Ning Li and Shengping Zhang and Xianxian Li}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Explicit Visual Prompts for Visual Object Tracking}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {4838--4846}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i5.28286}, doi = {10.1609/AAAI.V38I5.28286}, timestamp = {Tue, 26 Mar 2024 17:04:05 +0100}, biburl = {https://dblp.org/rec/conf/aaai/ShiZLLZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhengZLMZL24, author = {Yaozong Zheng and Bineng Zhong and Qihua Liang and Zhiyi Mo and Shengping Zhang and Xianxian Li}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {ODTrack: Online Dense Temporal Token Learning for Visual Tracking}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {7588--7596}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28591}, doi = {10.1609/AAAI.V38I7.28591}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/ZhengZLMZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/WeiYFS0LH24, author = {Yuecen Wei and Haonan Yuan and Xingcheng Fu and Qingyun Sun and Hao Peng and Xianxian Li and Chunming Hu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Poincar{\'{e}} Differential Privacy for Hierarchy-Aware Graph Embedding}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {9160--9168}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i8.28767}, doi = {10.1609/AAAI.V38I8.28767}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/WeiYFS0LH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-01686, author = {Yaozong Zheng and Bineng Zhong and Qihua Liang and Zhiyi Mo and Shengping Zhang and Xianxian Li}, title = {ODTrack: Online Dense Temporal Token Learning for Visual Tracking}, journal = {CoRR}, volume = {abs/2401.01686}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.01686}, doi = {10.48550/ARXIV.2401.01686}, eprinttype = {arXiv}, eprint = {2401.01686}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-01686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-03142, author = {Liangtao Shi and Bineng Zhong and Qihua Liang and Ning Li and Shengping Zhang and Xianxian Li}, title = {Explicit Visual Prompts for Visual Object Tracking}, journal = {CoRR}, volume = {abs/2401.03142}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.03142}, doi = {10.48550/ARXIV.2401.03142}, eprinttype = {arXiv}, eprint = {2401.03142}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-03142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/LiuLWLLW23, author = {Jing Liu and Xianxian Li and Quanmin Wei and Songfeng Liu and Zhaohui Liu and Jinyan Wang}, title = {A two-phase random forest with differential privacy}, journal = {Appl. Intell.}, volume = {53}, number = {10}, pages = {13037--13051}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-04119-6}, doi = {10.1007/S10489-022-04119-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/LiuLWLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/GongLW23, author = {Yanxia Gong and Xianxian Li and Li{-}e Wang}, title = {FedMBC: Personalized federated learning via mutually beneficial collaboration}, journal = {Comput. Commun.}, volume = {205}, pages = {108--117}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.04.012}, doi = {10.1016/J.COMCOM.2023.04.012}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/GongLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LiuYDLZYL23, author = {Peng Liu and Wenzhe Ye and Haiying Duan and Xianxian Li and Shuyi Zhang and Chuanjian Yao and Yongnan Li}, title = {Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities}, journal = {Cybersecur.}, volume = {6}, number = {1}, pages = {29}, year = {2023}, url = {https://doi.org/10.1186/s42400-023-00160-1}, doi = {10.1186/S42400-023-00160-1}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/LiuYDLZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WeiWFHL23, author = {Quanmin Wei and Jinyan Wang and Xingcheng Fu and Jun Hu and Xianxian Li}, title = {{AIC-GNN:} Adversarial information completion for graph neural networks}, journal = {Inf. Sci.}, volume = {626}, pages = {166--179}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2022.12.112}, doi = {10.1016/J.INS.2022.12.112}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WeiWFHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangQBSLL23, author = {Li{-}e Wang and Yuelan Qi and Yan Bai and Zhigang Sun and Dongcheng Li and Xianxian Li}, title = {MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain}, journal = {Inf. Sci.}, volume = {638}, pages = {118915}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.03.140}, doi = {10.1016/J.INS.2023.03.140}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangQBSLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/WeiFYSPWWL23, author = {Yuecen Wei and Xingcheng Fu and Dongqi Yan and Qingyun Sun and Hao Peng and Jia Wu and Jinyan Wang and Xianxian Li}, title = {Heterogeneous graph neural network with semantic-aware differential privacy guarantees}, journal = {Knowl. Inf. Syst.}, volume = {65}, number = {10}, pages = {4085--4110}, year = {2023}, url = {https://doi.org/10.1007/s10115-023-01895-6}, doi = {10.1007/S10115-023-01895-6}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kais/WeiFYSPWWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ChenZLZJTL23, author = {Zedu Chen and Bineng Zhong and Guorong Li and Shengping Zhang and Rongrong Ji and Zhenjun Tang and Xianxian Li}, title = {SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {45}, number = {4}, pages = {5158--5173}, year = {2023}, url = {https://doi.org/10.1109/TPAMI.2022.3195759}, doi = {10.1109/TPAMI.2022.3195759}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/ChenZLZJTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WangCWL23, author = {Jinyu Wang and Minquan Cheng and Youlong Wu and Xianxian Li}, title = {Multi-Access Coded Caching With Optimal Rate and Linear Subpacketization Under {PDA} and Consecutive Cyclic Placement}, journal = {{IEEE} Trans. Commun.}, volume = {71}, number = {6}, pages = {3178--3190}, year = {2023}, url = {https://doi.org/10.1109/TCOMM.2023.3256417}, doi = {10.1109/TCOMM.2023.3256417}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/WangCWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhengZLTJL23, author = {Yaozong Zheng and Bineng Zhong and Qihua Liang and Zhenjun Tang and Rongrong Ji and Xianxian Li}, title = {Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {4}, pages = {1671--1683}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3212987}, doi = {10.1109/TCSVT.2022.3212987}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZhengZLTJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/MaLZLTLJ23, author = {Jie Ma and Xiangyuan Lan and Bineng Zhong and Guorong Li and Zhenjun Tang and Xianxian Li and Rongrong Ji}, title = {Robust Tracking via Uncertainty-Aware Semantic Consistency}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {4}, pages = {1740--1751}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3214222}, doi = {10.1109/TCSVT.2022.3214222}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/MaLZLTLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/ChuLZTLW23, author = {Binfei Chu and Yiting Lin and Bineng Zhong and Zhenjun Tang and Xianxian Li and Jing Wang}, title = {Robust Long-Term Tracking via Localizing Occluders}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {2s}, pages = {89:1--89:15}, year = {2023}, url = {https://doi.org/10.1145/3557896}, doi = {10.1145/3557896}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/ChuLZTLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/LiLLW23, author = {Qiyu Li and Xianxian Li and De Li and Jinyan Wang}, title = {Node Classification in Graph Neural Networks under Dual Consistency}, booktitle = {35th {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2023, Atlanta, GA, USA, November 6-8, 2023}, pages = {857--864}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICTAI59109.2023.00130}, doi = {10.1109/ICTAI59109.2023.00130}, timestamp = {Tue, 09 Jan 2024 16:43:57 +0100}, biburl = {https://dblp.org/rec/conf/ictai/LiLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/PengWSL23, author = {Hongyan Peng and Tongtong Wu and Zhenkui Shi and Xianxian Li}, title = {FedEF: Federated Learning for Heterogeneous and Class Imbalance Data}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {619--624}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10218040}, doi = {10.1109/ISCC58397.2023.10218040}, timestamp = {Wed, 06 Sep 2023 08:09:43 +0200}, biburl = {https://dblp.org/rec/conf/iscc/PengWSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/HuWWKL23, author = {Jun Hu and Jinyan Wang and Quanmin Wei and Du Kai and Xianxian Li}, editor = {Zhi Jin and Yuncheng Jiang and Robert Andrei Buchmann and Yaxin Bi and Ana{-}Maria Ghiran and Wenjun Ma}, title = {Learning Graph Neural Networks on Feature-Missing Graphs}, booktitle = {Knowledge Science, Engineering and Management - 16th International Conference, {KSEM} 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14117}, pages = {255--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40283-8\_22}, doi = {10.1007/978-3-031-40283-8\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ksem/HuWWKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/WangZLLZXQSL23, author = {Li{-}E Wang and Huachang Zeng and Shenghan Li and Xianxian Li and Shengda Zhuo and Jiahua Xie and Bin Qu and Zhigang Sun and Tianran Liu}, editor = {Shi{-}Kuo Chang}, title = {{CRCC:} Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems {(S)}}, booktitle = {The 35th International Conference on Software Engineering and Knowledge Engineering, {SEKE} 2023, {KSIR} Virtual Conference Center, USA, July 1-10, 2023}, pages = {323--328}, publisher = {{KSI} Research Inc.}, year = {2023}, url = {https://doi.org/10.18293/SEKE2023-190}, doi = {10.18293/SEKE2023-190}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/WangZLLZXQSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/LiWZLWL23, author = {Shenghan Li and Jinyan Wang and Huachang Zeng and Jun Li and Yuecen Wei and Xianxian Li}, title = {Dynamic Social Recommendation with High-Matching Inhomogeneous Relations}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2023, Honolulu, Oahu, HI, USA, October 1-4, 2023}, pages = {526--533}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SMC53992.2023.10394078}, doi = {10.1109/SMC53992.2023.10394078}, timestamp = {Tue, 13 Feb 2024 09:22:04 +0100}, biburl = {https://dblp.org/rec/conf/smc/LiWZLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-05826, author = {Minquan Cheng and Youlong Wu and Xianxian Li}, title = {Asymptotically Optimal Cascaded Coded Distributed Computing via Combinatorial Designs}, journal = {CoRR}, volume = {abs/2302.05826}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.05826}, doi = {10.48550/ARXIV.2302.05826}, eprinttype = {arXiv}, eprint = {2302.05826}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-05826.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14103, author = {Yaozong Zheng and Bineng Zhong and Qihua Liang and Guorong Li and Rongrong Ji and Xianxian Li}, title = {Towards Unified Token Learning for Vision-Language Tracking}, journal = {CoRR}, volume = {abs/2308.14103}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14103}, doi = {10.48550/ARXIV.2308.14103}, eprinttype = {arXiv}, eprint = {2308.14103}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04975, author = {Peng Liu and Youquan Xian and Chuanjian Yao and Peng Wang and Li{-}e Wang and Xianxian Li}, title = {A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things}, journal = {CoRR}, volume = {abs/2310.04975}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04975}, doi = {10.48550/ARXIV.2310.04975}, eprinttype = {arXiv}, eprint = {2310.04975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04975.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-07165, author = {Lianghaojie Zhou and Youquan Xian and Yipeng Yang and Jianyong Jiang and Peng Liu and Xianxian Li}, title = {A Microgrid Trading Framework Based on PoC Consensus}, journal = {CoRR}, volume = {abs/2310.07165}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.07165}, doi = {10.48550/ARXIV.2310.07165}, eprinttype = {arXiv}, eprint = {2310.07165}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-07165.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-12183, author = {Yuecen Wei and Haonan Yuan and Xingcheng Fu and Qingyun Sun and Hao Peng and Xianxian Li and Chunming Hu}, title = {Poincar{\'{e}} Differential Privacy for Hierarchy-Aware Graph Embedding}, journal = {CoRR}, volume = {abs/2312.12183}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.12183}, doi = {10.48550/ARXIV.2312.12183}, eprinttype = {arXiv}, eprint = {2312.12183}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-12183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiLLQYY22, author = {Chunpei Li and Xianxian Li and Peng Liu and Wangjie Qiu and Chuanjian Yao and Bo Yuan}, title = {Efficient and traceable data sharing for the Internet of Things in smart cities}, journal = {Comput. Electr. Eng.}, volume = {103}, pages = {108389}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.108389}, doi = {10.1016/J.COMPELECENG.2022.108389}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LiLLQYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/QuBCWYL22, author = {Bin Qu and Yan Bai and Yul Chu and Li{-}e Wang and Feng Yu and Xianxian Li}, title = {Resource allocation for {MEC} system with multi-users resource competition based on deep reinforcement learning approach}, journal = {Comput. Networks}, volume = {215}, pages = {109181}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109181}, doi = {10.1016/J.COMNET.2022.109181}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/QuBCWYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/QinWLFLL22, author = {Jiawen Qin and Jinyan Wang and Qiyu Li and Shijian Fang and Xianxian Li and Lei Lei}, title = {Differentially private frequent episode mining over event streams}, journal = {Eng. Appl. Artif. Intell.}, volume = {110}, pages = {104681}, year = {2022}, url = {https://doi.org/10.1016/j.engappai.2022.104681}, doi = {10.1016/J.ENGAPPAI.2022.104681}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/QinWLFLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiCWL22, author = {Xianxian Li and Bing Cai and Li{-}e Wang and Lei Lei}, title = {Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {4}, pages = {164816}, year = {2022}, url = {https://doi.org/10.1007/s11704-021-0417-6}, doi = {10.1007/S11704-021-0417-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LiCWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ChenZLDL22, author = {Qihuang Chen and Bineng Zhong and Qihua Liang and Qingyong Deng and Xianxian Li}, title = {Teacher-student knowledge distillation for real-time correlation tracking}, journal = {Neurocomputing}, volume = {500}, pages = {537--546}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.05.064}, doi = {10.1016/J.NEUCOM.2022.05.064}, timestamp = {Fri, 01 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ChenZLDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/WeiWHLY22, author = {Quanmin Wei and Jinyan Wang and Jun Hu and Xianxian Li and Tong Yi}, title = {{OGT:} optimize graph then training GNNs for node classification}, journal = {Neural Comput. Appl.}, volume = {34}, number = {24}, pages = {22209--22222}, year = {2022}, url = {https://doi.org/10.1007/s00521-022-07677-5}, doi = {10.1007/S00521-022-07677-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/WeiWHLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/LiWLHL22, author = {De Li and Jinyan Wang and Qiyu Li and Yuhang Hu and Xianxian Li}, title = {A privacy preservation framework for feedforward-designed convolutional neural networks}, journal = {Neural Networks}, volume = {155}, pages = {14--27}, year = {2022}, url = {https://doi.org/10.1016/j.neunet.2022.08.005}, doi = {10.1016/J.NEUNET.2022.08.005}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/LiWLHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ShiFLZ22, author = {Zhenkui Shi and Xuemei Fu and Xianxian Li and Kai Zhu}, title = {{ESVSSE:} Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {34}, number = {7}, pages = {3241--3254}, year = {2022}, url = {https://doi.org/10.1109/TKDE.2020.3025348}, doi = {10.1109/TKDE.2020.3025348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ShiFLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcom/LiLSY22, author = {Xianxian Li and Jie Lei and Zhenkui Shi and Feng Yu}, title = {An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree}, booktitle = {8th International Conference on Big Data Computing and Communications, BigCom 2022, Xiamen, China, August 6-7, 2022}, pages = {365--371}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigCom57025.2022.00052}, doi = {10.1109/BIGCOM57025.2022.00052}, timestamp = {Wed, 29 Mar 2023 17:46:15 +0200}, biburl = {https://dblp.org/rec/conf/bigcom/LiLSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/KristanLMFPKCDZLDBZZYYCMFBBCCCCCCCCCCC22, author = {Matej Kristan and Ales Leonardis and Jir{\'{\i}} Matas and Michael Felsberg and Roman P. Pflugfelder and Joni{-}Kristian K{\"{a}}m{\"{a}}r{\"{a}}inen and Hyung Jin Chang and Martin Danelljan and Luka Cehovin Zajc and Alan Lukezic and Ondrej Drbohlav and Johanna Bj{\"{o}}rklund and Yushan Zhang and Zhongqun Zhang and Song Yan and Wenyan Yang and Dingding Cai and Christoph Mayer and Gustavo Fern{\'{a}}ndez and Kang Ben and Goutam Bhat and Hong Chang and Guangqi Chen and Jiaye Chen and Shengyong Chen and Xilin Chen and Xin Chen and Xiuyi Chen and Yiwei Chen and Yu{-}Hsi Chen and Zhixing Chen and Yangming Cheng and Angelo Ciaramella and Yutao Cui and Benjamin Dzubur and Mohana Murali Dasari and Qili Deng and Debajyoti Dhar and Shangzhe Di and Emanuel Di Nardo and Daniel K. Du and Matteo Dunnhofer and Heng Fan and Zhen{-}Hua Feng and Zhihong Fu and Shang Gao and Rama Krishna Gorthi and Eric Granger and Q. H. Gu and Himanshu Gupta and Jianfeng He and Keji He and Yan Huang and Deepak Jangid and Rongrong Ji and Cheng Jiang and Yingjie Jiang and Felix J{\"{a}}remo Lawin and Ze Kang and Madhu Kiran and Josef Kittler and Simiao Lai and Xiangyuan Lan and Dongwook Lee and Hyunjeong Lee and Seohyung Lee and Hui Li and Ming Li and Wangkai Li and Xi Li and Xianxian Li and Xiao Li and Zhe Li and Liting Lin and Haibin Ling and Bo Liu and Chang Liu and Si Liu and Huchuan Lu and Rafael M. O. Cruz and Bingpeng Ma and Chao Ma and Jie Ma and Yinchao Ma and Niki Martinel and Alireza Memarmoghadam and Christian Micheloni and Payman Moallem and Le Thanh Nguyen{-}Meidine and Siyang Pan and ChangBeom Park and Danda Pani Paudel and Matthieu Paul and Houwen Peng and Andreas Robinson and Litu Rout and Shiguang Shan and Kristian Simonato and Tianhui Song and Xiaoning Song and Chao Sun and Jingna Sun and Zhangyong Tang and Radu Timofte and Chi{-}Yi Tsai and Luc Van Gool and Om Prakash Verma and Dong Wang and Fei Wang and Liang Wang and Liangliang Wang and Lijun Wang and Limin Wang and Qiang Wang and Gangshan Wu and Jinlin Wu and Xiaojun Wu and Fei Xie and Tianyang Xu and Wei Xu and Yong Xu and Yuanyou Xu and Wanli Xue and Zizheng Xun and Bin Yan and Dawei Yang and Jinyu Yang and Wankou Yang and Xiaoyun Yang and Yi Yang and Yichun Yang and Zongxin Yang and Botao Ye and Fisher Yu and Hongyuan Yu and Jiaqian Yu and Qianjin Yu and Weichen Yu and Kang Ze and Jiang Zhai and Chengwei Zhang and Chunhu Zhang and Kaihua Zhang and Tianzhu Zhang and Wenkang Zhang and Zhibin Zhang and Zhipeng Zhang and Jie Zhao and Shao{-}Chuan Zhao and Feng Zheng and Haixia Zheng and Min Zheng and Bineng Zhong and Jiawen Zhu and Xuefeng Zhu and Yueting Zhuang}, editor = {Leonid Karlinsky and Tomer Michaeli and Ko Nishino}, title = {The Tenth Visual Object Tracking {VOT2022} Challenge Results}, booktitle = {Computer Vision - {ECCV} 2022 Workshops - Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {13808}, pages = {431--460}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25085-9\_25}, doi = {10.1007/978-3-031-25085-9\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/KristanLMFPKCDZLDBZZYYCMFBBCCCCCCCCCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/WeiFSPWWL22, author = {Yuecen Wei and Xingcheng Fu and Qingyun Sun and Hao Peng and Jia Wu and Jinyan Wang and Xianxian Li}, editor = {Xingquan Zhu and Sanjay Ranka and My T. Thai and Takashi Washio and Xindong Wu}, title = {Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2022, Orlando, FL, USA, November 28 - Dec. 1, 2022}, pages = {528--537}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDM54844.2022.00063}, doi = {10.1109/ICDM54844.2022.00063}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/WeiFSPWWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/LiLWSZ22, author = {Xianxian Li and Tianran Liu and Li{-}e Wang and Zhigang Sun and Huachang Zeng}, editor = {Mohammad Tanveer and Sonali Agarwal and Seiichi Ozawa and Asif Ekbal and Adam Jatowt}, title = {Next {POI} Recommendation with Neighbor and Location Popularity}, booktitle = {Neural Information Processing - 29th International Conference, {ICONIP} 2022, Virtual Event, November 22-26, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13624}, pages = {367--378}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30108-7\_31}, doi = {10.1007/978-3-031-30108-7\_31}, timestamp = {Thu, 20 Apr 2023 15:24:03 +0200}, biburl = {https://dblp.org/rec/conf/iconip/LiLWSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/LiuZYYL22, author = {Peng Liu and Shuyi Zhang and Chuanjian Yao and Wenzhe Ye and Xianxian Li}, title = {Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography}, booktitle = {26th International Conference on Pattern Recognition, {ICPR} 2022, Montreal, QC, Canada, August 21-25, 2022}, pages = {68--74}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICPR56361.2022.9956521}, doi = {10.1109/ICPR56361.2022.9956521}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/LiuZYYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZGLW22, author = {De Li and Hongyan Zheng and Zeming Gan and Xianxian Li and Jinyan Wang}, title = {A Green Neural Network with Privacy Preservation and Interpretability}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {606--614}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00088}, doi = {10.1109/TRUSTCOM56396.2022.00088}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00538, author = {Yuecen Wei and Xingcheng Fu and Qingyun Sun and Hao Peng and Jia Wu and Jinyan Wang and Xianxian Li}, title = {Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation}, journal = {CoRR}, volume = {abs/2210.00538}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00538}, doi = {10.48550/ARXIV.2210.00538}, eprinttype = {arXiv}, eprint = {2210.00538}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiLLW21, author = {Xianxian Li and Jing Liu and Songfeng Liu and Jinyan Wang}, title = {Differentially private ensemble learning for classification}, journal = {Neurocomputing}, volume = {430}, pages = {34--46}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2020.12.051}, doi = {10.1016/J.NEUCOM.2020.12.051}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/LiLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/WenLZCLT21, author = {Guoqiu Wen and Xianxian Li and Yonghua Zhu and Linjun Chen and Qimin Luo and Malong Tan}, title = {One-step spectral rotation clustering for imbalanced high-dimensional data}, journal = {Inf. Process. Manag.}, volume = {58}, number = {1}, pages = {102388}, year = {2021}, url = {https://doi.org/10.1016/j.ipm.2020.102388}, doi = {10.1016/J.IPM.2020.102388}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/WenLZCLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuanLGZW21, author = {Jinhuan Duan and Xianxian Li and Shiqi Gao and Zili Zhong and Jinyan Wang}, title = {{SSGD:} {A} Safe and Efficient Method of Gradient Descent}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5404061:1--5404061:11}, year = {2021}, url = {https://doi.org/10.1155/2021/5404061}, doi = {10.1155/2021/5404061}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DuanLGZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WangBJLCL21, author = {Li{-}e Wang and Yan Bai and Quan Jiang and Victor C. M. Leung and Wei Cai and Xianxian Li}, title = {Beh-Raft-Chain: {A} Behavior-Based Fast Blockchain Protocol for Complex Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {1154--1166}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.2984490}, doi = {10.1109/TNSE.2020.2984490}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/WangBJLCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/PengLYM0L21, author = {Jiahui Peng and Chunpei Li and Bo Yuan and Hongwei Meng and Feng Yu and Xianxian Li}, title = {{SCPS:} {A} Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric}, booktitle = {Ninth International Conference on Advanced Cloud and Big Data, {CBD} 2021, Xi'an, China, March 26-27, 2022}, pages = {224--229}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CBD54617.2021.00046}, doi = {10.1109/CBD54617.2021.00046}, timestamp = {Thu, 04 Aug 2022 11:52:19 +0200}, biburl = {https://dblp.org/rec/conf/cbd/PengLYM0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/LiLYFYC21, author = {Xianxian Li and Jie Li and Feng Yu and Xuemei Fu and Junhao Yang and Yue Chen}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Yanjun Shi and Jinghui Zhang}, title = {{BEIR:} {A} Blockchain-based Encrypted Image Retrieval Scheme}, booktitle = {24th {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2021, Dalian, China, May 5-7, 2021}, pages = {452--457}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCWD49262.2021.9437677}, doi = {10.1109/CSCWD49262.2021.9437677}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscwd/LiLYFYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/LiFYSLY21, author = {Xianxian Li and Xuemei Fu and Feng Yu and Zhenkui Shi and Jie Li and Junhao Yang}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Yanjun Shi and Jinghui Zhang}, title = {A Private Statistic Query Scheme for Encrypted Electronic Medical Record System}, booktitle = {24th {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2021, Dalian, China, May 5-7, 2021}, pages = {1033--1039}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCWD49262.2021.9437665}, doi = {10.1109/CSCWD49262.2021.9437665}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscwd/LiFYSLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/0003ZL0TLW21, author = {Siyuan Cheng and Bineng Zhong and Guorong Li and Xin Liu and Zhenjun Tang and Xianxian Li and Jing Wang}, title = {Learning To Filter: Siamese Relation Network for Robust Tracking}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {4421--4431}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Cheng\_Learning\_To\_Filter\_Siamese\_Relation\_Network\_for\_Robust\_Tracking\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00440}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/0003ZL0TLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccvw/KristanMLFPKCDZ21, author = {Matej Kristan and Jir{\'{\i}} Matas and Ales Leonardis and Michael Felsberg and Roman P. Pflugfelder and Joni{-}Kristian K{\"{a}}m{\"{a}}r{\"{a}}inen and Hyung Jin Chang and Martin Danelljan and Luka Cehovin Zajc and Alan Lukezic and Ondrej Drbohlav and Jani K{\"{a}}pyl{\"{a}} and Gustav H{\"{a}}ger and Song Yan and Jinyu Yang and Zhongqun Zhang and Gustavo Fern{\'{a}}ndez and Mohamed H. Abdelpakey and Goutam Bhat and Llukman Cerkezi and Hakan Cevikalp and Shengyong Chen and Xin Chen and Miao Cheng and Ziyi Cheng and Yu{-}Chen Chiu and Ozgun Cirakman and Yutao Cui and Kenan Dai and Mohana Murali Dasari and Qili Deng and Xingping Dong and Daniel K. Du and Matteo Dunnhofer and Zhen{-}Hua Feng and Zhiyong Feng and Zhihong Fu and Shiming Ge and Rama Krishna Gorthi and Yuzhang Gu and Bilge G{\"{u}}nsel and Qing Guo and Filiz Gurkan and Wencheng Han and Yanyan Huang and Felix J{\"{a}}remo Lawin and Shang{-}Jhih Jhang and Rongrong Ji and Cheng Jiang and Yingjie Jiang and Felix Juefei{-}Xu and J. Yin and Xiao Ke and Fahad Shahbaz Khan and Byeong Hak Kim and Josef Kittler and Xiangyuan Lan and Jun Ha Lee and Bastian Leibe and Hui Li and Jianhua Li and Xianxian Li and Yuezhou Li and Bo Liu and Chang Liu and Jingen Liu and Li Liu and Qingjie Liu and Huchuan Lu and Wei Lu and Jonathon Luiten and Jie Ma and Ziang Ma and Niki Martinel and Christoph Mayer and Alireza Memarmoghadam and Christian Micheloni and Yuzhen Niu and Danda Pani Paudel and Houwen Peng and Shoumeng Qiu and Aravindh Rajiv and Muhammad Rana and Andreas Robinson and Hasan Saribas and Ling Shao and Mohamed S. Shehata and Furao Shen and Jianbing Shen and Kristian Simonato and Xiaoning Song and Zhangyong Tang and Radu Timofte and Philip H. S. Torr and Chi{-}Yi Tsai and Bedirhan Uzun and Luc Van Gool and Paul Voigtlaender and Dong Wang and Guangting Wang and Liangliang Wang and Lijun Wang and Limin Wang and Linyuan Wang and Yong Wang and Yunhong Wang and Chenyan Wu and Gangshan Wu and Xiaojun Wu and Fei Xie and Tianyang Xu and Xiang Xu and Wanli Xue and Bin Yan and Wankou Yang and Xiaoyun Yang and Yu Ye and Jun Yin and Chengwei Zhang and Chunhui Zhang and Haitao Zhang and Kaihua Zhang and Kangkai Zhang and Xiaohan Zhang and Xiaolin Zhang and Xinyu Zhang and Zhibin Zhang and Shao{-}Chuan Zhao and Ming Zhen and Bineng Zhong and Jiawen Zhu and Xuefeng Zhu}, title = {The Ninth Visual Object Tracking {VOT2021} Challenge Results}, booktitle = {{IEEE/CVF} International Conference on Computer Vision Workshops, {ICCVW} 2021, Montreal, BC, Canada, October 11-17, 2021}, pages = {2711--2738}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCVW54120.2021.00305}, doi = {10.1109/ICCVW54120.2021.00305}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccvw/KristanMLFPKCDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangWBLL21, author = {Li{-}e Wang and Yihui Wang and Yan Bai and Peng Liu and Xianxian Li}, title = {{POI} Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484510}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484510}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangWBLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/LiYGSLF21, author = {Xianxian Li and Junhao Yang and Shiqi Gao and Zhenkui Shi and Jie Li and Xuemei Fu}, editor = {Xingliang Yuan and Wei Bao and Xun Yi and Nguyen Hoang Tran}, title = {{DBS:} Blockchain-Based Privacy-Preserving {RBAC} in IoT}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th {EAI} International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {402}, pages = {94--110}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91424-0\_6}, doi = {10.1007/978-3-030-91424-0\_6}, timestamp = {Wed, 20 Mar 2024 10:34:02 +0100}, biburl = {https://dblp.org/rec/conf/qshine/LiYGSLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/LiPSL21, author = {Xianxian Li and Jiahui Peng and Zhenkui Shi and Chunpei Li}, editor = {Xingliang Yuan and Wei Bao and Xun Yi and Nguyen Hoang Tran}, title = {Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th {EAI} International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {402}, pages = {111--125}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91424-0\_7}, doi = {10.1007/978-3-030-91424-0\_7}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qshine/LiPSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuCLLW21, author = {Xiaohong Liu and Hanbo Cai and De Li and Xianxian Li and Jinyan Wang}, title = {Differential Privacy Preservation in Adaptive K-Nets Clustering}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {405--412}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00068}, doi = {10.1109/TRUSTCOM53373.2021.00068}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuCLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuLTLW21, author = {Yuhang Hu and De Li and Zhou Tan and Xianxian Li and Jinyan Wang}, title = {Adaptive Clipping Bound of Deep Learning with Differential Privacy}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {428--435}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00071}, doi = {10.1109/TRUSTCOM53373.2021.00071}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuLTLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-00829, author = {Siyuan Cheng and Bineng Zhong and Guorong Li and Xin Liu and Zhenjun Tang and Xianxian Li and Jing Wang}, title = {Learning to Filter: Siamese Relation Network for Robust Tracking}, journal = {CoRR}, volume = {abs/2104.00829}, year = {2021}, url = {https://arxiv.org/abs/2104.00829}, eprinttype = {arXiv}, eprint = {2104.00829}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-00829.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QuWLSL20, author = {Bin Qu and Li{-}e Wang and Peng Liu and Zhenkui Shi and Xianxian Li}, title = {GCBlock: {A} Grouping and Coding Based Storage Scheme for Blockchain System}, journal = {{IEEE} Access}, volume = {8}, pages = {48325--48336}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2978614}, doi = {10.1109/ACCESS.2020.2978614}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QuWLSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangFLQLS20, author = {Jinyan Wang and Shijian Fang and Chen Liu and Jiawen Qin and Xianxian Li and Zhenkui Shi}, title = {Top-k closed co-occurrence patterns mining with differential privacy over multiple streams}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {339--351}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.04.049}, doi = {10.1016/J.FUTURE.2020.04.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangFLQLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiuXJTGWL20, author = {Peng Liu and Yuanxin Xu and Quan Jiang and Yuwei Tang and Yameng Guo and Li{-}e Wang and Xianxian Li}, title = {Local differential privacy for social network publishing}, journal = {Neurocomputing}, volume = {391}, pages = {273--279}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2018.11.104}, doi = {10.1016/J.NEUCOM.2018.11.104}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/LiuXJTGWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/CaiWLL20, author = {Hanbo Cai and Jinyan Wang and Xiaohong Liu and Xianxian Li}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {{DP-AP:} Differential Privacy-Preserving Affinity Propagation Clustering}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {73--79}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00018}, doi = {10.1109/BIGDATASE50710.2020.00018}, timestamp = {Wed, 17 Feb 2021 12:27:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/CaiWLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hp3c/LiWXLLL20, author = {Chunpei Li and Li{-}e Wang and Qingting Xu and Dongchen Li and Peng Liu and Xianxian Li}, title = {Groupchain: {A} Blockchain Model with Privacy-preservation and Supervision}, booktitle = {{HP3C} 2020: 4th International Conference on High Performance Compilation, Computing and Communications, Guangzhou, China, June, 2020}, pages = {42--49}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407947.3407959}, doi = {10.1145/3407947.3407959}, timestamp = {Mon, 20 Nov 2023 13:42:24 +0100}, biburl = {https://dblp.org/rec/conf/hp3c/LiWXLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangLBCLL20, author = {Li{-}e Wang and Shan Lin and Yan Bai and Sang{-}Yoon Chang and Xianxian Li and Peng Liu}, title = {A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149167}, doi = {10.1109/ICC40277.2020.9149167}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangLBCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWTLH20, author = {De Li and Jinyan Wang and Zhou Tan and Xianxian Li and Yuhang Hu}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {631--638}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00089}, doi = {10.1109/TRUSTCOM50675.2020.00089}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWTLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02076, author = {Jinhuan Duan and Xianxian Li and Shiqi Gao and Jinyan Wang and Zili Zhong}, title = {{SSGD:} {A} safe and efficient method of gradient descent}, journal = {CoRR}, volume = {abs/2012.02076}, year = {2020}, url = {https://arxiv.org/abs/2012.02076}, eprinttype = {arXiv}, eprint = {2012.02076}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLFLL19, author = {Jinyan Wang and Chen Liu and Xingcheng Fu and Xudong Luo and Xianxian Li}, title = {A three-phase approach to differentially private crucial patterns mining over data streams}, journal = {Comput. Secur.}, volume = {82}, pages = {30--48}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.12.004}, doi = {10.1016/J.COSE.2018.12.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLFLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/WangDLL19, author = {Jinyan Wang and Kai Du and Xudong Luo and Xianxian Li}, title = {Two privacy-preserving approaches for data publishing with identity reservation}, journal = {Knowl. Inf. Syst.}, volume = {60}, number = {2}, pages = {1039--1080}, year = {2019}, url = {https://doi.org/10.1007/s10115-018-1237-3}, doi = {10.1007/S10115-018-1237-3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/WangDLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/GeLYH19, author = {Wei Ge and Xianxian Li and Chunfeng Yuan and Yihua Huang}, title = {Correlation-aware partitioning for skewed range query optimization}, journal = {World Wide Web}, volume = {22}, number = {1}, pages = {125--151}, year = {2019}, url = {https://doi.org/10.1007/s11280-018-0547-4}, doi = {10.1007/S11280-018-0547-4}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/www/GeLYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/LiLLW19, author = {Xianxian Li and Chunfeng Luo and Peng Liu and Li{-}e Wang}, title = {Information Entropy Differential Privacy: {A} Differential Privacy Protection Data Method Based on Rough Set Theory}, booktitle = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, pages = {918--923}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00169}, doi = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00169}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/LiLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangDL18, author = {Jinyan Wang and Chaoji Deng and Xianxian Li}, title = {Two Privacy-Preserving Approaches for Publishing Transactional Data Streams}, journal = {{IEEE} Access}, volume = {6}, pages = {23648--23658}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2814622}, doi = {10.1109/ACCESS.2018.2814622}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangL18, author = {Li{-}e Wang and Xianxian Li}, title = {A graph-based multifold model for anonymizing data with attributes of multiple types}, journal = {Comput. Secur.}, volume = {72}, pages = {122--135}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.09.003}, doi = {10.1016/J.COSE.2017.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiSBW18, author = {Xianxian Li and Peipei Sui and Yan Bai and Li{-}E Wang}, title = {M-generalization for multipurpose transactional data publication}, journal = {Frontiers Comput. Sci.}, volume = {12}, number = {6}, pages = {1241--1254}, year = {2018}, url = {https://doi.org/10.1007/s11704-016-6061-x}, doi = {10.1007/S11704-016-6061-X}, timestamp = {Fri, 21 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiSBW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/WangCLWL18, author = {Jinyan Wang and Guoqing Cai and Chen Liu and Jingli Wu and Xianxian Li}, title = {A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory}, journal = {Symmetry}, volume = {10}, number = {8}, pages = {333}, year = {2018}, url = {https://doi.org/10.3390/sym10080333}, doi = {10.3390/SYM10080333}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/WangCLWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mspn/YuZWLL18, author = {Dongran Yu and Huaxing Zhao and Li{-}e Wang and Peng Liu and Xianxian Li}, editor = {{\'{E}}ric Renault and Selma Boumerdassi and Samia Bouzefrane}, title = {A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing}, booktitle = {Mobile, Secure, and Programmable Networking - 4th International Conference, {MSPN} 2018, Paris, France, June 18-20, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11005}, pages = {224--239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03101-5\_19}, doi = {10.1007/978-3-030-03101-5\_19}, timestamp = {Mon, 26 Apr 2021 09:27:03 +0200}, biburl = {https://dblp.org/rec/conf/mspn/YuZWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccir/2018, editor = {Shichao Zhang and Tie{-}Yan Liu and Xianxian Li and Jiafeng Guo and Chenliang Li}, title = {Information Retrieval - 24th China Conference, {CCIR} 2018, Guilin, China, September 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11168}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01012-6}, doi = {10.1007/978-3-030-01012-6}, isbn = {978-3-030-01011-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccir/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SuiLB17, author = {Peipei Sui and Xianxian Li and Yan Bai}, title = {A Study of Enhancing Privacy for Intelligent Transportation Systems: {\textdollar}k{\textdollar} -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data}, journal = {{IEEE} Access}, volume = {5}, pages = {24555--24567}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2767641}, doi = {10.1109/ACCESS.2017.2767641}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SuiLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/SuiL17, author = {Peipei Sui and Xianxian Li}, title = {A privacy-preserving approach for multimodal transaction data integrated analysis}, journal = {Neurocomputing}, volume = {253}, pages = {56--64}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2016.09.130}, doi = {10.1016/J.NEUCOM.2016.09.130}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/SuiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/LiuBWL17, author = {Peng Liu and Yan Bai and Lie Wang and Xianxian Li}, title = {Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {27}, number = {1}, pages = {71--90}, year = {2017}, url = {https://doi.org/10.1142/S0218194017500048}, doi = {10.1142/S0218194017500048}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/LiuBWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WangXL018, author = {Lie Wang and Yuanxin Xu and Xianxian Li and Peng Liu}, title = {{\unicode{31227}}{\unicode{21160}}{\unicode{21830}}{\unicode{21153}}{\unicode{25512}}{\unicode{33616}}{\unicode{31995}}{\unicode{32479}}{\unicode{20013}}{\unicode{30340}}{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}P2P{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{20445}}{\unicode{25252}}{\unicode{31574}}{\unicode{30053}} (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {9}, pages = {178--183}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.09.034}, doi = {10.11896/J.ISSN.1002-137X.2017.09.034}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/WangXL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/WangGL17, author = {Li{-}e Wang and Yameng Guo and Xianxian Li}, title = {Transparent Link: {A} Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model}, booktitle = {Third {IEEE} International Conference on Big Data Computing Service and Applications, BigDataService 2017, Redwood City, CA, USA, April 6-9, 2017}, pages = {204--209}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigDataService.2017.13}, doi = {10.1109/BIGDATASERVICE.2017.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/WangGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthcom/HuWTLLL17, author = {Xiaoyi Hu and Li{-}e Wang and Jiaqi Tang and Cong Lei and Peng Liu and Xianxian Li}, title = {Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks}, booktitle = {19th {IEEE} International Conference on e-Health Networking, Applications and Services, Healthcom 2017, Dalian, China, October 12-15, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/HealthCom.2017.8210763}, doi = {10.1109/HEALTHCOM.2017.8210763}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/healthcom/HuWTLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbk/LiuWL17, author = {Peng Liu and Li{-}e Wang and Xianxian Li}, title = {Randomized Perturbation for Privacy-Preserving Social Network Data Publishing}, booktitle = {{IEEE} International Conference on Big Knowledge, {ICBK} 2017, Hefei, China, August 9-10, 2017}, pages = {208--213}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICBK.2017.34}, doi = {10.1109/ICBK.2017.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbk/LiuWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLZ16, author = {Zhenjun Tang and Xianquan Zhang and Xianxian Li and Shichao Zhang}, title = {Robust Image Hashing With Ring Partition and Invariant Vector Distance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {200--214}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2485163}, doi = {10.1109/TIFS.2015.2485163}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZWL16, author = {Liuhua Chen and Shenghai Zhong and Li{-}e Wang and Xianxian Li}, editor = {Jens Grossklags and Bart Preneel}, title = {A Sensitivity-Adaptive {\(\rho\)}-Uncertainty Model for Set-Valued Data}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {460--473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_27}, doi = {10.1007/978-3-662-54970-4\_27}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChenZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/WangLLL16, author = {Huanjie Wang and Peng Liu and Shan Lin and Xianxian Li}, editor = {Jong{-}Hyouk Lee and Sangheon Pack}, title = {A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Networks - 12th International Conference, QShine 2016, Seoul, Korea, July 7-8, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {199}, pages = {36--45}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-60717-7\_4}, doi = {10.1007/978-3-319-60717-7\_4}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qshine/WangLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/SuiL16, author = {Peipei Sui and Xianxian Li}, title = {{ROAT:} Road-Network-Based Anonymization of Trajectories}, booktitle = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18-21, 2016}, pages = {309--314}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0063}, doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP-SMARTWORLD.2016.0063}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/SuiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/0044LW15, author = {Peng Liu and Xianxian Li and Lie Wang}, title = {{\unicode{31038}}{\unicode{20250}}{\unicode{32593}}{\unicode{32476}}{\unicode{20998}}{\unicode{26512}}{\unicode{36719}}{\unicode{20214}}{\unicode{30740}}{\unicode{31350}} (Study of Social Network Analysis Software)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {12}, pages = {171--174}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/I12/171}, doi = {Y2015/V42/I12/171}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/0044LW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangL15, author = {Li{-}e Wang and Xianxian Li}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {A Hybrid Optimization Approach for Anonymizing Transactional Data}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {120--132}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_11}, doi = {10.1007/978-3-319-27161-3\_11}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/WangL14, author = {Lie Wang and Xianxian Li}, title = {A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {24}, number = {7}, pages = {1091}, year = {2014}, url = {https://doi.org/10.1142/S0218194014500363}, doi = {10.1142/S0218194014500363}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/WangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/WangL14, author = {Li{-}e Wang and Xianxian Li}, editor = {Xudong Luo and Jeffrey Xu Yu and Zhi Li}, title = {Personalized Privacy Protection for Transactional Data}, booktitle = {Advanced Data Mining and Applications - 10th International Conference, {ADMA} 2014, Guilin, China, December 19-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8933}, pages = {253--266}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14717-8\_20}, doi = {10.1007/978-3-319-14717-8\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/adma/WangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/LiuCL14, author = {Peng Liu and Lei Cui and Xianxian Li}, editor = {Xudong Luo and Jeffrey Xu Yu and Zhi Li}, title = {A Hybrid Algorithm for Privacy Preserving Social Network Publication}, booktitle = {Advanced Data Mining and Applications - 10th International Conference, {ADMA} 2014, Guilin, China, December 19-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8933}, pages = {267--278}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14717-8\_21}, doi = {10.1007/978-3-319-14717-8\_21}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adma/LiuCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/SuiWWL14, author = {Peipei Sui and Tianyu Wo and Zhangle Wen and Xianxian Li}, title = {Privacy Risks in Publication of Taxi {GPS} Data}, booktitle = {2014 {IEEE} International Conference on High Performance Computing and Communications, 6th {IEEE} International Symposium on Cyberspace Safety and Security, 11th {IEEE} International Conference on Embedded Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August 20-22, 2014}, pages = {1189--1196}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HPCC.2014.195}, doi = {10.1109/HPCC.2014.195}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/SuiWWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/JiaoLL14, author = {Jia Jiao and Peng Liu and Xianxian Li}, editor = {T. V. Gopal and Manindra Agrawal and Angsheng Li and S. Barry Cooper}, title = {A Personalized Privacy Preserving Method for Publishing Social Network Data}, booktitle = {Theory and Applications of Models of Computation - 11th Annual Conference, {TAMC} 2014, Chennai, India, April 11-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8402}, pages = {141--157}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06089-7\_10}, doi = {10.1007/978-3-319-06089-7\_10}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tamc/JiaoLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/ZhangZLZ13, author = {Jilian Zhang and Xiaofeng Zhu and Xianxian Li and Shichao Zhang}, editor = {Hiroshi Motoda and Zhaohui Wu and Longbing Cao and Osmar R. Za{\"{\i}}ane and Min Yao and Wei Wang}, title = {Mining Item Popularity for Recommender Systems}, booktitle = {Advanced Data Mining and Applications - 9th International Conference, {ADMA} 2013, Hangzhou, China, December 14-16, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8347}, pages = {372--383}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53917-6\_33}, doi = {10.1007/978-3-642-53917-6\_33}, timestamp = {Tue, 01 Feb 2022 13:00:44 +0100}, biburl = {https://dblp.org/rec/conf/adma/ZhangZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LiuL13, author = {Peng Liu and Xianxian Li}, title = {An Improved Privacy Preserving Algorithm for Publishing Social Network Data}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications {\&} 2013 {IEEE} International Conference on Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China, November 13-15, 2013}, pages = {888--895}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCC.and.EUC.2013.127}, doi = {10.1109/HPCC.AND.EUC.2013.127}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/SuiWWL13, author = {Peipei Sui and Tianyu Wo and Zhangle Wen and Xianxian Li}, title = {Privacy-Preserving Trajectory Publication against Parking Point Attacks}, booktitle = {2013 {IEEE} 10th International Conference on Ubiquitous Intelligence and Computing and 2013 {IEEE} 10th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18-21, 2013}, pages = {569--574}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/UIC-ATC.2013.75}, doi = {10.1109/UIC-ATC.2013.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/SuiWWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/XuZLL12, author = {Jie Xu and Dacheng Zhang and Lu Liu and Xianxian Li}, title = {Dynamic Authentication for Cross-Realm SOA-Based Business Processes}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {5}, number = {1}, pages = {20--32}, year = {2012}, url = {https://doi.org/10.1109/TSC.2010.33}, doi = {10.1109/TSC.2010.33}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/XuZLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuaiDLDG09, author = {Jinpeng Huai and Ting Deng and Xianxian Li and Zongxia Du and Huipeng Guo}, title = {AutoSyn: {A} new approach to automated synthesis of composite web services with correctness guarantee}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {9}, pages = {1534--1549}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0155-0}, doi = {10.1007/S11432-009-0155-0}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuaiDLDG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DengHLDG09, author = {Ting Deng and Jinpeng Huai and Xianxian Li and Zongxia Du and Huipeng Guo}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Automated synthesis of composite services with correctness guarantee}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {1127--1128}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526890}, doi = {10.1145/1526709.1526890}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/DengHLDG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LinHZHL08, author = {Li Lin and Jinpeng Huai and Yanmin Zhu and Chunming Hu and Xianxian Li}, editor = {Robert Meersman and Zahir Tari}, title = {A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5331}, pages = {231--248}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88871-0\_17}, doi = {10.1007/978-3-540-88871-0\_17}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/LinHZHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangXL07, author = {Dacheng Zhang and Jie Xu and Xianxian Li}, title = {Dynamic Cross-Realm Authentication for Multi-Party Service Interactions}, booktitle = {The 37th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK, Proceedings}, pages = {440--449}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DSN.2007.36}, doi = {10.1109/DSN.2007.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangXL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiH06, author = {Xianxian Li and Jinpeng Huai}, title = {Cryptographic protocol security analysis based on bounded constructing algorithm}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {49}, number = {1}, pages = {26--47}, year = {2006}, url = {https://doi.org/10.1007/s11432-004-0512-y}, doi = {10.1007/S11432-004-0512-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiL06, author = {Xianxian Li and Lijun Liu}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {A Multi-agent Cooperative Model and System for Integrated Security Monitoring}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {329--341}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_23}, doi = {10.1007/11935070\_23}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sutc/HuaiLZHZ06, author = {Jinpeng Huai and Xianxian Li and Wenyi Zhang and Jun Han and Yongzhen Zhuang}, title = {A Software Protocol of Goals and Operations Based on {BDI} Model}, booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing {(SUTC} 2006), 5-7 June 2006, Taichung, Taiwan}, pages = {454--461}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.18}, doi = {10.1109/SUTC.2006.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sutc/HuaiLZHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhangLHL05, author = {Yu Zhang and Xianxian Li and Jinpeng Huai and Yunhao Liu}, title = {Access Control in Peer-to-Peer Collaborative Systems}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {835--840}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.29}, doi = {10.1109/ICDCSW.2005.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhangLHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/HuaiZLL05, author = {Jinpeng Huai and Yu Zhang and Xianxian Li and Yunhao Liu}, title = {Distributed Access Control in {CROWN} Groups}, booktitle = {34th International Conference on Parallel Processing {(ICPP} 2005), 14-17 June 2005, Oslo, Norway}, pages = {435--442}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPP.2005.33}, doi = {10.1109/ICPP.2005.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/HuaiZLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/LiHLL05, author = {Jianxin Li and Jinpeng Huai and Qin Li and Xianxian Li}, editor = {Xiaohua Jia and Jie Wu and Yanxiang He}, title = {Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method}, booktitle = {Mobile Ad-hoc and Sensor Networks, First International Conference, {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3794}, pages = {1073--1080}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599463\_105}, doi = {10.1007/11599463\_105}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/LiHLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuaiL04, author = {Jinpeng Huai and Xianxian Li}, title = {Algebra model and security analysis for cryptographic protocols}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {47}, number = {2}, pages = {199--220}, year = {2004}, url = {https://doi.org/10.1360/02yf0185}, doi = {10.1360/02YF0185}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuaiL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiH02a, author = {Xianxian Li and Jinpeng Huai}, title = {Efficient Non-Repudiation Multicast Source Authentication Schemes}, journal = {J. Comput. Sci. Technol.}, volume = {17}, number = {6}, pages = {820--829}, year = {2002}, url = {https://doi.org/10.1007/BF02960772}, doi = {10.1007/BF02960772}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LiH02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.