default search action
Xuran Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Shuo Zhao, Han Gao, Xuran Li, Huiyan Li, You Wang, Ruifen Hu, Jin Zhang, Wei Yao, Guang Li:
An outlier detection based two-stage EEG artifact removal method using empirical wavelet transform and canonical correlation analysis. Biomed. Signal Process. Control. 92: 106022 (2024) - [j15]Yamei Gong, Jie Tian, Xuran Li, Qingde Liu, Tiantian Li, Ji Bian:
Stackelberg game-based task offloading in mobile edge computing-enabled hierarchical multi-coalition unmanned aerial vehicle networks. Int. J. Commun. Syst. 37(4) (2024) - [j14]Kaiqian Qu, Jia Ye, Xuran Li, Shuaishuai Guo:
Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions. IEEE Internet Things Mag. 7(4): 52-58 (2024) - [i6]Xuran Li, Peng Wu, Yanting Chen, Xingjun Ma, Zhen Zhang, Kaixiang Dong:
The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness. CoRR abs/2404.01356 (2024) - 2023
- [j13]Jingxian Liu, Junjie Yan, Dehuan Wan, Xuran Li, Saba Al-Rubaye, Anwer Al-Dulaimi, Zhi Quan:
Digital Twins Based Intelligent State Prediction Method for Maneuvering-Target Tracking. IEEE J. Sel. Areas Commun. 41(11): 3589-3606 (2023) - [j12]Xuran Li, Shuaishuai Guo, Tuo Li, Xiaofeng Zou, Dengwang Li:
On the Performance Trade-Off of Distributed Integrated Sensing and Communication Networks. IEEE Wirel. Commun. Lett. 12(12): 2033-2037 (2023) - [c12]Xuran Li, Peng Wu, Jing Su:
Accurate Fairness: Improving Individual Fairness without Trading Accuracy. AAAI 2023: 14312-14320 - [i5]Xuran Li, Peng Wu, Kaixiang Dong, Zhen Zhang:
RobustFair: Adversarial Evaluation through Fairness Confusion Directed Gradient Search. CoRR abs/2305.10906 (2023) - [i4]Xuran Li, Shuaishuai Guo, Tuo Li, Xiaofeng Zou, Dengwang Li:
On the Performance Trade-off of Distributed Integrated Sensing and Communication Networks. CoRR abs/2308.06596 (2023) - 2022
- [j11]Xuran Li, Shuaishuai Guo, Hong-Ning Dai, Dengwang Li:
Infectious Probability Analysis on COVID-19 Spreading With Wireless Edge Networks. IEEE J. Sel. Areas Commun. 40(11): 3239-3254 (2022) - [j10]Tao Zhang, Xiaodong Jiang, Linlin Jiang, Xuran Li, Shenbin Yang, Yingxue Li:
Hyperspectral Reflectance Characteristics of Rice Canopies under Changes in Diffuse Radiation Fraction. Remote. Sens. 14(2): 285 (2022) - [c11]Jing Su, Zhen Zhang, Peng Wu, Xuran Li, Jian Zhang:
Adversarial Input Detection Based on Critical Transformation Robustness. ISSRE 2022: 390-401 - [i3]Xuran Li, Bishenghui Tao, Hong-Ning Dai, Muhammad Imran, Dehuan Wan, Dengwang Li:
Is Blockchain for Internet of Medical Things a Panacea for COVID-19 Pandemic? CoRR abs/2204.07725 (2022) - [i2]Xuran Li, Peng Wu, Jing Su:
Accurate Fairness: Improving Individual Fairness without Trading Accuracy. CoRR abs/2205.08704 (2022) - [i1]Xuran Li, Shuaishuai Guo, Hong-Ning Dai, Dengwang Li:
Infectious Probability Analysis on COVID-19 Spreading with Wireless Edge Networks. CoRR abs/2210.02017 (2022) - 2021
- [j9]Xuran Li, Hong-Ning Dai, Mahendra Kumar Shukla, Dengwang Li, Huaqiang Xu, Muhammad Imran:
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications. Comput. Stand. Interfaces 78: 103540 (2021) - [j8]Xuran Li, Bishenghui Tao, Hong-Ning Dai, Muhammad Imran, Dehuan Wan, Dengwang Li:
Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic? Pervasive Mob. Comput. 75: 101434 (2021) - [c10]Xuran Li, Hong-Ning Dai, Jie Tian, Dehuan Wan, Dengwang Li:
Coverage Analysis of Blockchain-enabled Wireless IoMT Networks. GLOBECOM (Workshops) 2021: 1-5 - 2020
- [j7]Xuran Li, Hong-Ning Dai, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran:
Securing Internet of Medical Things with Friendly-jamming schemes. Comput. Commun. 160: 431-442 (2020) - [j6]Qubeijian Wang, Hong-Ning Dai, Xuran Li, Mahendra Kumar Shukla, Muhammad Imran:
Artificial noise aided scheme to secure UAV-assisted Internet of Things with wireless power transfer. Comput. Commun. 164: 1-12 (2020)
2010 – 2019
- 2018
- [j5]Xuran Li, Qiu Wang, Hong-Ning Dai, Hao Wang:
A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack. Sensors 18(6): 1938 (2018) - [c9]Qi Sun, Hong-Ning Dai, Qiu Wang, Xuran Li, Hao Wang:
When Friendly Jamming Meets Wireless Energy Transfer. iThings/GreenCom/CPSCom/SmartData 2018: 320-325 - 2017
- [c8]Xuran Li, Hong-Ning Dai, Qiu Wang, Athanasios V. Vasilakos:
AE-shelter: An novel anti-eavesdropping scheme in wireless networks. ICC 2017: 1-6 - [c7]Xuran Li, Hong-Ning Dai:
Friendly-Jamming: An anti-eavesdropping scheme in wireless networks. WoWMoM 2017: 1-3 - 2016
- [j4]Xuran Li, Hao Wang, Hong-Ning Dai, Yuanyuan Wang, Qinglin Zhao:
An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things. Mob. Inf. Syst. 2016: 4313475:1-4313475:10 (2016) - [j3]Qiu Wang, Hong-Ning Dai, Xuran Li, Hao Wang, Hong Xiao:
On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors 16(5): 721 (2016) - [j2]Xuran Li, Hong-Ning Dai, Hao Wang, Hong Xiao:
On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors 16(12): 1987 (2016) - [c6]Hong-Ning Dai, Hao Wang, Hong Xiao, Xuran Li, Qiu Wang:
On Eavesdropping Attacks in Wireless Networks. CSE/EUC/DCABES 2016: 138-141 - [c5]Xuran Li, Hong-Ning Dai, Hao Wang:
Friendly-Jamming: An Anti-Eavesdropping Scheme in Wireless Networks of Things. GLOBECOM 2016: 1-6 - [c4]Hong-Ning Dai, Hao Wang, Hong Xiao, Zibin Zheng, Qiu Wang, Xuran Li, Xu Zhuge:
On analyzing eavesdropping behaviours in underwater acoustic sensor networks. WUWNet 2016: 53 - 2015
- [j1]Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak-Fong Cheang, Qiu Wang:
On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 11: 196-204 (2015) - [c3]Qiu Wang, Hong-Ning Dai, Xuran Li, Hao Wang:
Eavesdropping attacks in underwater acoustic networks. ICICS 2015: 1-5 - [c2]Yuanyuan Wang, Hongning Dai, Qiu Wang, Xuran Li, Qinglin Zhao, Chak-Fong Cheang:
Local connectivity of wireless networks with directional antennas. PIMRC 2015: 1481-1486 - 2014
- [c1]Xuran Li, Hongning Dai, Qinglin Zhao:
An analytical model on eavesdropping attacks in wireless networks. ICCS 2014: 538-542
Coauthor Index
aka: Hong-Ning Dai
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint