Остановите войну!
for scientists:
default search action
Hui Xia 0001
Person information
- affiliation: Ocean University of China, Qingdao, China
- affiliation (2013 - 2020): Qingdao University, College of Computer Science and Technology, China
- affiliation (PhD 2013): Shandong University, School of Computer Science and Technology, Jinan, China
Other persons with the same name
- Hui Xia — disambiguation page
- Hui Xia 0002 — Chinese Academy of Sciences, Institute of Electrical Engineering, Beijing, China (and 1 more)
- Hui Xia 0003 — Hunan Radio and Television University, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Biao Xie, Chunqiang Hu, Hongyu Huang, Jiguo Yu, Hui Xia:
DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation. IEEE Internet Things J. 11(8): 13837-13850 (2024) - [j28]Chunqiang Hu, Jianshuo Liu, Hui Xia, Shaojiang Deng, Jiguo Yu:
A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT. IEEE Trans. Netw. Sci. Eng. 11(2): 2138-2152 (2024) - 2023
- [j27]Zi Kang, Hui Xia, Rui Zhang, Shuliang Jiang, Xiaolong Shi, Zuming Zhang:
FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition. Comput. Secur. 135: 103522 (2023) - [j26]Xue-cai Feng, Hui Xia, Shuo Xu, Lijuan Xu, Rui Zhang:
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things. Expert Syst. Appl. 234: 120965 (2023) - [j25]Hui Xia, Shuo Xu, Jiaming Pei, Rui Zhang, Zhi Yu, Weitao Zou, Lukun Wang, Chao Liu:
FedME2: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN. IEEE J. Sel. Areas Commun. 41(11): 3573-3588 (2023) - [j24]Run Du, Shuo Xu, Rui Zhang, Lijuan Xu, Hui Xia:
A dynamic adaptive iterative clustered federated learning scheme. Knowl. Based Syst. 276: 110741 (2023) - [j23]Zewei Liu, Chunqiang Hu, Ruinian Li, Tao Xiang, Xingwang Li, Jiguo Yu, Hui Xia:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Trans. Cloud Comput. 11(3): 2325-2336 (2023) - [j22]Hui Xia, Shu-shu Shao, Chunqiang Hu, Rui Zhang, Tie Qiu, Fu Xiao:
Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network. IEEE Trans. Knowl. Data Eng. 35(5): 5203-5215 (2023) - [c12]Zi Kang, Yumei Zhang, Rui Zhang, Yanan Jiang, Hui Xia:
QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition. PRCV (8) 2023: 417-429 - 2022
- [j21]Rui Zhang, Hui Xia, Chunqiang Hu, Cheng Zhang, Chao Liu, Fu Xiao:
Generating Adversarial Examples With Shadow Model. IEEE Trans. Ind. Informatics 18(9): 6283-6289 (2022) - [j20]Zewei Liu, Chunqiang Hu, Hui Xia, Tao Xiang, Baolin Wang, Jiajun Chen:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. IEEE Trans. Netw. Serv. Manag. 19(4): 5196-5207 (2022) - [c11]Ning Huang, Xue-cai Feng, Rui Zhang, Xiugui Yang, Hui Xia:
Network Defense Resource Allocation Scheme with Multi-armed Bandits. WASA (1) 2022: 326-337 - [c10]Xiugui Yang, Xiangyun Qian, Rui Zhang, Ning Huang, Hui Xia:
Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons. WASA (2) 2022: 375-383 - [i3]Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang:
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? CoRR abs/2206.10809 (2022) - [i2]Hui Xia, Rui Zhang, Shuliang Jiang, Zi Kang:
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture. CoRR abs/2206.10988 (2022) - [i1]Hui Xia, Xiugui Yang, Xiangyun Qian, Rui Zhang:
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair. CoRR abs/2207.12863 (2022) - 2021
- [j19]Jufu Cui, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168: 136-145 (2021) - [j18]Rui Zhang, Hui Xia, Chao Liu, Ruobing Jiang, Xiangguo Cheng:
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning. Wirel. Commun. Mob. Comput. 2021: 6619715:1-6619715:9 (2021) - [c9]Shu-shu Shao, Hui Xia, Rui Zhang, Xiangguo Cheng:
Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. WASA (2) 2021: 96-106 - 2020
- [j17]Rui Zhang, Hui Xia, Fei Chen, Li Li, Xiangguo Cheng:
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System. IEEE Access 8: 12316-12326 (2020) - [j16]Li Li, Jufu Cui, Rui Zhang, Hui Xia, Xiangguo Cheng:
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things. IEEE Access 8: 64184-64192 (2020) - [j15]Yizhe Li, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things. IEEE Access 8: 123938-123951 (2020) - [j14]Hui Xia, Li Li, Xiangguo Cheng, Xiuzhen Cheng, Tie Qiu:
Modeling and Analysis Botnet Propagation in Social Internet of Things. IEEE Internet Things J. 7(8): 7470-7481 (2020) - [j13]Hui Xia, Li Li, Xiangguo Cheng, Chao Liu, Tie Qiu:
A Dynamic Virus Propagation Model Based on Social Attributes in City IoT. IEEE Internet Things J. 7(9): 8036-8048 (2020) - [j12]Rui Zhang, Hui Xia, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. Mob. Inf. Syst. 2020: 8844116:1-8844116:9 (2020) - [j11]Hui Xia, Fu Xiao, Sanshun Zhang, Xiangguo Cheng, Zhenkuan Pan:
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 792-804 (2020) - [j10]Hui Xia, Rui Zhang, Xiangguo Cheng, Tie Qiu, Dapeng Oliver Wu:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. IEEE/ACM Trans. Netw. 28(6): 2741-2754 (2020) - [j9]Hui Xia, Zhetao Li, Yuhui Zheng, Anfeng Liu, Young-June Choi, Hiroo Sekiya:
A Novel Light-Weight Subjective Trust Inference Framework in MANETs. IEEE Trans. Sustain. Comput. 5(2): 236-248 (2020) - [c8]Rui Zhang, Hui Xia, Jufu Cui, Yizhe Li, Shu-shu Shao, Hang Ren:
A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server. ML4CS (3) 2020: 183-192 - [c7]Rui Zhang, Hui Xia, Jufu Cui, Xiangguo Cheng:
A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems. WASA (2) 2020: 105-112
2010 – 2019
- 2019
- [j8]Hui Xia, Chun-qiang Hu, Fu Xiao, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j7]Hui Xia, Sanshun Zhang, Ye Li, Zhenkuan Pan, Xin Peng, Xiuzhen Cheng:
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(7): 7108-7120 (2019) - [c6]Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. INFOCOM 2019: 838-846 - [c5]Li Li, Hui Xia, Rui Zhang, Ye Li:
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. WASA 2019: 596-604 - 2018
- [j6]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j5]Hui Xia, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. Secur. Commun. Networks 2018: 7608198:1-7608198:12 (2018) - [c4]Sanshun Zhang, Shiwen Wang, Hui Xia, Xiangguo Cheng:
An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks. IIKI 2018: 473-479 - [c3]Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. WASA 2018: 893-906 - 2016
- [j4]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j3]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j2]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j1]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c2]Hui Xia, Guo-Dong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. Trustcom/BigDataSE/ISPA 2016: 50-56 - 2014
- [c1]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint