
Hui Xia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j44]Jufu Cui, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168: 136-145 (2021) - 2020
- [j43]Rui Zhang
, Hui Xia
, Fei Chen
, Li Li
, Xiangguo Cheng
:
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System. IEEE Access 8: 12316-12326 (2020) - [j42]Li Li
, Jufu Cui
, Rui Zhang
, Hui Xia
, Xiangguo Cheng
:
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things. IEEE Access 8: 64184-64192 (2020) - [j41]Yizhe Li, Hui Xia
, Rui Zhang
, Benxu Hu, Xiangguo Cheng
:
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things. IEEE Access 8: 123938-123951 (2020) - [j40]Hui Xia
:
Improve the Resilience of Multilayer Supply Chain Networks. Complex. 2020: 6596483:1-6596483:9 (2020) - [j39]Hui Xia, Weiji Yang:
Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone. Int. J. Netw. Secur. 22(2): 201-211 (2020) - [j38]Hui Xia
, Li Li
, Xiangguo Cheng
, Xiuzhen Cheng
, Tie Qiu
:
Modeling and Analysis Botnet Propagation in Social Internet of Things. IEEE Internet Things J. 7(8): 7470-7481 (2020) - [j37]Hui Xia, Li Li, Xiangguo Cheng, Chao Liu
, Tie Qiu
:
A Dynamic Virus Propagation Model Based on Social Attributes in City IoT. IEEE Internet Things J. 7(9): 8036-8048 (2020) - [j36]Rui Zhang, Hui Xia, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. Mob. Inf. Syst. 2020: 8844116:1-8844116:9 (2020) - [j35]Hui Xia
, Fu Xiao
, Sanshun Zhang
, Xiangguo Cheng, Zhenkuan Pan:
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 792-804 (2020) - [j34]Hui Xia
, Rui Zhang
, Xiangguo Cheng
, Tie Qiu
, Dapeng Oliver Wu
:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. IEEE/ACM Trans. Netw. 28(6): 2741-2754 (2020) - [j33]Hui Xia
, Zhetao Li, Yuhui Zheng
, Anfeng Liu
, Young-June Choi, Hiroo Sekiya:
A Novel Light-Weight Subjective Trust Inference Framework in MANETs. IEEE Trans. Sustain. Comput. 5(2): 236-248 (2020) - [c33]Xintang Lin, Haibo Zhang, Hui Xia, Liangjiang Yu, Xiangyan Fang, Xuan Chen, Zhikai Wang:
Test Case Minimization for Regression Testing of Composite Service Based on Modification Impact Analysis. WISA 2020: 15-26 - [c32]Haibo Zhang, Hui Xia, Xintang Lin, Liangjiang Yu, Xiangyan Fang, Xuan Chen, Hongquan Zhu:
Test Case Generation of Composite Web Services Based on Semantic Matching and Condition Recognition. WISA 2020: 27-35 - [c31]Rui Zhang, Hui Xia, Jufu Cui, Yizhe Li, Shu-shu Shao, Hang Ren:
A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server. ML4CS (3) 2020: 183-192 - [c30]Rui Zhang, Hui Xia, Jufu Cui, Xiangguo Cheng:
A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems. WASA (2) 2020: 105-112
2010 – 2019
- 2019
- [j32]Hui Xia
, Chun-qiang Hu, Fu Xiao
, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j31]Tao Sun, Hui Xia, Lin Li, Hang Shen, Yu Liu:
A Semantic Expansion Model for VGI Retrieval. ISPRS Int. J. Geo Inf. 8(12): 589 (2019) - [j30]Hui Xia, Weiji Yang:
Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants. Int. J. Netw. Secur. 21(5): 719-727 (2019) - [j29]Xiaonan Li, Guoqiang Liu, Hui Xia, Lili Hu, Shiqiang Li, Shilong Zhao, Haiyan Chen:
Investigation in Radio Frequency Magnetic Field Mapping Towards Tissue Magnetic Resonance Electric Properties Tomography. J. Medical Imaging Health Informatics 9(1): 78-83 (2019) - [j28]Hui Xia, Guangxin Ding, Guoqiang Liu:
Magneto-Acousto-Electrical Tomography with Magnetic Induction Based on Laser-Generated Ultrasound Transducer. J. Medical Imaging Health Informatics 9(1): 183-187 (2019) - [j27]Jianbo Wu
, Junzhen Zhu
, Hui Xia, Chengyong Liu, Xiaoming Huang, Gui Yun Tian:
DC-Biased Magnetization Based Eddy Current Thermography for Subsurface Defect Detection. IEEE Trans. Ind. Informatics 15(12): 6252-6259 (2019) - [j26]Hui Xia
, Sanshun Zhang
, Ye Li, Zhenkuan Pan, Xin Peng, Xiuzhen Cheng
:
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(7): 7108-7120 (2019) - [c29]Lili Wang, Xian Zhang, Zhaohui Wang, Hui Xia, Guoqiang Liu:
Characteristics of Spatial Magnetic Field of Coupling Mechanism with Magnetic Shield in Wireless Charging System. ICITEE 2019: 131:1-131:6 - [c28]Hui Xia, Bin Fang:
A Trend Filtering Based Prediction Model on Network Traffic. ICNC-FSKD 2019: 874-882 - [c27]Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. INFOCOM 2019: 838-846 - [c26]Li Li, Hui Xia, Rui Zhang, Ye Li:
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. WASA 2019: 596-604 - 2018
- [j25]Hui Xia, Bin Fang, Matthew Roughan, Kenjiro Cho, Paul Tune:
A BasisEvolution framework for network traffic anomaly detection. Comput. Networks 135: 15-31 (2018) - [j24]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j23]Hui Xia, Weiji Yang:
Implicit Privacy Protection in Spatio-temporal Data Distribution. J. Inf. Hiding Multim. Signal Process. 9(5): 1199-1211 (2018) - [j22]Hui Xia, Weiji Yang:
Secure Cloud Storage Model Based on TPKE and ECE. J. Inf. Hiding Multim. Signal Process. 9(6): 1549-1558 (2018) - [j21]Hui Xia
, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. Secur. Commun. Networks 2018: 7608198:1-7608198:12 (2018) - [j20]Wei Luo, Yang Yuan
, Yi Wang, Qiuyun Fu, Hui Xia, Honglang Li:
Fast and Accurate Finite Transducer Analysis Method for Wireless Passive Impedance-Loaded SAW Sensors. Sensors 18(11): 3988 (2018) - [c25]Hui Xia, Ligang He, Bin Wang, Cheng Chang, Xie Han, Carsten Maple:
Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices. HPCC/SmartCity/DSS 2018: 416-421 - [c24]Hao Wang, Fenlan Jin, Zeping Gong, Hui Xia, Wei Chen, Lin Zhao:
Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid. ICSAI 2018: 161-165 - [c23]Xiaonan Li, Guoqiang Liu, Shiqiang Li, Hui Xia, Yong Wang:
Planar-coil-based Micro-detection in Nuclear Magnetic Resonance Spectroscopy. ICSAI 2018: 895-899 - [c22]Sanshun Zhang, Shiwen Wang, Hui Xia, Xiangguo Cheng:
An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks. IIKI 2018: 473-479 - [c21]Shiwen Wang, Hui Xia:
A Reputation Management Framework for MANETs. PAC 2018: 119-120 - [c20]Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. WASA 2018: 893-906 - 2017
- [j19]Hui Xia, Xin Dai, Qing Ye, Shenyao Feng
, Rui Li, Xiaomeng Suo:
Design and control of entrainer-assisted reactive distillation for N-propyl propionate production. Comput. Chem. Eng. 106: 559-571 (2017) - [j18]Lin Li, Yu Liu, Haihong Zhu, Shen Ying, Qinyao Luo, Heng Luo, Xi Kuai, Hui Xia, Shen Hang:
A bibliometric and visual analysis of global geo-ontology research. Comput. Geosci. 99: 1-8 (2017) - [j17]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - [j16]Jianbo Wu, Hui Fang, Xiaoming Huang, Hui Xia, Yihua Kang, Chaoqing Tang:
An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect. Sensors 17(12): 2911 (2017) - [c19]Xiaonan Li, Guoqiang Liu, Lili Hu, Hui Xia:
Sensor instrumentation for micro magnetic resonance imaging towards tissue biopsies. CISP-BMEI 2017: 1-5 - 2016
- [j15]Lin Li
, Xiaoyu Xing
, Hui Xia, Xiaoying Huang:
Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest. Entropy 18(2): 45 (2016) - [j14]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j13]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j12]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j11]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c18]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - [c17]Yao Qin, Hua Wang, Zhiping Jia, Hui Xia:
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP. IPCCC 2016: 1-8 - [c16]Hui Xia, Guo-Dong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. Trustcom/BigDataSE/ISPA 2016: 50-56 - 2015
- [j10]Hui Xia, Bin Fang, Min Gao, Hui Ma, Yuanyan Tang, Jing Wen:
A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306: 150-165 (2015) - [j9]Lin Li, Hui Xia, Zheng Li, Zhijun Zhang:
Temporal-Spatial Evolution Analysis of Lake Size-Distribution in the Middle and Lower Yangtze River Basin Using Landsat Imagery Data. Remote. Sens. 7(8): 10364-10384 (2015) - [j8]Liang Guo
, Guoqiang Liu, Hui Xia:
Magneto-Acousto-Electrical Tomography With Magnetic Induction for Conductivity Reconstruction. IEEE Trans. Biomed. Eng. 62(9): 2114-2124 (2015) - [c15]Hui Xia, Tao Huang, Gang Chen:
A method of extracting human facial feature points based on 3D laser scanning point cloud data. Geoinformatics 2015: 1-3 - 2014
- [j7]Hui Xia, Zhiping Jia, Edwin Hsing-Mean Sha:
Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 8(2): 88-103 (2014) - [j6]Hui Xia, Shoujun Xia, Jia Yu, Zhiping Jia, Edwin Hsing-Mean Sha:
Applying link stability estimation mechanism to multicast routing in MANETs. J. Syst. Archit. 60(5): 467-480 (2014) - [j5]Kiwoong Kim
, Samo Begus, Hui Xia, Seung-Kyun Lee, Vojko Jazbinsek
, Zvonko Trontelj, Michael V. Romalis:
Multi-channel atomic magnetometer for magnetoencephalography: A configuration study. NeuroImage 89: 143-151 (2014) - [c14]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480 - 2013
- [j4]Hui Xia, Zhiping Jia, Xin Li, Lei Ju, Edwin Hsing-Mean Sha:
Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks 11(7): 2096-2114 (2013) - [j3]Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin Hsing-Mean Sha:
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9): 1078-1093 (2013) - [c13]Longpeng Zheng, Zhiping Jia, Ruihua Zhang, Hui Xia, Lei Ju, Chuanhao Qu:
Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering. TrustCom/ISPA/IUCC 2013: 1307-1314 - [c12]Chong Yan, Zhiping Jia, Lei Ju, Hui Xia, Huaqiang Xu:
TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator. TrustCom/ISPA/IUCC 2013: 1741-1746 - 2012
- [j2]Feng Zhang, Zhiping Jia, Hui Xia, Xin Li, Edwin Hsing-Mean Sha:
Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model. Comput. Commun. 35(5): 589-596 (2012) - [c11]Yuancan Huang, Yiqun Zhang, Hui Xia, Tong Liang, Dongfang Cheng:
LQ-based optimization for linear impulsive control systems mixed with continuous-time controls and fixed-time impulses. CDC 2012: 6144-6150 - [c10]Zhiyong Zhang, Zhiping Jia, Hui Xia:
Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks. TrustCom 2012: 1570-1577 - 2011
- [j1]Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4): 248-266 (2011) - [c9]Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Youqin Zhu:
A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules. GreenCom 2011: 124-130 - [c8]Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu:
Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks. TrustCom 2011: 1277-1282 - 2010
- [c7]Feng Zhang, Zhiping Jia, Xin Li, Hui Xia:
Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making. EUC 2010: 511-516 - [c6]Bo Xu, Congcong Tao, Hui Xia:
A Method for Dam Safety Evaluation Based on Dempster-Shafer Theory. ICIC (2) 2010: 580-589 - [c5]Li-Li Sheng, Wu-Qun Cheng, Hui Xia, Xian-Bing Wu, Xi-Ping Zhang:
Prediction of annual precipitation based on fuzzy and grey Markov process. ICMLC 2010: 1136-1140 - [c4]Hui Xia, Hui-Ling Han, Lu-Hua Yang, Li-Li Sheng, Hong-Sheng Wang:
Soil water division by SPSS statistics analysis software in Hebei Province. ICMLC 2010: 1980-1986 - [c3]Zhiguo Sun, Hui Xia, Wensheng Wang:
An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things. CCTA (1) 2010: 9-15
2000 – 2009
- 2007
- [c2]Yikun Zhang, Peng Yin, Du-Wu Cui, Hui Xia:
A Method of Requirement Inconsistency Analysis. COMPSAC (1) 2007: 211-214 - 2006
- [c1]Peiyu Qin, Chuanbo Chen, Zehua Lv, Hui Xia:
Physically Based Animation of Tongue on Fire in a Periodic Domain. ICAT Workshops 2006: 496-500
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-01 01:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint