


default search action
Yulai Xie 0002
Person information
Other persons with the same name
- Yulai Xie — disambiguation page
- Yulai Xie 0001
![0000-0003-0764-6579 [0000-0003-0764-6579]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j17]Lin Wu
, Haixia Zhang, Yulai Xie
, Heyu Zhang
, Yafeng Wu, Dan Feng, Pan Zhou, Avani Wildani:
Pontus: Identifying intrusions from massive logs via accurate provenance clustering and efficient graph serialization with minimum provenance loss. Expert Syst. Appl. 305: 130812 (2026)- 2025
[j16]Shilei Bu
, Minpeng Jin, Jie Wang
, Yulai Xie
, Liangkang Zhang
:
SST-LOF: Container Anomaly Detection Method Based on Singular Spectrum Transformation and Local Outlier Factor. IEEE Trans. Cloud Comput. 13(1): 130-147 (2025)
[j15]Shiqi Liu
, Zhouqi Jiang
, Jie Wang
, Wei Zhou, Kun Sun
, Zhaohui Chen
, Yulai Xie
:
More Granular, Less Trust: Enforcing Intra-Process Isolation With Arm CCA in an Untrusted Management Environment. IEEE Trans. Inf. Forensics Secur. 20: 12507-12522 (2025)
[j14]Xiangguang Sun
, Jun Zheng
, Yulai Xie
, Peisong He
:
A Novel Approach to Construct 1-D Discrete Complex Variable Chaotic Systems and Its Application. IEEE Trans. Ind. Informatics 21(12): 9655-9665 (2025)- 2024
[j13]Wei Jiang
, Hao Jiang
, Yulai Xie
, Jing Wu
, Xiaofan He
, Hao Li, Pan Zhou
:
SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks. IEEE Internet Things J. 11(16): 27340-27355 (2024)
[j12]Jing Wu
, Qimei Chen
, Hao Jiang
, Haozhao Wang
, Yulai Xie
, Wenzheng Xu
, Pan Zhou
, Zichuan Xu
, Lixing Chen
, Beibei Li
, Xiumin Wang
, Dapeng Oliver Wu
:
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach. IEEE Trans. Netw. Sci. Eng. 11(4): 3782-3799 (2024)
[c1]Wen Yin
, Bin Benjamin Zhu
, Yulai Xie
, Pan Zhou
, Dan Feng
:
Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data. ACM Multimedia 2024: 4110-4119- 2023
[j11]Yulai Xie
, Shuai Tong, Pan Zhou
, Yuli Li, Dan Feng
:
Efficient Storage Management for Social Network Events Based on Clustering and Hot/Cold Data Classification. IEEE Trans. Comput. Soc. Syst. 10(1): 120-130 (2023)
[j10]Yafeng Wu, Yulai Xie
, Xuelong Liao, Pan Zhou
, Dan Feng
, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long
:
Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1624-1640 (2023)
[j9]Liangkang Zhang
, Yulai Xie
, Minpeng Jin, Pan Zhou
, Gongming Xu
, Yafeng Wu, Dan Feng
, Darrell D. E. Long
:
A Novel Hybrid Model for Docker Container Workload Prediction. IEEE Trans. Netw. Serv. Manag. 20(3): 2726-2743 (2023)- 2022
[j8]Zhuping Zou
, Yulai Xie
, Kai Huang, Gongming Xu
, Dan Feng, Darrell D. E. Long
:
A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest. IEEE Trans. Cloud Comput. 10(1): 134-145 (2022)
[j7]Yulai Xie
, Minpeng Jin, Zhuping Zou
, Gongming Xu
, Dan Feng, Wenmao Liu, Darrell D. E. Long
:
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing. IEEE Trans. Cloud Comput. 10(2): 1386-1401 (2022)- 2021
[j6]Zeyue Xue, Pan Zhou
, Zichuan Xu
, Xiumin Wang
, Yulai Xie
, Xiaofeng Ding
, Shiping Wen
:
A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach. IEEE Internet Things J. 8(11): 9122-9138 (2021)
[j5]Pan Zhou
, Shimin Gong, Zichuan Xu
, Lixing Chen
, Yulai Xie
, Changkun Jiang
, Xiaofeng Ding
:
Trustworthy and Context-Aware Distributed Online Learning With Autoscaling for Content Caching in Collaborative Mobile Edge Computing. IEEE Trans. Cogn. Commun. Netw. 7(4): 1032-1047 (2021)
[j4]Yulai Xie
, Yafeng Wu, Dan Feng, Darrell D. E. Long
:
P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases. IEEE Trans. Dependable Secur. Comput. 18(6): 2658-2674 (2021)
[j3]Pan Zhou
, Yulai Xie
, Ben Niu
, Lingjun Pu
, Zichuan Xu
, Hao Jiang
, Huawei Huang
:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. IEEE Trans. Netw. Sci. Eng. 8(1): 419-433 (2021)- 2020
[j2]Die Hu
, Dan Feng, Yulai Xie
, Gongming Xu
, Xinrui Gu, Darrell D. E. Long
:
Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments. IEEE Trans. Big Data 6(4): 792-803 (2020)
[j1]Yulai Xie
, Dan Feng, Yuchong Hu
, Yan Li
, Staunton Sample, Darrell D. E. Long
:
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments. IEEE Trans. Dependable Secur. Comput. 17(6): 1283-1296 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-06 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







