Da Xiao

Orcid: 0000-0003-3244-7176

According to our database1, Da Xiao authored at least 24 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023

2022
Water Cloud Detection with Circular Polarization Lidar: A Semianalytic Monte Carlo Simulation Approach.
Sensors, 2022

Lidar Ratio Regional Transfer Method for Extinction Coefficient Accuracy Improvement in Lidar Networks.
Remote. Sens., 2022

A Lightweight Human Action Classification Method for Green IoT Sport Applications.
J. Sensors, 2022

Path context augmented statement and network for learning programs.
Empir. Softw. Eng., 2022

A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing.
Comput. Networks, 2022

AI-Enabled Automated and Closed-Loop Optimization Algorithms for Delay-Aware Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

2020
Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR).
Remote. Sens., 2020

Development of ZJU High-Spectral-Resolution Lidar for Aerosol and Cloud: Extinction Retrieval.
Remote. Sens., 2020

Spatiotemporal Variation of Surface Urban Heat Islands in Relation to Land Cover Composition and Configuration: A Multi-Scale Case Study of Xi'an, China.
Remote. Sens., 2020

Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem.
Proceedings of the Advances in Internet, 2019

2018
The Hidden Shape of Stories Reveals Positivity Bias and Gender Bias.
CoRR, 2018

Function Recognition in Stripped Binary of Embedded Devices.
IEEE Access, 2018

Improving the Universality and Learnability of Neural Programmer-Interpreters with Combinator Abstraction.
Proceedings of the 6th International Conference on Learning Representations, 2018

2017
An end-to-end model for Android malware detection.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Applying Binary Patch Comparison to Cisco IOS.
Proceedings of the VI International Conference on Network, Communication and Computing, 2017

2016
Practical Single Sign-on Mechanism for Distributed Computer Networks.
Ad Hoc Sens. Wirel. Networks, 2016

2015
Efficient Data Possession Auditing for Real-World Cloud Storage Environments.
IEICE Trans. Inf. Syst., 2015

2013
A Semi-supervised Ensemble Approach for Mining Data Streams.
J. Comput., 2013

2012
Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2005
TH-VSS: An Asymmetric Storage Virtualization System for the SAN Environment.
Proceedings of the Computational Science, 2005


  Loading...