Hui Xia

Orcid: 0000-0001-7326-5796

Affiliations:
  • Ocean University of China, Qingdao, China
  • Qingdao University, College of Computer Science and Technology, China (2013 - 2020)
  • Shandong University, School of Computer Science and Technology, Jinan, China (PhD 2013)


According to our database1, Hui Xia authored at least 44 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation.
IEEE Internet Things J., April, 2024

A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2024

2023
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023

FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition.
Comput. Secur., December, 2023

FedME<sup>2</sup>: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN.
IEEE J. Sel. Areas Commun., November, 2023

Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network.
IEEE Trans. Knowl. Data Eng., May, 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

A dynamic adaptive iterative clustered federated learning scheme.
Knowl. Based Syst., 2023

QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading.
IEEE Trans. Netw. Serv. Manag., December, 2022

Generating Adversarial Examples With Shadow Model.
IEEE Trans. Ind. Informatics, 2022

FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair.
CoRR, 2022

AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture.
CoRR, 2022

SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
CoRR, 2022

Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Network Defense Resource Allocation Scheme with Multi-armed Bandits.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning.
Wirel. Commun. Mob. Comput., 2021

Optimization scheme for intrusion detection scheme GBDT in edge computing center.
Comput. Commun., 2021

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
A Novel Light-Weight Subjective Trust Inference Framework in MANETs.
IEEE Trans. Sustain. Comput., 2020

Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas.
IEEE/ACM Trans. Netw., 2020

A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

An Intrusion Detection Scheme Based on Repeated Game in Smart Home.
Mob. Inf. Syst., 2020

A Dynamic Virus Propagation Model Based on Social Attributes in City IoT.
IEEE Internet Things J., 2020

Modeling and Analysis Botnet Propagation in Social Internet of Things.
IEEE Internet Things J., 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019

DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Towards a Novel Trust-Based Multicast Routing for VANETs.
Secur. Commun. Networks, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

Node Trust Prediction Framework in Mobile Ad Hoc Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014


  Loading...