Lixia Xie

Orcid: 0000-0002-8179-9007

According to our database1, Lixia Xie authored at least 27 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Network security situation assessment with network attack behavior classification.
Int. J. Intell. Syst., 2022

DRICP: Defect Risk Identification Using Sample Category Perception.
Proceedings of the IEEE International Conference on Trust, 2022

A Defect Heterogeneous Risk Assessment Method with Misclassification Cost.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

A Defect Level Assessment Method Based on Weighted Probability Ensemble.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

A Multi-stage APT Attack Detection Method Based on Sample Enhancement.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Comprehensive Degree Based Key Node Recognition Method in Complex Networks.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A Security Situation Assessment Model of Information System for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

A Key Business Node Identification Model for Internet of Things Security.
Secur. Commun. Networks, 2020

Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection.
J. Netw. Comput. Appl., 2020

Analysis Model of Node Failures and Impact for AANET.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs.
IEEE Access, 2019

Mitigating Link-Flooding Attack with Segment Rerouting in SDN.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms.
Sensors, 2018

Topology Control Algorithm and Channel Allocation Algorithm Based on Load Balancing in Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2018

Dynamic Risk Access Control Model for Cloud Platform.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A self-adaptive chaos and Kalman filter-based particle swarm optimization for economic dispatch problem.
Soft Comput., 2017

2016
虚拟分组撤销策略的云存储访问控制模型 (Virtual Group Revocation Policy-based Cloud Storage Access Control Model).
计算机科学, 2016

Multi-objective Brain Storm Optimization Based on Estimating in Knee Region and Clustering in Objective-Space.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

2015
An Adaptive Brain Storm Optimization Algorithm for Multiobjective Optimization Problems.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

2014
A Modified Multi-Objective Optimization Based on Brain Storm Optimization Algorithm.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014

Modified Brain Storm Optimization Algorithm for Multimodal Optimization.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014

2013
Research on Security Evaluation of XML Communication Protocol.
J. Softw., 2013

Network Security Risk Assessment Based on Attack Graph.
J. Comput., 2013

Using information theory to measure call site information of system call in anomaly detection.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

2008
A New Approach to Network Anomaly Attack Detection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...