Lixin Tao

According to our database1, Lixin Tao authored at least 61 papers between 1987 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Generation Comp. Syst., 2018

A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and Integration.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
A novel social network access control model using logical authorization language in cloud computing.
Concurrency and Computation: Practice and Experience, 2017

Extending OWL with Custom Relations for Knowledge-Driven Intelligent Agents.
Proceedings of the Multiagent System Technologies - 15th German Conference, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Hands-On Learning for Computer Network Security with Mobile Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

A Knowledge-Driven Web Tutoring System Framework for Adaptive and Assessment-Driven Open-Source Learning.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
Security and Communication Networks, 2016

Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.
J. Network and Computer Applications, 2016

Static Mining and Dynamic Taint for Mobile Security Threats Analysis.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Connectivity, Traffic Flow and Applied Statistics in Cyber Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A Semantic Approach to Intelligent and Personal Tutoring System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Improving Data Governance in Large Organizations through Ontology and Linked Data.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Word embeddings for Arabic sentiment analysis.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

2015
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure.
Future Generation Comp. Syst., 2015

A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC).
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Automated Detection and Analysis for Android Ransomware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Mitigating HTTP Flooding Attacks with Meta-data Analysis.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Simplified Approach for Representing Part-Whole Relations in OWL-DL Ontologies.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Extending OWL to Support Custom Relations.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Understanding Model Risk Management - Model Rationalization in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Teaching Web Security using Portable Virtual Labs.
Educational Technology & Society, 2012

2011
Criteria for omnibearing imbalance of macroeconomic system structures and their strategic optimization.
Kybernetes, 2011

Teaching Web Security Using Portable Virtual Labs.
Proceedings of the ICALT 2011, 2011

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011

A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011

Work in progress - An innovative design of a Master in Computer Science program.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Work in progress - Live programming learning objects repository.
Proceedings of the 2011 Frontiers in Education Conference, 2011

2009
Teach real-time embedded system online with real hands-on labs.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

2008
APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

2007
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Asynchronous Callback in Web Services.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Visual Modeling of XML Constraints Based on a New Extensible Constraint Markup Language.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

2002
Parallel Programming through Application Service Providers.
IMSA, 2002

2001
Shifting Paradigms with the Application Service Provider Model.
IEEE Computer, 2001

1999
Delayed Program Mapping in Concordia Parallel Programming Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1996
Coarse Grain Automatic Data Redistribution in Multiphase Parallel Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

A Visual Performance Debugger for Virtual Architecture Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

1995
Topological Feature Maps on Parallel Computers.
International Journal of High Speed Computing, 1995

Contention Minimization in Wormhole-Routed Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

A Performance Debugger for Parallel Programs Running on Wormhole-Routed Multicomputers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

Contracting Processes in Virtual Architecture Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

1993
Parallel regional projection transformation (RPT) and VLSI implementation.
Pattern Recognition, 1993

Embeddings among Meshes and Tori.
J. Parallel Distrib. Comput., 1993

Multi-way graph partition by stochastic probe.
Computers & OR, 1993

1992
Optimal Embedding of 2-D Torus Into Ring.
Inf. Process. Lett., 1992

1991
Simulating parallel neighboring communications among square meshes and square toruses.
The Journal of Supercomputing, 1991

1990
Simulating parallel neighbouring communications among square meshes and square toruses.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

1987
Embeddings Among Toruses and Meshes.
Proceedings of the International Conference on Parallel Processing, 1987


  Loading...