Xi Xiong

Orcid: 0000-0002-3123-4200

According to our database1, Xi Xiong authored at least 68 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A hybrid approach combining data envelopment analysis and recurrent neural network for predicting the efficiency of research institutions.
Expert Syst. Appl., March, 2024

2023
HCURec: Hierarchical candidate-aware user modeling for news recommendation.
Expert Syst. Appl., November, 2023

Hierarchical attention neural network for information cascade prediction.
Inf. Sci., April, 2023

WNSA-Net: An Axial-Attention-Based Network for Schizophrenia Detection Using Wideband and Narrowband Spectrograms.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

UniTSA: A Universal Reinforcement Learning Framework for V2X Traffic Signal Control.
CoRR, 2023

Combining Policy Gradient and Safety-Based Control for Autonomous Driving.
CoRR, 2023

PaLI-3 Vision Language Models: Smaller, Faster, Stronger.
CoRR, 2023

An Approximate Dynamic Programming Approach to Vehicle Platooning Coordination in Networks.
CoRR, 2023

Robust Network Alignment with the Combination of Structure and Attribute Embeddings.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Coordinating Vehicle Platoons for Highway Bottleneck Decongestion and Throughput Improvement.
IEEE Trans. Intell. Transp. Syst., 2022

A Robust Movement Quantification Algorithm of Hyperactivity Detection for ADHD Children Based on 3D Depth Images.
IEEE Trans. Image Process., 2022

Affective Impression: Sentiment-Awareness POI Suggestion via Embedding in Heterogeneous LBSNs.
IEEE Trans. Affect. Comput., 2022

A proposed fixed-sum carryovers reallocation DEA approach for social scientific resources of Chinese public universities.
Scientometrics, 2022

A dynamical spatial-temporal graph neural network for traffic demand prediction.
Inf. Sci., 2022

ADLight: A Universal Approach of Traffic Signal Control with Augmented Data Using Reinforcement Learning.
CoRR, 2022

2021
Automatic Detection of Affective Flattening in Schizophrenia: Acoustic Correlates to Sound Waves and Auditory Perception.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Automatic Detection of Negative Symptoms in Schizophrenia via Acoustically Measured Features Associated With Affective Flattening.
IEEE Trans Autom. Sci. Eng., 2021

Bayesian personalized ranking based on multiple-layer neighborhoods.
Inf. Sci., 2021

Erratum to "A Hierarchical Attention Recommender System Based on Cross-Domain Social Networks".
Complex., 2021

2020
DGI: Recognition of Textual Entailment via dynamic gate Matching.
Knowl. Based Syst., 2020

A parallel DEA-based method for evaluating parallel independent subunits with heterogeneous outputs.
J. Informetrics, 2020

Dynamic discovery of favorite locations in spatio-temporal social networks.
Inf. Process. Manag., 2020

Where to go: An effective point-of-interest recommendation framework for heterogeneous social networks.
Neurocomputing, 2020

Movie collaborative filtering with multiplex implicit feedbacks.
Neurocomputing, 2020

A point-of-interest suggestion algorithm in Multi-source geo-social networks.
Eng. Appl. Artif. Intell., 2020

Optimizing Coordinated Vehicle Platooning: An Analytical Approach Based on Stochastic Dynamic Programming.
CoRR, 2020

A Hierarchical Attention Recommender System Based on Cross-Domain Social Networks.
Complex., 2020

Statistical Analysis of Dispelling Rumors on Sina Weibo.
Complex., 2020

2019
ADPDF: A Hybrid Attribute Discrimination Method for Psychometric Data With Fuzziness.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Evaluation of Headway Threshold-based Coordinated Platooning over a Cascade of Highway Junctions.
CoRR, 2019

Dynamic Prediction of Origin-Destination Flows Using Fusion Line Graph Convolutional Networks.
CoRR, 2019

Topological Influence-Aware Recommendation on Social Networks.
Complex., 2019

A Clickthrough Rate Prediction Algorithm Based on Users' Behaviors.
IEEE Access, 2019

Discriminating Topical Influencers Based on the User Relative Emotion.
IEEE Access, 2019

From Semantic Retrieval to Pairwise Ranking: Applying Deep Learning in E-commerce Search.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

A Dynamic Word Representation Model Based on Deep Context.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

A Category Detection Method for Evidence-Based Medicine.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

A Non-Cooperative Game Model for Overlapping Community Detection in Social Networks.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

A Stock Index Prediction Framework: Integrating Technical and Topological Mesoscale Indicators.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

Analysis of a Stochastic Model for Coordinated Platooning of Heavy-duty Vehicles.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Utilization of Resnet in RGB-D Facial Recognition Problems.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2019

2018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw. Pract. Exp., 2018

Assessing R&D efficiency using a two-stage dynamic DEA model: A case study of research institutes in the Chinese Academy of Sciences.
J. Informetrics, 2018

Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique.
J. Intell. Fuzzy Syst., 2018

The Strong Local Diagnosability of a Hypercube Network with Missing Edges.
Complex., 2018

Augmenting Indoor Inertial Tracking with Polarized Light.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

2017
Reconstructing Hand Poses Using Visible Light.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks.
IEEE Access, 2017

Customizing indoor wireless coverage via 3D-fabricated reflectors.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017

Position: Augmenting Inertial Tracking with Light.
Proceedings of the 4th ACM Workshop on Visible Light Communication Systems, 2017

2016
GF(2<sup><i>n</i></sup>) Redundant Representation Using Matrix Embedding for Irreducible Trinomials.
Int. J. Found. Comput. Sci., 2016

Combining Deep Reinforcement Learning and Safety Based Control for Autonomous Driving.
CoRR, 2016

Automating 3D wireless measurements with drones.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

2015
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

SmartGuide: Towards Single-image Building Localization with Smartphone.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

2014
GF(2<sup>n</sup>) Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials.
IACR Cryptol. ePrint Arch., 2014

Defeating buffer overflow attacks via virtualization.
Comput. Electr. Eng., 2014

2013
Practical Fine-grained Privilege Separation in Multithreaded Applications
CoRR, 2013

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Bit-Parallel GF(2<sup>n</sup>) Squarer Using Shifted Polynomial Basis.
IACR Cryptol. ePrint Arch., 2012

2011
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

The web interface should be radically refactored.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

2009
Availability-sensitive intrusion recovery.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...