Xianxian Li

Orcid: 0000-0002-7083-3847

According to our database1, Xianxian Li authored at least 109 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Toward Unified Token Learning for Vision-Language Tracking.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

Positive-Sample-Free Object Tracking via a Soft Constraint.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: A Method Combining Multisource Data Prediction and Deep Reinforcement Learning.
IEEE Internet Things J., March, 2024

Transformer Tracking via Frequency Fusion.
IEEE Trans. Circuits Syst. Video Technol., February, 2024

Robust Tracking via Bidirectional Transduction With Mask Information.
IEEE Trans. Multim., 2024

ODTrack: Online Dense Temporal Token Learning for Visual Tracking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Poincaré Differential Privacy for Hierarchy-Aware Graph Embedding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Explicit Visual Prompts for Visual Object Tracking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur., December, 2023

Heterogeneous graph neural network with semantic-aware differential privacy guarantees.
Knowl. Inf. Syst., October, 2023

MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain.
Inf. Sci., August, 2023

AIC-GNN: Adversarial information completion for graph neural networks.
Inf. Sci., May, 2023

FedMBC: Personalized federated learning via mutually beneficial collaboration.
Comput. Commun., May, 2023

A two-phase random forest with differential privacy.
Appl. Intell., May, 2023

Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network.
IEEE Trans. Circuits Syst. Video Technol., April, 2023

Robust Tracking via Uncertainty-Aware Semantic Consistency.
IEEE Trans. Circuits Syst. Video Technol., April, 2023

SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network.
IEEE Trans. Pattern Anal. Mach. Intell., April, 2023

Robust Long-Term Tracking via Localizing Occluders.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Multi-Access Coded Caching With Optimal Rate and Linear Subpacketization Under PDA and Consecutive Cyclic Placement.
IEEE Trans. Commun., 2023

A Microgrid Trading Framework Based on PoC Consensus.
CoRR, 2023

A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things.
CoRR, 2023

Towards Unified Token Learning for Vision-Language Tracking.
CoRR, 2023

Asymptotically Optimal Cascaded Coded Distributed Computing via Combinatorial Designs.
CoRR, 2023

Dynamic Social Recommendation with High-Matching Inhomogeneous Relations.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Learning Graph Neural Networks on Feature-Missing Graphs.
Proceedings of the Knowledge Science, Engineering and Management, 2023

FedEF: Federated Learning for Heterogeneous and Class Imbalance Data.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Node Classification in Graph Neural Networks under Dual Consistency.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Relaxed Graph Semi-Supervised Contrastive Learning for Node Classification.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

PGUD: Personalized Graph Universal Defense.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption.
IEEE Trans. Knowl. Data Eng., 2022

A privacy preservation framework for feedforward-designed convolutional neural networks.
Neural Networks, 2022

OGT: optimize graph then training GNNs for node classification.
Neural Comput. Appl., 2022

Teacher-student knowledge distillation for real-time correlation tracking.
Neurocomputing, 2022

Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication.
Frontiers Comput. Sci., 2022

Differentially private frequent episode mining over event streams.
Eng. Appl. Artif. Intell., 2022

Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach.
Comput. Networks, 2022

Efficient and traceable data sharing for the Internet of Things in smart cities.
Comput. Electr. Eng., 2022

A Green Neural Network with Privacy Preservation and Interpretability.
Proceedings of the IEEE International Conference on Trust, 2022

Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Next POI Recommendation with Neighbor and Location Popularity.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation.
Proceedings of the IEEE International Conference on Data Mining, 2022

The Tenth Visual Object Tracking VOT2022 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks.
IEEE Trans. Netw. Sci. Eng., 2021

SSGD: A Safe and Efficient Method of Gradient Descent.
Secur. Commun. Networks, 2021

One-step spectral rotation clustering for imbalanced high-dimensional data.
Inf. Process. Manag., 2021

Differentially private ensemble learning for classification.
Neurocomputing, 2021

Differential Privacy Preservation in Adaptive K-Nets Clustering.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Adaptive Clipping Bound of Deep Learning with Differential Privacy.
Proceedings of the 20th IEEE International Conference on Trust, 2021

DBS: Blockchain-Based Privacy-Preserving RBAC in IoT.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

The Ninth Visual Object Tracking VOT2021 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Learning To Filter: Siamese Relation Network for Robust Tracking.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

BEIR: A Blockchain-based Encrypted Image Retrieval Scheme.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Private Statistic Query Scheme for Encrypted Electronic Medical Record System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
Local differential privacy for social network publishing.
Neurocomputing, 2020

Top-k closed co-occurrence patterns mining with differential privacy over multiple streams.
Future Gener. Comput. Syst., 2020

GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.
IEEE Access, 2020

Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Groupchain: A Blockchain Model with Privacy-preservation and Supervision.
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020

DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
Correlation-aware partitioning for skewed range query optimization.
World Wide Web, 2019

Two privacy-preserving approaches for data publishing with identity reservation.
Knowl. Inf. Syst., 2019

A three-phase approach to differentially private crucial patterns mining over data streams.
Comput. Secur., 2019

Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory.
Symmetry, 2018

M-generalization for multipurpose transactional data publication.
Frontiers Comput. Sci., 2018

A graph-based multifold model for anonymizing data with attributes of multiple types.
Comput. Secur., 2018

Two Privacy-Preserving Approaches for Publishing Transactional Data Streams.
IEEE Access, 2018

A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing.
Int. J. Softw. Eng. Knowl. Eng., 2017

A privacy-preserving approach for multimodal transaction data integrated analysis.
Neurocomputing, 2017

A Study of Enhancing Privacy for Intelligent Transportation Systems: $k$ -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data.
IEEE Access, 2017

Randomized Perturbation for Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE International Conference on Big Knowledge, 2017

Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Robust Image Hashing With Ring Partition and Invariant Vector Distance.
IEEE Trans. Inf. Forensics Secur., 2016

ROAT: Road-Network-Based Anonymization of Trajectories.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
社会网络分析软件研究 (Study of Social Network Analysis Software).
计算机科学, 2015

A Hybrid Optimization Approach for Anonymizing Transactional Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data.
Int. J. Softw. Eng. Knowl. Eng., 2014

A Personalized Privacy Preserving Method for Publishing Social Network Data.
Proceedings of the Theory and Applications of Models of Computation, 2014

Privacy Risks in Publication of Taxi GPS Data.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Personalized Privacy Protection for Transactional Data.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

A Hybrid Algorithm for Privacy Preserving Social Network Publication.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Privacy-Preserving Trajectory Publication against Parking Point Attacks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

An Improved Privacy Preserving Algorithm for Publishing Social Network Data.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Mining Item Popularity for Recommender Systems.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
Dynamic Authentication for Cross-Realm SOA-Based Business Processes.
IEEE Trans. Serv. Comput., 2012

2009
AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee.
Sci. China Ser. F Inf. Sci., 2009

Automated synthesis of composite services with correctness guarantee.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Cryptographic protocol security analysis based on bounded constructing algorithm.
Sci. China Ser. F Inf. Sci., 2006

A Software Protocol of Goals and Operations Based on BDI Model.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Distributed Access Control in CROWN Groups.
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005

Access Control in Peer-to-Peer Collaborative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Algebra model and security analysis for cryptographic protocols.
Sci. China Ser. F Inf. Sci., 2004

2002
Efficient Non-Repudiation Multicast Source Authentication Schemes.
J. Comput. Sci. Technol., 2002


  Loading...