Xiaohui Han

Orcid: 0000-0002-5883-9218

According to our database1, Xiaohui Han authored at least 43 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Semantic-enhanced Co-attention Prompt Learning for Non-overlapping Cross-domain Recommendation.
ACM Trans. Inf. Syst., September, 2025

Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation.
ACM Trans. Inf. Syst., July, 2025

Collaborating with top scientists may not improve paper novelty: A causal analysis based on the propensity score matching method.
J. Informetrics, 2025

User identification network with contrastive clustering for shared-account recommendation.
Inf. Process. Manag., 2025

TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT.
IEEE Internet Things J., 2025

Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Multi-Relational Variational Contrastive Learning for Next POI Recommendation.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
Do scholars' collaborative tendencies impact the quality of their publications? A generalized propensity score matching analysis.
J. Informetrics, February, 2024

MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training.
IEEE Trans. Inf. Forensics Secur., 2024

PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024

Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2024

Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier Network.
Proceedings of the International Joint Conference on Neural Networks, 2024

HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network Traffic.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Effective Comparative Prototype Hashing for Unsupervised Domain Adaptation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Applications of fractional gradient descent method with adaptive momentum in BP neural networks.
Appl. Math. Comput., July, 2023

A transformer condition recognition method based on dissolved gas analysis features selection and multiple models fusion.
Eng. Appl. Artif. Intell., 2023

Communication-Efficient Federated Learning for Network Traffic Anomaly Detection.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

An Interpretable Vulnerability Detection Framework Based on Multi-task Learning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

FusionNet: An Effective Network Phishing Website Detection Framework Based on Multi-Modal Fusion.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

A mobile crowdsensing task allocation method in the scenario of environmental protection.
Proceedings of the 6th International Conference on Data Science and Information Technology, 2023

2022
Sequential Multi-task Learning with Task Dependency for Appeal Judgment Prediction.
CoRR, 2022

A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection.
Proceedings of the IEEE International Conference on Trust, 2022

2020
Dismantling and Vertex Cover of Network Through Message Passing.
IEEE Trans. Circuits Syst., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019

Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Visual Urban Perception with Deep Semantic-Aware Network.
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019

2018
Cold-Rolled Strip Steel Stress Detection Technology Based on a Magnetoresistance Sensor and the Magnetoelastic Effect.
Sensors, 2018

Secure Virtualization Environment Based on Advanced Memory Introspection.
Secur. Commun. Networks, 2018

基于四叉树分割的地形LOD技术综述 (Survey of Terrain LOD Technology Based on Quadtree Segmentation).
计算机科学, 2018

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Inf. Forensics Secur., 2017

Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Nondestructive Evaluation of Carbon Fiber Reinforced Polymer Composites Using Reflective Terahertz Imaging.
Sensors, 2016

Social Media account linkage using user-generated geo-location data.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2014
A novel machine learning approach to rank web forum posts.
Soft Comput., 2014

A KVM Virtual Machine Memory Forensics Method Based on VMCS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
Dynamically Modeling Semantic Dependencies in Web Forum Threads.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

2008
Hierarchical Document Classification Based on a Backtracking Algorithm.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

An Effective Relevance Prediction Algorithm Based on Hierarchical Taxonomy for Focused Crawling.
Proceedings of the Information Retrieval Technology, 2008


  Loading...