Xiaojian Li

Orcid: 0009-0001-0466-108X

Affiliations:
  • Guangxi Normal University, College of Computer Science and Information Technology, Guilin, China
  • Beihang University, School of Computer Science and Engineering, Beijing, China (PhD)


According to our database1, Xiaojian Li authored at least 19 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
FLSSM: A Federated Learning Storage Security Model with Homomorphic Encryption.
CoRR, April, 2025

HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance.
Comput. Secur., 2025

2024
GRASS: Learning Spatial-Temporal Properties From Chainlike Cascade Data for Microscopic Diffusion Prediction.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

BFLN: A Blockchain-based Federated Learning Model for Non-IID Data.
CoRR, 2024

AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

2023
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation.
IEEE Trans. Mob. Comput., 2022

2021
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis.
IEEE Trans. Netw. Sci. Eng., 2021

2020
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.
Frontiers Comput. Sci., 2020

A BERT-based Ensemble Model for Chinese News Topic Prediction.
Proceedings of the BDE 2020: 2nd International Conference on Big Data Engineering, 2020

2019
A hotspot-based probabilistic cache placement policy for ICN in MANETs.
EURASIP J. Wirel. Commun. Netw., 2019

2017
An Attack-oriented Task Execution Collaborative Defense Protocol.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

2013
On the Spatial-temporal Reachability of DTNs.
Proceedings of the Frontiers in Internet Technologies, 2013

2010
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

2009
An Evaluation Model of CNO Intelligence Information Confidence.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

2007
P2P worm detection based on application identification.
Frontiers Comput. Sci. China, 2007

2006
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis.
J. Comput. Res. Dev., 2006


  Loading...