Xiaojuan Cai

According to our database1, Xiaojuan Cai authored at least 26 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023

2022
A Collaborative Filtering Algorithm based on Entropy and Trust Optimized Neighbor Selection.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Using Entropy for Trust Measure in Collaborative Filtering.
Proceedings of the Human Centered Computing - 7th International Conference, 2021

Sequential Detection of Cyber-attacks Using a Classification Filter.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Minimum-Energy Computation Offloading in Mobile Edge Computing with Hybrid PSO-DE Algorithm.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021

Cold Start Recommendation Algorithm Based on Latent Factor Prediction.
Proceedings of the Web Information Systems and Applications, 2021

2020
Digital Rights Management Platform Based on Blockchain Technology.
Proceedings of the Human Centered Computing - 6th International Conference, 2020

2017
Hardness Results for Coverability Problem of Well-Structured Pushdown Systems.
Proceedings of the Language and Automata Theory and Applications, 2017

An improved threshold method based on histogram entropy for the blood vessel segmentation.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2017

2016
Termination and Boundedness for Well-Structured Pushdown Systems.
Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering, 2016

An improved VR training system for vascular interventional surgery.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

2014
Well-Structured Pushdown System: Case of Dense Timed Pushdown Automata.
Proceedings of the Functional and Logic Programming - 12th International Symposium, 2014

2013
Nested Timed Automata.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2013

Well-Structured Pushdown Systems.
Proceedings of the CONCUR 2013 - Concurrency Theory - 24th International Conference, 2013

2012
Modeling and Analysis of Real-Time Systems with Mutex Components.
Int. J. Found. Comput. Sci., 2012

2011
The λ-calculus in the π-calculus.
Math. Struct. Comput. Sci., 2011

2010
A pure labeled transition semantics for the applied pi calculus.
Inf. Sci., 2010

2009
Applying a testing approach to the Calculus of Fair Ambients.
Int. J. Comput. Math., 2009

Measuring Anonymity.
Proceedings of the Information Security Practice and Experience, 2009

Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus.
Proceedings of the Computational Science and Its Applications, 2009

Knowledge Aware Bisimulation and Anonymity.
Proceedings of the Computational Science, 2009

2008
A Simpler Framework Based on the Applied Pi Calculus and Its Application to Electronic Cash Protocol.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
Towards Automatic Measurement of Probabilistic Processes.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2004
On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example.
Proceedings of the ICETE 2004, 2004

FedGrid: An HLA Approach to Federating Grids.
Proceedings of the Computational Science, 2004


  Loading...