Xiaojun Ye

Orcid: 0000-0002-9780-4827

According to our database1, Xiaojun Ye authored at least 92 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automatic measurement of fetal abdomen subcutaneous soft tissue thickness from ultrasound image based on a U-shaped attention network with morphological method.
Int. J. Imaging Syst. Technol., January, 2024

Ultraman: Single Image 3D Human Reconstruction with Ultra Speed and Detail.
CoRR, 2024

2023
A White-Box Testing for Deep Neural Networks Based on Neuron Coverage.
IEEE Trans. Neural Networks Learn. Syst., November, 2023

A Self-Attention-Based Stock Prediction Method Using Long Short-Term Memory Network Architecture.
Proceedings of the Data Science, 2023

2022
Efficient Transition Adjacency Relation Computation for Process Model Similarity.
IEEE Trans. Serv. Comput., 2022

Traffic Sign Detection and Recognition in Multiimages Using a Fusion Model With YOLO and VGG Network.
IEEE Trans. Intell. Transp. Syst., 2022

A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network.
Future Gener. Comput. Syst., 2022

Open-Set Intrusion Detection with MinMax Autoencoder and Pseudo Extreme Value Machine.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Estimating Global Completeness of Event Logs: A Comparative Study.
IEEE Trans. Serv. Comput., 2021

Network Embedding With Completely-Imbalanced Labels.
IEEE Trans. Knowl. Data Eng., 2021

Zero-Shot Feature Selection via Transferring Supervised Knowledge.
Int. J. Data Warehous. Min., 2021

A Novel Tree-based Neural Network for Android Code Smells Detection.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Edge2vec: Edge-based Social Network Embedding.
ACM Trans. Knowl. Discov. Data, 2020

Extending LINE for Network Embedding With Completely Imbalanced Labels.
Int. J. Data Warehous. Min., 2020

TCN-ATT: A Non-recurrent Model for Sequence-Based Malware Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

OpenSMax: Unknown Domain Generation Algorithm Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

BiSample: Bidirectional Sampling for Handling Missing Data with Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding.
IEEE Trans. Knowl. Data Eng., 2019

Feature Selection via Transferring Knowledge Across Different Classes.
ACM Trans. Knowl. Discov. Data, 2019

基于注意力机制的恶意软件调用序列检测 (Attention Mechanism Based Detection of Malware Call Sequences).
计算机科学, 2019

Zero-shot Feature Selection via Exploiting Semantic Knowledge.
CoRR, 2019

Conditional Analysis for Key-Value Data with Local Differential Privacy.
CoRR, 2019

Distributed Clustering in the Anonymized Space with Local Differential Privacy.
CoRR, 2019

DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Test4Deep: an Effective White-Box Testing for Deep Neural Networks.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Efficient Computation of G-Skyline Groups.
IEEE Trans. Knowl. Data Eng., 2018

CRITIC-Based Node Importance Evaluation in Skeleton-Network Reconfiguration of Power Grids.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Efficient Computation of G-Skyline Groups (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Randomized Bit Vector: Privacy-Preserving Encoding Mechanism.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

RSDNE: Exploring Relaxed Similarity and Dissimilarity from Completely-Imbalanced Labels for Network Embedding.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Information-Balance-Aware Approximated Summarization of Data Provenance.
Sci. Program., 2017

云服务环境下的密钥管理问题和挑战 (Key Management Issues and Challenges in Cloud).
计算机科学, 2017

Equivalence between LINE and Matrix Factorization.
CoRR, 2017

Multiple Source Detection without Knowing the Underlying Propagation Model.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
A semantic-aware data generator for ETL workflows.
Concurr. Comput. Pract. Exp., 2016

Transition Adjacency Relation Computation Based on Unfolding: Potentials and Challenges.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Causality Based Propagation History Ranking in Social Networks.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Preference Join on Heterogeneous Data.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Computation of Transition Adjacency Relations Based on Complete Prefix Unfolding (Technical Report).
CoRR, 2015

A Creative Lifecycle Model for Internetware Based Software Development.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015

MAVis: A Multiple Microblogs Analysis and Visualization Tool.
Proceedings of the Database Systems for Advanced Applications, 2015

A Context-Aware Approach for Dynamic GUI Testing of Android Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical Knowledge.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
A schema aware ETL workflow generator.
Inf. Syst. Frontiers, 2014

Requirements model driven adaption and evolution of Internetware.
Sci. China Inf. Sci., 2014

Towards Policy Retrieval for Provenance Based Access Control Model.
Proceedings of the 13th IEEE International Conference on Trust, 2014

KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

User Interests Imbalance Exploration in Social Recommendation: A Fitness Adaptation.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Index-Based OLAP Aggregation for In-Memory Cluster Computing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

DZMQ: A Decentralized Distributed Messaging System for Realtime Web Applications and Services.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
A Multidimensional OLAP Engine Implementation in Key-Value Database Systems.
Proceedings of the Advancing Big Data Benchmarks, 2013

A Practice of TPC-DS Multidimensional Implementation on NoSQL Database Systems.
Proceedings of the Performance Characterization and Benchmarking, 2013

A multidimensional data model for TPC-DS benchmarking.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013

Image Tag Completion via Image-Specific and Tag-Specific Linear Sparse Reconstructions.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

Exploring big data in small forms: A multi-layered knowledge extraction of social networks.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
Protecting data confidentiality in cloud systems.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

Approaches on Getting Workflow Task Execution Number of Times.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2010
Synthesizing: Art of Anonymization.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

2009
Privacy Aware Engineering: A Case Study.
J. Softw., 2009

Towards Compliance and Accountability: a Framework for Privacy Online.
J. Comput., 2009

An Approach of Performance Evaluation in Authentic Database Applications.
Proceedings of the Performance Evaluation and Benchmarking, 2009

Towards workflow-driven database system workload modeling.
Proceedings of the 2nd International Workshop on Testing Database Systems, 2009

Requirements-driven Internetware services evaluation.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Trusted resource dissemination in Internetware systems.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

A configurable benchmark test management framework.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Trust and Privacy in Dissemination Control.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

An Improved Weighted-Feature Clustering Algorithm for K-anonymity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control.
Int. J. Inf. Secur. Priv., 2008

A Personalized (a, k)-Anonymity Model.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Dynamic Purpose-Based Access Control.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Secure Dataspace with Access Policies.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

A Multi-Dimensional K-Anonymity Model for Hierarchical Data.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Configurable Web Service Performance Testing Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

An Extensible Data Model with Security Support for Dataspace Management.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Risk & Distortion Based K-Anonymity.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Achieving <i>k</i> -Anonymity Via a Density-Based Clustering Method.
Proceedings of the Advances in Data and Web Management, 2007

Study on Linked List-based Algorithm for Metarule-guided Mining of Multidimensional Quantitative Association Rules.
Proceedings of the Third International Conference on Natural Computation, 2007

Detecting Change in Data Stream: Using Sampling Technique.
Proceedings of the Third International Conference on Natural Computation, 2007

Privacy Protection on Multiple Sensitive Attributes.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Capture Inference Attacks for K-Anonymity with Privacy Inference Logic.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Towards a dynamic multi-policy dissemination control model: (DMDCON).
SIGMOD Rec., 2006

Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection.
Proceedings of the Advances in Web-Age Information Management, 2006

FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Towards the Diversity of Sensitive Attributes in k-Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Privacy Preservation and Protection by Extending Generalized Partial Indices.
Proceedings of the Flexible and Efficient Information Handling, 2006

Towards a More Reasonable Generalization Cost Metric for K-Anonymization.
Proceedings of the Flexible and Efficient Information Handling, 2006

Resource Management Continuity With Constraint Inheritance Relation.
Proceedings of the The First International Conference on Availability, 2006

2005
An Improved Algorithm to Watermark Numeric Relational Data.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

1994
Modélisation et simulation des systèmes de production : une approche orientée-objets. (Object-riented modeling and simulation for manufacturing systems).
PhD thesis, 1994


  Loading...