Xiaoqiang Di

Orcid: 0000-0001-9432-4564

According to our database1, Xiaoqiang Di authored at least 68 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An efficient scheme for in-orbit remote sensing image data retrieval.
Future Gener. Comput. Syst., January, 2024

2023
An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification.
IEEE J. Sel. Areas Commun., November, 2023

Smart contract-based integrity audit method for IoT.
Inf. Sci., November, 2023

A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology.
Future Gener. Comput. Syst., August, 2023

A multipath routing algorithm for satellite networks based on service demand and traffic awareness.
Frontiers Inf. Technol. Electron. Eng., June, 2023

A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication.
Mob. Networks Appl., April, 2023

Research on cloud data encryption algorithm based on bidirectional activation neural network.
Inf. Sci., April, 2023

Subflow scheduling strategy for multipath transmission in SDN-based spatial network.
Wirel. Networks, February, 2023

A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness.
Comput. Commun., 2023

MPQUIC Transmission Control Strategy for SDN-Based Satellite Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Image encryption algorithm based on bit-level permutation and "Feistel-like network" diffusion.
Multim. Tools Appl., 2022

A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform.
J. Inf. Secur. Appl., 2022

Dynamic optimization of intersatellite link assignment based on reinforcement learning.
Int. J. Distributed Sens. Networks, 2022

Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels.
IET Image Process., 2022

SDN-based dynamic multi-path routing strategy for satellite networks.
Future Gener. Comput. Syst., 2022

An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.
Entropy, 2022

An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map.
Entropy, 2022

A New Hyperchaotic 4D-FDHNN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption.
Entropy, 2022

Research on the behaviour and law of quantity growth of followers based on WeChat official account.
Behav. Inf. Technol., 2022

LogLR: A Log Anomaly Detection Method Based on Logical Reasoning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Secure deduplication method based on tag clustering.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

2021
A novel image encryption algorithm based on least squares generative adversarial network random number generator.
Multim. Tools Appl., 2021

Medical image encryption scheme based on self-verification matrix.
IET Image Process., 2021

LogNADS: Network anomaly detection scheme based on log semantics representation.
Future Gener. Comput. Syst., 2021

Evaluation method of node importance in temporal satellite networks based on time slot correlation.
EURASIP J. Wirel. Commun. Netw., 2021

Multiple-level threshold load balancing in distributed SDN controllers.
Comput. Networks, 2021

A Sentence-Level Joint Relation Classification Model Based on Reinforcement Learning.
Comput. Intell. Neurosci., 2021

QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Vulnerability knowledge extraction method based on joint extraction model.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
Anomaly Detection Algorithm Based on CFSFDP.
J. Adv. Comput. Intell. Intell. Informatics, 2020

Joint head selection and airtime allocation for data dissemination in mobile social networks.
Comput. Networks, 2020

A Novel Lossless Medical Image Encryption Scheme Based on Game Theory With Optimized ROI Parameters and Hidden ROI Position.
IEEE Access, 2020

Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion.
IEEE Access, 2020

Research on Integrity Check Method of Cloud Storage Multi-Copy Data Based on Multi-Agent.
IEEE Access, 2020

NADS-RA: Network Anomaly Detection Scheme Based on Feature Representation and Data Augmentation.
IEEE Access, 2020

FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation.
IEEE Access, 2020

FastLogSim: A Quick Log Pattern Parser Scheme Based on Text Similarity.
Proceedings of the Knowledge Science, Engineering and Management, 2020

NADSR: A Network Anomaly Detection Scheme Based on Representation.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Secure Deduplication Method Based on Autoencoder.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Android Vault Application Behavior Analysis and Detection.
Proceedings of the Data Science, 2020

Correlation Analysis of Internet Addiction with Daily Behavior: A Data-Driven Method.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

2019
A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks.
J. Adv. Comput. Intell. Intell. Informatics, 2019

Storage Allocation Plan for Routing Nodes in Delay Tolerant Network.
Ingénierie des Systèmes d Inf., 2019

Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model.
CoRR, 2019

Research on classification and recognition of attacking factors based on radial basis function neural network.
Clust. Comput., 2019

An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System.
IEEE Access, 2019

Attention-Based Hybrid Model for Automatic Short Answer Scoring.
Proceedings of the Simulation Tools and Techniques - 11th International Conference, 2019

MPTCP Based Load Balancing Mechanism in Software Defined Satellite Networks.
Proceedings of the Wireless and Satellite Systems, 2019

Performance Analysis of Three-Layered Satellite Network Based on Stochastic Network Calculus.
Proceedings of the Communications, Signal Processing, and Systems, 2019

Research on Spatial Network Routing Model Based on Price Game.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process.
Wirel. Pers. Commun., 2018

Formal definition and analysis of access control model based on role and attribute.
J. Inf. Secur. Appl., 2018

An Efficient Misalignment Method for Visual Tracking Based on Sparse Representation.
IEICE Trans. Inf. Syst., 2018

A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow.
IEEE Access, 2018

Delay-Constrained Load Balancing in the SDN.
Proceedings of the Space Information Networks - Third International Conference, 2018

Security Strategy for Virtual Machine Allocation in Cloud Computing.
Proceedings of the 2018 International Conference on Identification, 2018

Fuzzy C-Mean Clustering Based: LEO Satellite Handover.
Proceedings of the Data Science, 2018

2017
An Auction-Gaming Based Routing Model for LEO Satellite Networks.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Heuristic Map Tiles Prefetch Strategy Based on Road Network Analysis.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

An optimized video selective encryption algorithm.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
End-to-End Stochastic QoS Performance Under Multi-layered Satellite Network.
Proceedings of the Space Information Networks - First International Conference, 2016

Access Control Model Based on Role and Attribute and Its Implementation.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

Optimal backup strategy in cloud disaster tolerance.
Proceedings of the International Conference on Computer, 2016

2013
New color image encryption algorithm based on compound chaos mapping and hyperchaotic cellular neural network.
J. Electronic Imaging, 2013

2012
Intelligent PID Controller on Soft Computing.
J. Comput., 2012


  Loading...