Xiaoyan Liang

Orcid: 0009-0000-0496-5967

According to our database1, Xiaoyan Liang authored at least 16 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-preserving quadratic truth discovery based on Precision partitioning.
Comput. Secur., 2024

TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

DP-Discriminator: A Differential Privacy Evaluation Tool Based on GAN.
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024

2022
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.
Mob. Networks Appl., 2022

The Effect of Social Support on Emotional Labor Through Professional Identity: Evidence From the Content Industry.
J. Glob. Inf. Manag., 2022

Acculturation Matters?: Comparing the Leadership Perceptions Among Chinese Professionals in Australia and China.
J. Glob. Inf. Manag., 2022

2021
Detection, Integration, and Optimization of Acoustic Field Simulation in the Closed Space.
Sci. Program., 2021

Contribution of Lake-Dune Patterning to the Dune Height of Mega-Dunes in the Badain Jaran Sand Sea, Northern China.
Remote. Sens., 2021

2020
Plant phenological responses to the warm island effect in the lake group region of the Badain Jaran Desert, northwestern China.
Ecol. Informatics, 2020

Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing.
IEEE Access, 2020

2019
Wireless Energy Transmission Channel Modeling in Resonant Beam Charging for IoT Devices.
IEEE Internet Things J., 2019

2018
Blockchain Based Provenance Sharing of Scientific Workflows.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2013
A Conflict-Related Rules Detection Tool for Access Control Policy.
Proceedings of the Frontiers in Internet Technologies, 2013

A Verification Method of Enterprise Network Reachability Based on Topology Path.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2006
Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid.
Proceedings of the 2006 International Conference on Semantics, 2006


  Loading...