Xiaoyong Li

According to our database1, Xiaoyong Li authored at least 49 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers.
Future Internet, 2019

Parallelizing uncertain skyline computation against n-of-N data streaming model.
Concurrency and Computation: Practice and Experience, 2019

A Risk Assessment Method based on Software Behavior.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Model knowledge matching algorithm for steelmaking casting scheduling.
IJWMC, 2018

Construction of Optimal Trees for Maximizing Aggregation Information in Deadline- and Energy-Constrained Unreliable Wireless Sensor Networks.
IEEE Access, 2018

A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Rethinking Node Allocation Strategy for Data-intensive Applications in Consideration of Spatially Bursty I/O.
Proceedings of the 32nd International Conference on Supercomputing, 2018

PBCS: An Efficient Parallel Characteristic Set Method for Solving Boolean Polynomial Systems.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Parallel n-of-N Skyline Queries over Uncertain Data Streams.
Proceedings of the Database and Expert Systems Applications, 2018

Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

Parallelization of skyline probability computation over uncertain preferences.
Concurrency and Computation: Practice and Experience, 2017

Parallelization of group-based skyline computation for multi-core processors.
Concurrency and Computation: Practice and Experience, 2017

Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks.
IEEE Access, 2017

Phishing Detection Method Based on Borderline-Smote Deep Belief Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Secure Transfer Protocol Between App and Device of Internet of Things.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

MTIV: A Trustworthiness Determination Approach for Threat Intelligence.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Rogue Access Points Detection Based on Theory of Semi-Supervised Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Further Exploit the Potential of I/O Forwarding by Employing File Striping.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DTRF: A dynamic-trust-based recruitment framework for Mobile Crowd Sensing system.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

A dynamic-trust-based recruitment framework for mobile crowd sensing.
Proceedings of the IEEE International Conference on Communications, 2017

Top-k Skyline Groups Queries.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

SIMD-Based Multiple Sets Intersection with Dual-Scale Search Algorithm.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

A Novel Semi-Automatic Vulnerability Detection System for Smart Home.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Computing skyline groups: an experimental evaluation.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Community-Based Recommendations: A Solution to the Vulnerability Problem.
Proceedings of the 12th International Conference on Semantics, Knowledge and Grids, 2016

A Recommendation System Based on Multi-attribute.
Proceedings of the 9th International Conference on Service Science, 2016

Research of User Request Algorithm in Mobile Cloud Computing Based on Improved FCM and Collaborative Filtering.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Resource Scheduling Based on Improved FCM Algorithm for Mobile Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Energy-and-Time-Saving Task Scheduling Based on Improved Genetic Algorithm in Mobile Cloud Computing.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
Analysis of the Performance of Hadoop Applications on Eucalyptus Cloud.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

MPI Derived Datatypes and Data Communication Analysis in Meteorological Applications.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Research on LogGP Based Parallel Computing Model for CPU/GPU Cluster.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

A multi-bit FIR filtering technique for two-point modulators with dedicated digital high-pass modulation path.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

A 14b 1GS/s DAC with SFDR > 80 dBc across the whole nyquist band by mixed total 3-dimesional sort-and-combine and dynamic element matching.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2012
A BPNN-based dynamic trust predicting model for distributed systems.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

Modeling and Predicting Mixed Errors of Shipboard Measurement Equipments.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2010
A trusted computing environment model in cloud architecture.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

High performance network virtualization with SR-IOV.
Proceedings of the 16th International Conference on High-Performance Computer Architecture (HPCA-16 2010), 2010

2009
The Simulation of Heavy Metal's Transporting in Soil.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
The Optimization of Xen Network Virtualization.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
FATTY: A Reliable FAT File System.
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007

2006
Large-Scale Turnover of Functional Transcription Factor Binding Sites in Drosophila.
PLoS Computational Biology, 2006

An Efficient Attestation for Trustworthiness of Computing Platform.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Software Complexity Based Remote Attestation.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2003
Fast Decision Tree Learning Algorithms for Microarray Data Collections.
Proceedings of the 2003 International Conference on Machine Learning and Applications, 2003

2002
An Attack-Finding Algorithm for Security Protocols.
J. Comput. Sci. Technol., 2002

2001
An Intelligent Intruder Model for Security Protocol Analysis.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...