Xiuxia Tian

Orcid: 0000-0002-3862-9803

According to our database1, Xiuxia Tian authored at least 30 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Power line insulator defect detection using CNN with dense connectivity and efficient attention mechanism.
Multim. Tools Appl., March, 2024

Efficient Verifiable Range Query For The Light Client in DBaaS.
Proceedings of the 2024 10th International Conference on Computing and Data Engineering, 2024

2023
A Transformer Architecture based mutual attention for Image Anomaly Detection.
Virtual Real. Intell. Hardw., February, 2023

Fused Syntactic and Semantic Parsing for Measuring Privacy Level in Unstructured Text.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Deep Learning-Based Attribute Optimization Method for ABAC.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Power Equipment Nameplate Text Detection Based on Improved Multiscale Feature Fusion Network.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Efficient Privacy-preserving Multi-Dimensional Range Query with Hierarchical Hilbert Code-based Tree.
Proceedings of the 2023 11th International Conference on Computer and Communications Management, 2023

2022
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images.
Frontiers Comput. Sci., 2022

2021
A Novel Classification Model SA-MPCNN for Power Equipment Defect Text.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM.
Secur. Commun. Networks, 2021

2020
An enhanced wildcard-based fuzzy searching scheme in encrypted databases.
World Wide Web, 2020

Image copy-move forgery detection algorithm based on ORB and novel similarity metric.
IET Image Process., 2020

A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services.
Frontiers Comput. Sci., 2020

2019
Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering.
Int. J. Netw. Secur., 2019

2018
Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy.
Int. J. Netw. Secur., 2018

DCA: The Advanced Privacy-Enhancing Schemes for Location-Based Services.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

Fuzzy Searching Encryption with Complex Wild-Cards Queries on Encrypted Database.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2016
Secret Share Based Program Access Authorization Protocol for Smart Metering.
Int. J. Netw. Secur., 2016

Personalized Location Anonymity - A Kernel Density Estimation Approach.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

2015
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework.
IEEE Trans. Knowl. Data Eng., 2015

DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS.
Secur. Commun. Networks, 2015

A novel page ranking algorithm based on triadic closure and hyperlink-induced topic search.
Intell. Data Anal., 2015

2013
DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS.
Int. J. Netw. Secur., 2013

2012
Shortest Path Based Potential Common Friend Recommendation in Social Networks.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
A Privacy Preserving Selective Authorization Enforcement Approach in Daas.
Proceedings of the World Congress on Services, 2011

Privacy Preserving Personalized Access Control Service at Third Service Provider.
Proceedings of the IEEE International Conference on Web Services, 2011

Privacy Preserving Query Processing on Secret Share Based Data Storage.
Proceedings of the Database Systems for Advanced Applications, 2011

2009
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Research of Trust Chain of Operating System.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2009

DSP RE-Encryption: A Flexible Mechanism for Access Control Enforcement Management in DaaS.
Proceedings of the IEEE International Conference on Cloud Computing, 2009


  Loading...