Xuehui Du

Orcid: 0000-0003-4763-4302

According to our database1, Xuehui Du authored at least 47 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
KPI-HGNN: Key provenance identification based on a heterogeneous graph neural network for big data access control.
Inf. Sci., February, 2024

Redactable consortium blockchain based on verifiable distributed chameleon hash functions.
J. Parallel Distributed Comput., January, 2024

2023
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model.
Frontiers Neurorobotics, June, 2023

An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness.
Appl. Intell., May, 2023

Cross-chain data traceability mechanism for cross-domain access.
J. Supercomput., March, 2023

Image Feature Fusion Method Based on Edge Detection.
Inf. Technol. Control., March, 2023

TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level.
J. Syst. Archit., 2023

AdaSTopk: Adaptive federated shuffle model based on differential privacy.
Inf. Sci., 2023

Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness.
CoRR, 2023

A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs.
IEEE Access, 2023

2022
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine.
IEEE Trans. Cloud Comput., 2022

FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

FAVT: A Feature-Anchored Video Data Trading Mechanism.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification.
Secur. Commun. Networks, 2021

Efficient Access Control Permission Decision Engine Based on Machine Learning.
Secur. Commun. Networks, 2021

Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model.
CoRR, 2021

Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines.
IEEE Access, 2021

PRADroid: Privacy Risk Assessment for Android Applications.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony.
Int. J. Distributed Sens. Networks, 2020

Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition.
IEEE Access, 2020

A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model.
IEEE Access, 2020

Supervisable Anonymous Management of Digital Certificates for Blockchain PKI.
Proceedings of the Data Science, 2020

2019
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model.
IEEE Trans. Inf. Forensics Secur., 2019

基于改进FP growth的告警关联算法 (Alert Correlation Algorithm Based on Improved FP Growth).
计算机科学, 2019

Building a Cloud IDS Using an Efficient Feature Selection Method and SVM.
IEEE Access, 2019

Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection.
IEEE Access, 2019

Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network.
IEEE Access, 2019

Business-Oriented Dynamic Reconfiguration Model of Cloud Computing Network.
Proceedings of the Data Science, 2019

Internet Web Trust System Based on Smart Contract.
Proceedings of the Data Science, 2019

An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2018
CDroid: practically implementation a formal-analyzed CIFC model on Android.
Comput. Secur., 2018

Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2018

Data streams anomaly detection algorithm based on self-set threshold.
Proceedings of the 4th International Conference on Communication and Information Processing, 2018

A Tag-Based Protection Method for Multi-tenant Data Security.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
云计算安全审计技术研究综述 (Review on Security Audit Technology for Cloud Computing).
计算机科学, 2017

基于混合流策略的按需分布式云信息流控制模型 (Mixed Flow Policy Based On-demand Distributed Cloud Information Flow Control Model).
计算机科学, 2017

A quality-of-service-aware dynamic evolution model for space-ground integrated network.
Int. J. Distributed Sens. Networks, 2017

Dynamic authenticated data structures with access control for outsourcing data stream.
IET Inf. Secur., 2017

2016
Multilayer collaborative traceback technique based on net-flow fingerprint.
Int. J. Embed. Syst., 2016

A Trust Holding Based Secure Seamless Handover in Space Information Network.
Proceedings of the Space Information Networks - First International Conference, 2016

2015
可验证授权计算研究综述 (Survey on Verifiable Delegation of Computation).
计算机科学, 2015

基于半监督聚类的文档敏感信息推导方法 (Sensitive Information Inference Method Based on Semi-supervised Document Clustering).
计算机科学, 2015

基于结构路径的恶意PDF文档检测 (Detection of Malicious PDF Based on Structural Path).
计算机科学, 2015

2013
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure.
J. Comput., 2013

2009
A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Layered Secure Access Research for Space Network.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...