


default search action
Xuyun Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j116]Haolong Xiang, Wenhao Fei, Ruiyang Ni, Xuyun Zhang:
A learning-based anomaly detection framework for secure recommendation. Inf. Sci. 708: 122071 (2025) - [j115]Shunmei Meng, Xuyun Zhang, Nan Liu, Longchuan Tu, Qianmu Li:
Knowledge&Social-based collaborative method with contrastive graph structure learning for explainable recommendation. Inf. Sci. 709: 122077 (2025) - [j114]Honghao Li
, Lei Sang
, Yi Zhang
, Xuyun Zhang
, Yiwen Zhang
:
CETN: Contrast-enhanced Through Network for Click-Through Rate Prediction. ACM Trans. Inf. Syst. 43(1): 4:1-4:34 (2025) - [e7]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15387, Springer 2025, ISBN 978-981-96-0810-2 [contents] - [e6]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15388, Springer 2025, ISBN 978-981-96-0813-3 [contents] - [e5]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part III. Lecture Notes in Computer Science 15389, Springer 2025, ISBN 978-981-96-0820-1 [contents] - [e4]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 15390, Springer 2025, ISBN 978-981-96-0839-3 [contents] - [e3]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part V. Lecture Notes in Computer Science 15391, Springer 2025, ISBN 978-981-96-0846-1 [contents] - [e2]Quan Z. Sheng
, Gill Dobbie
, Jing Jiang
, Xuyun Zhang
, Wei Emma Zhang
, Yannis Manolopoulos
, Jia Wu
, Wathiq Mansoor
, Congbo Ma
:
Advanced Data Mining and Applications - 20th International Conference, ADMA 2024, Sydney, NSW, Australia, December 3-5, 2024, Proceedings, Part VI. Lecture Notes in Computer Science 15392, Springer 2025, ISBN 978-981-96-0849-2 [contents] - 2024
- [j113]Zhi-hui Zhan
, Jianxin Li
, Xuyun Zhang
, Deepak Puthal:
Guest Editorial: Special issue on trustworthy machine learning for behavioural and social computing. CAAI Trans. Intell. Technol. 9(3): 541-543 (2024) - [j112]Tarek Chaalan
, Shaoning Pang
, Joarder Kamruzzaman
, Iqbal Gondal
, Xuyun Zhang
:
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. ACM Comput. Surv. 56(7): 175:1-175:39 (2024) - [j111]Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang
, Yawei Wang
, Yifei Chen, Mohammad Reza Khosravi:
Diversified and compatible web APIs recommendation based on game theory in IoT. Digit. Commun. Networks 10(4): 1198-1209 (2024) - [j110]Haolong Xiang
, Xuyun Zhang
, Muhammad Bilal
:
A cloud-edge service offloading method for the metaverse in smart manufacturing. Softw. Pract. Exp. 54(9): 1714-1732 (2024) - [j109]Xutong Jiang
, Ruihan Dou, Qiang He, Xuyun Zhang
, Wanchun Dou:
EdgeAuth: An intelligent token-based collaborative authentication scheme. Softw. Pract. Exp. 54(10): 2007-2024 (2024) - [j108]Hongsheng Hu
, Xuyun Zhang
, Zoran Salcic
, Lichao Sun
, Kim-Kwang Raymond Choo
, Gillian Dobbie
:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 3012-3029 (2024) - [j107]Yuwen Liu
, Xiaokang Zhou
, Huaizhen Kou
, Yawu Zhao
, Xiaolong Xu
, Xuyun Zhang
, Lianyong Qi
:
Privacy-preserving Point-of-interest Recommendation based on Simplified Graph Convolutional Network for Geological Traveling. ACM Trans. Intell. Syst. Technol. 15(4): 76:1-76:17 (2024) - [j106]Tao Peng
, Wentao Zhong
, Guojun Wang, Entao Luo
, Shui Yu
, Yi-Ning Liu
, Yi Yang, Xuyun Zhang
:
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing. IEEE Trans. Intell. Transp. Syst. 25(7): 7767-7779 (2024) - [j105]Lin Liu
, Shaojing Fu
, XueLun Huang
, Yuchuan Luo
, Xuyun Zhang
, Kim-Kwang Raymond Choo
:
SecDM: A Secure and Lossless Human Mobility Prediction System. IEEE Trans. Serv. Comput. 17(4): 1793-1805 (2024) - [c123]Yongzhe Jia
, Xuyun Zhang
, Amin Beheshti
, Wanchun Dou:
FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing. AAAI 2024: 12848-12856 - [c122]Zhikang Feng
, Chao Yan
, Rong Jiang
, Xiaolong Xu
, Xuyun Zhang
, Xiaokang Zhou
, Wanchun Dou
, Lianyong Qi
:
CHDAER: Consistent Hashing-based Data Allocation for Efficient Recommendation in Edge Environment. CIKM 2024: 622-631 - [c121]Xucheng Zhou
, Yuwen Liu
, Lianyong Qi
, Xiaolong Xu
, Wanchun Dou
, Xuyun Zhang
, Yang Zhang
, Xiaokang Zhou
:
GLFNet: Global and Local Frequency-domain Network for Long-term Time Series Forecasting. CIKM 2024: 3527-3536 - [c120]Nan Liu, Shunmei Meng, Yu Jiang, Qianmu Li, Xiaolong Xu, Lianyong Qi, Xuyun Zhang:
Cascading Graph Convolution Contrastive Learning Networks for Multi-behavior Recommendation. DASFAA (6) 2024: 3-18 - [c119]Guoming Zhang, Xuyun Zhang, Lianyong Qi, Xiaolong Xu, Man Li, Wanchun Dou:
Spatio-Temporal Aware Next Point-of-Interest Recommendation with Privacy Preserving. DASFAA (4) 2024: 156-172 - [c118]Adeem Ali Anwar, Guanfeng Liu
, Xuyun Zhang
:
Solving Many-Objective Optimization Problems Using Selection Hyper-Heuristics. ICAART (3) 2024: 194-201 - [c117]Rongwei Xu, Guanfeng Liu, Yan Wang, Xuyun Zhang, Kai Zheng, Xiaofang Zhou:
Adaptive Hypergraph Network for Trust Prediction. ICDE 2024: 2986-2999 - [c116]Yifan Zhang, Haolong Xiang, Xuyun Zhang, Xiaolong Xu, Wei Fan, Qin Zhang, Lianyong Qi:
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection. ICDM 2024: 619-628 - [c115]Longchuan Tu, Shunmei Meng, Lianyong Qi, Xiaolong Xu, Xuyun Zhang:
Hyperbolic Contrastive Learning with Second Order Sampling for Collaborative Filtering. ICWS 2024: 281-290 - [c114]Guoqiang Liu, Xiaolong Xu, Xiyuan Xu, Xinyue Ji, Lianyong Qi, Xuyun Zhang:
Optimized MARL for Latency-Sensitive Collaborative Service Placement in Edge Computing. ICWS 2024: 1089-1096 - [c113]Lianyong Qi, Yuwen Liu, Weiming Liu, Shichao Pei, Xiaolong Xu, Xuyun Zhang, Yingjie Wang, Wanchun Dou:
Counterfactual User Sequence Synthesis Augmented with Continuous Time Dynamic Preference Modeling for Sequential POI Recommendation. IJCAI 2024: 2306-2314 - [c112]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. IJCAI 2024: 5781-5789 - [c111]Xiaolong Xu, Chenbin Li, Haolong Xiang, Lianyong Qi, Xuyun Zhang, Wanchun Dou:
Attention Based Document-level Relation Extraction with None Class Ranking Loss. IJCAI 2024: 6569-6577 - [c110]Xingyuan Mao
, Yuwen Liu
, Lianyong Qi
, Li Duan
, Xiaolong Xu
, Xuyun Zhang
, Wanchun Dou
, Amin Beheshti
, Xiaokang Zhou
:
Cluster-driven Personalized Federated Recommendation with Interest-aware Graph Convolution Network for Multimedia. ACM Multimedia 2024: 5614-5622 - [c109]Yongzhe Jia, Xuyun Zhang, Hongsheng Hu, Kim-Kwang Raymond Choo, Lianyong Qi, Xiaolong Xu, Amin Beheshti, Wanchun Dou:
DapperFL: Domain Adaptive Federated Learning with Model Fusion Pruning for Edge Devices. NeurIPS 2024 - [c108]Xiaolong Xu
, Hongsheng Dong
, Lianyong Qi
, Xuyun Zhang
, Haolong Xiang
, Xiaoyu Xia
, Yanwei Xu
, Wanchun Dou
:
CMCLRec: Cross-modal Contrastive Learning for User Cold-start Sequential Recommendation. SIGIR 2024: 1589-1598 - [c107]Longchuan Tu, Shunmei Meng, Xiao Liu, Guanfeng Liu, Amin Beheshti, Xuyun Zhang:
Semantic Similarity-Based Graph Contrastive Learning for Recommender System. WISE (3) 2024: 17-31 - [c106]Ambreen Hanif
, Amin Beheshti
, Xuyun Zhang
, Steven Wood
, Boualem Benatallah
, EuJin Foo
:
EvidenceQuest: An Interactive Evidence Discovery System for Explainable Artificial Intelligence. WSDM 2024: 1058-1061 - [c105]Yuwen Liu
, Lianyong Qi
, Weiming Liu
, Xiaolong Xu
, Xuyun Zhang
, Wanchun Dou
:
GraphSAGE-based POI Recommendation via Continuous-Time Modeling. WWW (Companion Volume) 2024: 585-588 - [i22]Rongwei Xu, Guanfeng Liu, Yan Wang, Xuyun Zhang
, Kai Zheng, Xiaofang Zhou:
Adaptive Hypergraph Network for Trust Prediction. CoRR abs/2402.05154 (2024) - [i21]Yongzhe Jia, Xuyun Zhang
, Amin Beheshti, Wanchun Dou:
FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing. CoRR abs/2402.08578 (2024) - [i20]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu
:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. CoRR abs/2405.07018 (2024) - [i19]Zijian Ying, Qianmu Li, Tao Wang, Zhichao Lian, Shunmei Meng, Xuyun Zhang:
Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability. CoRR abs/2407.01925 (2024) - [i18]Yongzhe Jia, Xuyun Zhang, Hongsheng Hu, Kim-Kwang Raymond Choo, Lianyong Qi, Xiaolong Xu, Amin Beheshti, Wanchun Dou:
DapperFL: Domain Adaptive Federated Learning with Model Fusion Pruning for Edge Devices. CoRR abs/2412.05823 (2024) - 2023
- [j104]Xuyun Zhang
, Deepak Puthal, Chi Yang:
Special issue on privacy, security, and trust in computational intelligence. Comput. Intell. 39(1): 2-3 (2023) - [j103]Shunmei Meng
, Qianmu Li, Lianyong Qi, Xiaolong Xu, Rui Yuan, Xuyun Zhang
:
An intelligent recommendation method based on multi-interest network and adversarial deep learning. Comput. Secur. 130: 103264 (2023) - [j102]Hongsheng Hu
, Gillian Dobbie, Zoran Salcic, Meng Liu
, Jianbing Zhang, Lingjuan Lyu, Xuyun Zhang
:
Differentially private locality sensitive hashing based federated recommender system. Concurr. Comput. Pract. Exp. 35(14) (2023) - [j101]Lianyong Qi, Xiaolong Xu, Xiaotong Wu, Qiang Ni, Yuan Yuan, Xuyun Zhang:
Digital-Twin-Enabled 6G Mobile Network Video Streaming Using Mobile Crowdsourcing. IEEE J. Sel. Areas Commun. 41(10): 3161-3174 (2023) - [j100]Yi Chen
, Zoran Salcic
, Hongxia Wang, Kim-Kwang Raymond Choo
, Xuyun Zhang
:
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. IEEE Trans. Dependable Secur. Comput. 20(3): 2360-2374 (2023) - [j99]Xiyuan Hu
, Jingpeng Sun
, Jinping Dong, Xuyun Zhang
:
Auditory Receptive Field Net Based Automatic Snore Detection for Wearable Devices. IEEE J. Biomed. Health Informatics 27(5): 2255-2263 (2023) - [j98]Lianyong Qi
, Wenmin Lin
, Xuyun Zhang
, Wanchun Dou
, Xiaolong Xu
, Jinjun Chen
:
A Correlation Graph Based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development. IEEE Trans. Knowl. Data Eng. 35(6): 5444-5457 (2023) - [j97]Gaofeng Zhang
, Yu Li
, Xudan Bao
, Chinmay Chakraborty
, Joel J. P. C. Rodrigues
, Liping Zheng
, Xuyun Zhang
, Lianyong Qi
, Mohammad Reza Khosravi
:
TSDroid: A Novel Android Malware Detection Framework Based on Temporal & Spatial Metrics in IoMT. ACM Trans. Sens. Networks 19(3): 51:1-51:23 (2023) - [c104]Yuanying Cai, Chuheng Zhang, Wei Shen, Xuyun Zhang
, Wenjie Ruan, Longbo Huang:
RePreM: Representation Pre-training with Masked Model for Reinforcement Learning. AAAI 2023: 6879-6887 - [c103]Adeem Ali Anwar
, Irfan Younas, Guanfeng Liu
, Xuyun Zhang
:
A Preference-Based Indicator Selection Hyper-Heuristic for Optimization Problems. ADMA (1) 2023: 447-462 - [c102]Xiao Liu
, Shunmei Meng
, Qianmu Li
, Lianyong Qi
, Xiaolong Xu
, Wanchun Dou
, Xuyun Zhang
:
SMEF: Social-aware Multi-dimensional Edge Features-based Graph Representation Learning for Recommendation. CIKM 2023: 1566-1575 - [c101]Lianyong Qi
, Xuyun Zhang
, Xiaolong Xu
, Wenwen Gong
:
International Workshop on Edge-Cloud Intelligence (ECI@CIKM2023). CIKM 2023: 5289 - [c100]Jierui Jin, Jie Zhang, Xiaolong Xu, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence. DASC/PiCom/CBDCom/CyberSciTech 2023: 730-737 - [c99]Nabi Rezvani
, Amin Beheshti
, Xuyun Zhang
:
A Contextualized Transformer-Based Method for Cyberbullying Detection. DSAA 2023: 1-10 - [c98]Guowei Zhang
, Xuyun Zhang
, Zhiyong Wang, Amin Beheshti
:
Multi-Granularity Entity Recognition based Sentence Ranking for Multi-Document Summarization. DSAA 2023: 1-10 - [c97]Haolong Xiang, Xuyun Zhang
, Mark Dras
, Amin Beheshti
, Wanchun Dou, Xiaolong Xu:
Deep Optimal Isolation Forest with Genetic Algorithm for Anomaly Detection. ICDM 2023: 678-687 - [c96]Adeem Ali Anwar
, Xuyun Zhang
:
Reinforcement Learning based Hyper-heuristics for Many-objective Pickup and Delivery Problem. ICDM 2023: 924-929 - [c95]Xutong Jiang, Guoming Zhang, Hao Tian, Haolong Xiang, Xuyun Zhang
, Wanchun Dou:
A Blockchain-enabled Secure Access Management Method in Edge Computing. ICPADS 2023: 2596-2603 - [c94]Junyan Li
, Xuyun Zhang
, Haolong Xiang, Amin Beheshti
:
Federated Anomaly Detection with Isolation Forest for IoT Network Traffics. ICPADS 2023: 2622-2629 - [c93]Xiao Liu, Shunmei Meng, Qianmu Li, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Jing Zhang, Xuyun Zhang
:
Disentangled Hypergraph Collaborative Filtering for Social Recommendation. ICWS 2023: 475-482 - [c92]Amin Beheshti
, Jian Yang
, Quan Z. Sheng
, Boualem Benatallah, Fabio Casati
, Schahram Dustdar, Hamid Reza Motahari-Nezhad, Xuyun Zhang
, Shan Xue
:
ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence. ICWS 2023: 731-739 - [c91]Haolong Xiang, Xuyun Zhang
, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras
, Amin Beheshti
, Xiaolong Xu:
OptIForest: Optimal Isolation Forest for Anomaly Detection. IJCAI 2023: 2379-2387 - [c90]Kun He, Shunmei Meng, Qianmu Li, Xiao Liu, Amin Beheshti
, Xiaoxiao Chi, Xuyun Zhang
:
Noise-Augmented Contrastive Learning for Sequential Recommendation. WISE 2023: 559-568 - [c89]Ambreen Hanif, Amin Beheshti
, Boualem Benatallah, Xuyun Zhang
, Habiba, EuJin Foo, Nasrin Shabani
, Maryam Shahabikargar:
A Comprehensive Survey of Explainable Artificial Intelligence (XAI) Methods: Exploring Transparency and Interpretability. WISE 2023: 915-925 - [i17]Yuanying Cai, Chuheng Zhang, Wei Shen, Xuyun Zhang
, Wenjie Ruan, Longbo Huang:
RePreM: Representation Pre-training with Masked Model for Reinforcement Learning. CoRR abs/2303.01668 (2023) - [i16]Yixin Liu, Hongsheng Hu
, Xuyun Zhang
, Lichao Sun:
Watermarking Text Data on Large Language Models for Dataset Copyright Protection. CoRR abs/2305.13257 (2023) - [i15]Amin Beheshti, Jian Yang, Quan Z. Sheng, Boualem Benatallah, Fabio Casati, Schahram Dustdar, Hamid Reza Motahari-Nezhad, Xuyun Zhang, Shan Xue:
ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence. CoRR abs/2306.01771 (2023) - [i14]Haolong Xiang, Xuyun Zhang, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras, Amin Beheshti, Xiaolong Xu:
OptIForest: Optimal Isolation Forest for Anomaly Detection. CoRR abs/2306.12703 (2023) - [i13]Hongsheng Hu
, Xuyun Zhang
, Zoran Salcic, Lichao Sun, Kim-Kwang Raymond Choo, Gillian Dobbie:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. CoRR abs/2310.00222 (2023) - [i12]Honghao Li, Lei Sang, Yi Zhang, Xuyun Zhang
, Yiwen Zhang:
CETN: Contrast-enhanced Through Network for CTR Prediction. CoRR abs/2312.09715 (2023) - 2022
- [j96]Hongsheng Hu
, Zoran Salcic, Lichao Sun
, Gillian Dobbie, Philip S. Yu, Xuyun Zhang
:
Membership Inference Attacks on Machine Learning: A Survey. ACM Comput. Surv. 54(11s): 235:1-235:37 (2022) - [j95]Qiyun Zhang
, Xuyun Zhang
, Hongsheng Hu
, Caizhong Li, Yinping Lin, Rui Ma
:
Sports match prediction model for training and exercise using attention-based LSTM network. Digit. Commun. Networks 8(4): 508-515 (2022) - [j94]Guoming Zhang, Xuyun Zhang
, Muhammad Bilal
, Wanchun Dou, Xiaolong Xu, Joel J. P. C. Rodrigues
:
Identifying fraud in medical insurance based on blockchain and deep learning. Future Gener. Comput. Syst. 130: 140-154 (2022) - [j93]Yuwen Liu
, Zuolong Song
, Xiaolong Xu
, Wajid Rafique
, Xuyun Zhang
, Jun Shen
, Mohammad Reza Khosravi
, Lianyong Qi
:
Bidirectional GRU networks-based next POI category prediction for healthcare. Int. J. Intell. Syst. 37(7): 4020-4040 (2022) - [j92]Xuyun Zhang
, Lianyong Qi, Yuan Yuan:
Editorial: Convergency of AI and Cloud/Edge Computing for Big Data Applications. Mob. Networks Appl. 27(6): 2292-2294 (2022) - [j91]Xuyun Zhang
, Lianyong Qi
, Wanchun Dou
, Qiang He
, Christopher Leckie, Ramamohanarao Kotagiri, Zoran Salcic
:
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation. IEEE Trans. Big Data 8(1): 125-139 (2022) - [j90]Lianyong Qi, Qiang He, Feifei Chen, Xuyun Zhang
, Wanchun Dou, Qiang Ni
:
Data-Driven Web APIs Recommendation for Building Web Applications. IEEE Trans. Big Data 8(3): 685-698 (2022) - [j89]Yi Chen
, Hongxia Wang, Kim-Kwang Raymond Choo
, Peisong He
, Zoran Salcic
, Dali Kaafar
, Xuyun Zhang
:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j88]Jianhua Li
, Lingjuan Lyu, Ximeng Liu
, Xuyun Zhang
, Xixiang Lyu
:
FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT. IEEE Trans. Ind. Informatics 18(6): 4059-4068 (2022) - [j87]Xiaolong Xu, Wentao Liu, Yulan Zhang, Xuyun Zhang
, Wanchun Dou, Lianyong Qi, Md. Zakirul Alam Bhuiyan:
PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing. ACM Trans. Intell. Syst. Technol. 13(5): 70:1-70:22 (2022) - [j86]Xiaolong Xu
, Hao Tian
, Xuyun Zhang
, Lianyong Qi
, Qiang He
, Wanchun Dou
:
DisCOV: Distributed COVID-19 Detection on X-Ray Images With Edge-Cloud Collaboration. IEEE Trans. Serv. Comput. 15(3): 1206-1219 (2022) - [j85]Luming Yang, Shaojing Fu, Xuyun Zhang
, Shize Guo, Yongjun Wang, Chi Yang:
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection. World Wide Web 25(5): 2139-2161 (2022) - [j84]Haolong Xiang
, Xuyun Zhang
:
Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams. World Wide Web 25(5): 2163-2183 (2022) - [c88]Adeem Ali Anwar
, Irfan Younas, Guanfeng Liu
, Amin Beheshti
, Xuyun Zhang
:
A Cricket-Based Selection Hyper-Heuristic for Many-Objective Optimization Problems. ADMA (2) 2022: 310-324 - [c87]Yuanying Cai, Chuheng Zhang, Wei Shen, Xiaonan He, Xuyun Zhang
, Longbo Huang:
Imitation Learning to Outperform Demonstrators by Directly Extrapolating Demonstrations. CIKM 2022: 128-137 - [c86]Shuhui Fan, Shaojing Fu, Yuchuan Luo, Haoran Xu, Xuyun Zhang
, Ming Xu:
Smart Contract Scams Detection with Topological Data Analysis on Account Interaction. CIKM 2022: 468-477 - [c85]Wei Shen, Xiaonan He, Chuheng Zhang, Xuyun Zhang
, Jian Xie:
A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS. CIKM 2022: 1777-1786 - [c84]Ambreen Hanif
, Amin Beheshti
, Boualem Benatallah, Xuyun Zhang
, Steven Wood:
Evidence Based Pipeline for Explaining Artificial Intelligence Algorithms with Interactions. DSAA 2022: 1-9 - [c83]Maryam Shahabikargar, Amin Beheshti
, Amin Khatami, Ricky Nguyen, Xuyun Zhang
, Hamid Alinejad-Rokny:
Domain Knowledge Enhanced Text Mining for Identifying Mental Disorder Patterns. DSAA 2022: 1-10 - [c82]Rongwei Xu, Guanfeng Liu
, Xianmei Hua, Shiqi Ye, Xuyun Zhang
, Junwen Lu:
Attention-aware Multi-hop Trust Inference in Online Social Networks. DSAA 2022: 1-10 - [c81]Yuanying Cai, Chuheng Zhang, Li Zhao, Wei Shen, Xuyun Zhang
, Lei Song, Jiang Bian, Tao Qin, Tieyan Liu:
TD3 with Reverse KL Regularizer for Offline Reinforcement Learning from Mixed Datasets. ICDM 2022: 21-30 - [c80]Haolong Xiang, Hongsheng Hu
, Xuyun Zhang
:
DeepiForest: A Deep Anomaly Detection Framework with Hashing Based Isolation Forest. ICDM 2022: 1251-1256 - [c79]Hanzhi Yan
, Xiaolong Xu, Fei Dai, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
Service Caching for Meteorological Emergency Decision-making in Cloud-Edge Computing. ICWS 2022: 120-128 - [c78]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun
, Xuyun Zhang
:
Membership Inference via Backdooring. IJCAI 2022: 3832-3838 - [c77]Lianyong Qi, Xiaoxiao Chi, Xiaokang Zhou, Qi Liu, Fei Dai, Xiaolong Xu, Xuyun Zhang
:
Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing Environment. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 9-16 - [c76]Xiaolong Xu, Hao Tian, Xuyun Zhang
, Lianyong Qi, Qiang He, Wanchun Dou:
DisCOV: Distributed COVID-19 Detection on X-Ray Images with Edge-Cloud Collaboration. SERVICES 2022: 23 - [c75]Wenwen Gong, Xuyun Zhang
, Yifei Chen, Qiang He, Amin Beheshti
, Xiaolong Xu, Chao Yan, Lianyong Qi:
DAWAR: Diversity-aware Web APIs Recommendation for Mashup Creation based on Correlation Graph. SIGIR 2022: 395-404 - [c74]Yongzhe Jia
, Xuyun Zhang
, Bowen Liu, Wanchun Dou:
Efficient Federated Learning with Adaptive Channel Pruning for Edge Devices. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 105-112 - [c73]Bowen Liu, Wanchun Dou, Xiaokang Zhou, Xuyun Zhang
, Lianyong Qi, Fei Dai, Chaochao Chen:
An Intelligent Resource Scheduling Method with Edge Channel Deployment for BPM. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 755-762 - [c72]Xiaotong Wu
, Lianyong Qi, Xiaolong Xu, Shui Yu
, Wanchun Dou, Xuyun Zhang
:
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement. WSDM 2022: 1140-1148 - [i11]Hongsheng Hu
, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun
, Xuyun Zhang
:
Membership Inference via Backdooring. CoRR abs/2206.04823 (2022) - [i10]Yuanying Cai, Chuheng Zhang, Li Zhao, Wei Shen, Xuyun Zhang
, Lei Song, Jiang Bian, Tao Qin, Tieyan Liu:
TD3 with Reverse KL Regularizer for Offline Reinforcement Learning from Mixed Datasets. CoRR abs/2212.02125 (2022) - [i9]Wei Shen, Xiaonan He, Chuheng Zhang, Xuyun Zhang
, Jian Xie:
A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS. CoRR abs/2212.03817 (2022) - 2021
- [j83]Bowen Shen
, Xiaolong Xu
, Lianyong Qi, Xuyun Zhang
, Gautam Srivastava
:
Dynamic server placement in edge computing toward Internet of Vehicles. Comput. Commun. 178: 114-123 (2021) - [j82]Wenda Tang
, Chaobing Wu, Lianyong Qi, Xuyun Zhang
, Xiaolong Xu
, Wanchun Dou:
A WiFi-aware method for mobile data offloading with deadline constraints. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j81]Haolong Xiang
, Jiayu Wang, Kotagiri Ramamohanarao, Zoran Salcic
, Wanchun Dou
, Xuyun Zhang
:
Isolation Forest Based Anomaly Detection Framework on Non-IID Data. IEEE Intell. Syst. 36(3): 31-40 (2021) - [j80]Yuwen Liu
, Aixiang Pei
, Fan Wang
, Yihong Yang
, Xuyun Zhang
, Hao Wang
, Hongning Dai
, Lianyong Qi
, Rui Ma
:
An attention-based category-aware GRU model for the next POI recommendation. Int. J. Intell. Syst. 36(7): 3174-3189 (2021) - [j79]Sang Nguyen
, Zoran Salcic
, Xuyun Zhang
, Akshat Bisht
:
A Low-Cost Two-Tier Fog Computing Testbed for Streaming IoT-Based Applications. IEEE Internet Things J. 8(8): 6928-6939 (2021) - [j78]Gautam Srivastava
, Jerry Chun-Wei Lin
, Xuyun Zhang
, Yuanfa Li:
Large-Scale High-Utility Sequential Pattern Analytics in Internet of Things. IEEE Internet Things J. 8(16): 12669-12678 (2021) - [j77]Xiyuan Hu
, Zhenfeng Fan
, Xu Jia
, Zhihui Li, Xuyun Zhang
, Lianyong Qi, Zuxing Xuan:
Towards effective learning for face super-resolution with shape and pose perturbations. Knowl. Based Syst. 220: 106938 (2021) - [j76]Guoming Zhang
, Lianyong Qi, Xuyun Zhang
, Xiaolong Xu
, Wanchun Dou:
Point-of-Interest Recommendation with User's Privacy Preserving in an IoT Environment. Mob. Networks Appl. 26(6): 2445-2460 (2021) - [j75]Xiaolong Xu
, Yi Chen, Xuyun Zhang
, Qingxiang Liu
, Xihua Liu
, Lianyong Qi:
A blockchain-based computation offloading method for edge computing in 5G networks. Softw. Pract. Exp. 51(10): 2015-2032 (2021) - [j74]Jie Zhang
, Xiang Li, Xuyun Zhang
, Yuan Xue, Gautam Srivastava
, Wanchun Dou:
Service offloading oriented edge server placement in smart farming. Softw. Pract. Exp. 51(12): 2540-2557 (2021) - [j73]Wenmin Lin, Xuyun Zhang
, Lianyong Qi
, Weimin Li
, Shancang Li
, Victor S. Sheng
, Surya Nepal
:
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things. IEEE Trans. Comput. Soc. Syst. 8(1): 227-235 (2021) - [j72]Lina Wang
, Xuyun Zhang
, Tian Wang
, Shaohua Wan
, Gautam Srivastava
, Shaoning Pang
, Lianyong Qi
:
Diversified and Scalable Service Recommendation With Accuracy Guarantee. IEEE Trans. Comput. Soc. Syst. 8(5): 1182-1193 (2021) - [j71]Lianyong Qi
, Chunhua Hu
, Xuyun Zhang
, Mohammad Reza Khosravi
, Suraj Sharma
, Shaoning Pang
, Tian Wang
:
Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment. IEEE Trans. Ind. Informatics 17(6): 4159-4167 (2021) - [j70]Jian Xu
, Qingyu Meng
, Jun Wu
, James Xi Zheng
, Xuyun Zhang
, Suraj Sharma
:
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems. IEEE Trans. Ind. Informatics 17(6): 4279-4287 (2021) - [j69]Gautam Srivastava
, Jerry Chun-Wei Lin
, Xuyun Zhang
, Vincent S. Tseng
:
Guest Editorial: Artificial Intelligence for Securing Industrial-Based Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5738-5741 (2021) - [j68]Xiaolong Xu
, Qihe Huang, Haibin Zhu
, Suraj Sharma
, Xuyun Zhang
, Lianyong Qi
, Md. Zakirul Alam Bhuiyan
:
Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing. IEEE Trans. Intell. Transp. Syst. 22(6): 3720-3729 (2021) - [j67]Lianyong Qi
, Houbing Song
, Xuyun Zhang
, Gautam Srivastava
, Xiaolong Xu
, Shui Yu
:
Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining. ACM Trans. Multim. Comput. Commun. Appl. 17(1s): 20:1-20:19 (2021) - [j66]Xiaolong Xu
, Zijie Fang, Lianyong Qi
, Xuyun Zhang
, Qiang He, Xiaokang Zhou:
TripRes: Traffic Flow Prediction Driven Resource Reservation for Multimedia IoV with Edge Computing. ACM Trans. Multim. Comput. Commun. Appl. 17(2): 41:1-41:21 (2021) - [j65]Meng Liu, Hongsheng Hu
, Haolong Xiang, Chi Yang, Lingjuan Lyu, Xuyun Zhang
:
Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy. ACM Trans. Sens. Networks 17(3): 31:1-31:27 (2021) - [j64]Hao Tian
, Xiaolong Xu
, Lianyong Qi
, Xuyun Zhang
, Wanchun Dou
, Shui Yu
, Qiang Ni
:
CoPace: Edge Computation Offloading and Caching for Self-Driving With Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 70(12): 13281-13293 (2021) - [c71]Yichen Tang
, Wei Chen
, Xuyun Zhang
:
An Empirical Study on Human Flying Imagery Using EEG. ADMA 2021: 18-32 - [c70]Yan Wang, Yun Tian, Xuyun Zhang
, Xiaonan He, Shu Li, Jia Zhu:
Deep Reinforcement Learning Based Iterative Participant Selection Method for Industrial IoT Big Data Mobile Crowdsourcing. ADMA 2021: 258-272 - [c69]Baolai Wang, Shaojing Fu, Xuyun Zhang
, Tao Xie, Lingjuan Lyu, Yuchuan Luo:
Reliable and Privacy-Preserving Task Matching in Blockchain-Based Crowdsourcing. CIKM 2021: 1879-1888 - [c68]Xuyun Zhang
, Deepak Puthal, Chi Yang, Guanfeng Liu
, Kim-Kwang Raymond Choo, Hongzhi Yin
:
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021). CIKM 2021: 4886-4887 - [c67]Ambreen Hanif
, Xuyun Zhang
, Steven Wood:
A Survey on Explainable Artificial Intelligence Techniques and Challenges. EDOC Workshops 2021: 81-89 - [c66]Linjie Gu, Xiaolong Xu, Lianyong Qi, Yiwen Zhang, Xuyun Zhang
, Wanchun Dou:
Cooperative Task Offloading for Internet of Vehicles in Cloud-edge Computing. HPCC/DSS/SmartCity/DependSys 2021: 1537-1544 - [c65]Wei Zhou, Chuangwei Lin, Jirun Duan, Ke Ren, Xuyun Zhang
, Wanchun Dou:
An Optimized Greedy-Based Task Offloading Method for Mobile Edge Computing. ICA3PP (1) 2021: 494-508 - [c64]Hongsheng Hu
, Zoran Salcic, Lichao Sun
, Gillian Dobbie, Xuyun Zhang
:
Source Inference Attacks in Federated Learning. ICDM 2021: 1102-1107 - [c63]Ruichao Mo, Xiaolong Xu
, Xuyun Zhang
, Lianyong Qi, Qi Liu:
Computation Offloading and Resource Management for Energy and Cost Trade-Offs with Deep Reinforcement Learning in Mobile Edge Computing. ICSOC 2021: 563-577 - [c62]Qinting Jiang, Xiaolong Xu, Qiang He, Xuyun Zhang
, Fei Dai, Lianyong Qi, Wanchun Dou:
Game Theory-Based Task Offloading and Resource Allocation for Vehicular Networks in Edge-Cloud Computing. ICWS 2021: 341-346 - [c61]Wentao Liu, Xiaolong Xu, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
GoDeep: Intelligent IoV Service Deployment and Execution with Privacy Preservation in Cloud-edge Computing. ICWS 2021: 579-587 - [c60]Hongsheng Hu
, Zoran Salcic, Gillian Dobbie, Yi Chen, Xuyun Zhang
:
EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks. IJCNN 2021: 1-8 - [c59]Sang Nguyen
, Zoran Salcic, Utsav Trivedi, Xuyun Zhang
:
Predicting Parking Occupancy by FPGA-Accelerated DNN Models at Fog Layer. SMARTCOMP 2021: 83-88 - [c58]Chuangwei Lin, Bowen Liu, Wei Zhou, Yueyue Xu, Xuyun Zhang
, Wanchun Dou:
A Low-Latency Metadata Service for Geo-Distributed File Systems. WISE (1) 2021: 87-100 - [i8]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Xuyun Zhang:
Membership Inference Attacks on Machine Learning: A Survey. CoRR abs/2103.07853 (2021) - [i7]Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang, Yifei Chen, Song Jia, Mohammad Reza Khosravi:
Diversity-aware Web APIs Assignment and Recommendation for Mashup Creation with Compatibility Guarantee. CoRR abs/2107.10538 (2021) - [i6]Wenwen Gong, Yulan Zhang, Xuyun Zhang, Yucong Duan, Yawei Wang, Yifei Chen, Lianyong Qi:
Diversity-aware Web APIs Recommendation with Compatibility Guarantee. CoRR abs/2108.04389 (2021) - [i5]Hongsheng Hu, Zoran Salcic, Lichao Sun, Gillian Dobbie, Xuyun Zhang:
Source Inference Attacks in Federated Learning. CoRR abs/2109.05659 (2021) - [i4]Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Shui Yu, Wanchun Dou, Xuyun Zhang:
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement. CoRR abs/2111.14364 (2021) - 2020
- [j63]Weiyi Zhong, Xiaochun Yin, Xuyun Zhang
, Shancang Li, Wanchun Dou, Ruili Wang, Lianyong Qi:
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. Comput. Commun. 157: 116-123 (2020) - [j62]Xiaolong Xu
, Xuyun Zhang
, Maqbool Khan
, Wanchun Dou, Shengjun Xue, Shui Yu
:
A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems. Future Gener. Comput. Syst. 105: 789-799 (2020) - [j61]Meng Liu
, Yun Luo, Chi Yang, Shaoning Pang
, Deepak Puthal, Kaijun Ren, Xuyun Zhang
:
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. Future Gener. Comput. Syst. 109: 457-468 (2020) - [j60]Xiaolong Xu
, Xihua Liu
, Zhanyang Xu, Fei Dai
, Xuyun Zhang
, Lianyong Qi
:
Trust-Oriented IoT Service Placement for Smart Cities in Edge Computing. IEEE Internet Things J. 7(5): 4084-4091 (2020) - [j59]Lianyong Qi
, Xuyun Zhang
, Shancang Li
, Shaohua Wan
, Yiping Wen, Wenwen Gong
:
Spatial-temporal data-driven service recommendation with privacy-preservation. Inf. Sci. 515: 91-102 (2020) - [j58]Wanchun Dou, Wenda Tang
, Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Chunhua Hu:
An insurance theory based optimal cyber-insurance contract against moral hazard. Inf. Sci. 527: 576-589 (2020) - [j57]Lina Wang, Xuyun Zhang
, Ruili Wang, Chao Yan, Huaizhen Kou
, Lianyong Qi:
Diversified service recommendation with high accuracy and efficiency. Knowl. Based Syst. 204: 106196 (2020) - [j56]Xiaolong Xu
, Yi Chen, Yuan Yuan, Tao Huang, Xuyun Zhang
, Lianyong Qi:
Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multim. Tools Appl. 79(15-16): 9819-9844 (2020) - [j55]Yang Mu, Ping Wang, Liangfu Lu
, Xuyun Zhang
, Lianyong Qi:
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD. Pattern Recognit. Lett. 130: 4-11 (2020) - [j54]Yuan Yuan, Xuyun Zhang
, Jie Tang
:
Guest Editorial Special Issue on Privacy and Security in Computational Intelligence. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 590-592 (2020) - [j53]Xiaolong Xu
, Xuyun Zhang
, Honghao Gao
, Yuan Xue
, Lianyong Qi
, Wanchun Dou
:
BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing. IEEE Trans. Ind. Informatics 16(6): 4187-4195 (2020) - [j52]Suraj Sharma, Xuyun Zhang, Hesham El-Sayed, Zhiyuan Tan:
Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 93:1-93:3 (2020) - [j51]Qiang He
, Guangming Cui
, Xuyun Zhang
, Feifei Chen
, Shuiguang Deng
, Hai Jin
, Yanhui Li
, Yun Yang
:
A Game-Theoretical Approach for User Allocation in Edge Computing Environment. IEEE Trans. Parallel Distributed Syst. 31(3): 515-529 (2020) - [j50]Yanchun Wang
, Qiang He
, Xuyun Zhang
, Dayong Ye
, Yun Yang
:
Efficient QoS-Aware Service Recommendation for Multi-Tenant Service-Based Systems in Cloud. IEEE Trans. Serv. Comput. 13(6): 1045-1058 (2020) - [j49]Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang
, Xiaolong Xu
:
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 23(2): 1275-1297 (2020) - [c57]Huaming Chen, Fucun Li, Geng Sun, Xuyun Zhang
, Xianjun Dong, Lei Wang, Kewen Liao
, Haifeng Shen, Jun Shen
:
A Service Computing Framework for Proteomics Analysis and Collaboration of Pathogenic Mechanism Studies. SCC 2020: 463-465 - [c56]Wenmin Lin, Xiaolong Xu, Lianyong Qi, Xuyun Zhang
, Wanchun Dou, Mohammad Reza Khosravi:
A Proof-of-Majority Consensus Protocol for Blockchain-enabled Collaboration Infrastructure of 5G Network Slice Brokers. BSCI 2020: 41-52 - [c55]Hongsheng Hu
, Gillian Dobbie, Zoran Salcic, Meng Liu
, Jianbing Zhang, Xuyun Zhang
:
A Locality Sensitive Hashing Based Approach for Federated Recommender System. CCGRID 2020: 836-842 - [c54]Haolong Xiang, Zoran Salcic, Wanchun Dou, Xiaolong Xu, Lianyong Qi, Xuyun Zhang
:
OPHiForest: Order Preserving Hashing Based Isolation Forest for Robust and Scalable Anomaly Detection. CIKM 2020: 1655-1664 - [c53]Bowen Shen, Xiaolong Xu, Fei Dai, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
Dynamic Task Offloading with Minority Game for Internet of Vehicles in Cloud-Edge Computing. ICWS 2020: 372-379 - [c52]Zijie Fang, Xiaolong Xu, Fei Dai, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
Computation Offloading and Content Caching with Traffic Flow Prediction for Internet of Vehicles in Edge Computing. ICWS 2020: 380-388 - [c51]Datong Wu, Xiaotong Wu
, Jiaquan Gao, Genlin Ji, Taotao Wu, Xuyun Zhang
, Wanchun Dou:
A Survey of Game Theoretical Privacy Preservation for Data Sharing and Publishing. SPDE 2020: 205-216 - [i3]Jianhua Li
, Lingjuan Lyu, Ximeng Liu, Xuyun Zhang, Xixiang Lyu:
FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT. CoRR abs/2012.06150 (2020)
2010 – 2019
- 2019
- [j48]Xuejun Li
, Yunxiang Zhong, Qiang He, Feifei Chen, Xuyun Zhang
, Wanchun Dou, Yun Yang:
Quality-Aware Service Selection for Multi-Tenant Service Oriented Systems Based on Combinatorial Auction. IEEE Access 7: 35645-35660 (2019) - [j47]Yichao Zhou, Zhenmin Tang
, Lianyong Qi
, Xuyun Zhang
, Wanchun Dou, Shaohua Wan
:
Intelligent Service Recommendation for Cold-Start Problems in Edge Computing. IEEE Access 7: 46637-46645 (2019) - [j46]Shaoning Pang
, Xuyun Zhang
, Kazushi Ikeda, Deepak Puthal, Jianxin Li
, Abdolhossein Sarrafzadeh:
Editorial. Comput. Intell. 35(3): 474-475 (2019) - [j45]Yun Zhou
, Lianyong Qi, Alexander Raake
, Tao Xu, Marta Piekarska, Xuyun Zhang
:
User attitudes and behaviors toward personalized control of privacy settings on smartphones. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j44]Xiaolong Xu
, Qingxiang Liu
, Yun Luo, Kai Peng, Xuyun Zhang
, Shunmei Meng, Lianyong Qi:
A computation offloading method over big data for IoT-enabled cloud-edge computing. Future Gener. Comput. Syst. 95: 522-533 (2019) - [j43]Xiaolong Xu
, Yuan Xue
, Lianyong Qi, Yuan Yuan, Xuyun Zhang
, Tariq Umer
, Shaohua Wan
:
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comput. Syst. 96: 89-100 (2019) - [j42]Xuyun Zhang
, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi
, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. Secur. Commun. Networks 2019: 4529757:1-4529757:4 (2019) - [j41]Lianyong Qi
, Qiang He
, Feifei Chen
, Wanchun Dou
, Shaohua Wan
, Xuyun Zhang
, Xiaolong Xu
:
Finding All You Need: Web APIs Recommendation in Web of Things Through Keywords Search. IEEE Trans. Comput. Soc. Syst. 6(5): 1063-1072 (2019) - [j40]Xiaolong Xu
, Qingxiang Liu
, Xuyun Zhang
, Jie Zhang, Lianyong Qi
, Wanchun Dou
:
A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment. IEEE Trans. Comput. Soc. Syst. 6(6): 1407-1419 (2019) - [c50]Guoming Zhang, Shucun Fu, Xiaolong Xu
, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
An Anti-fraud Framework for Medical Insurance Based on Deep Learning. ADMA 2019: 871-878 - [c49]Hongyu Sun, Qiang He, Kewen Liao
, Timos Sellis
, Longkun Guo, Xuyun Zhang
, Jun Shen
, Feifei Chen:
Fast Anomaly Detection in Multiple Multi-Dimensional Data Streams. IEEE BigData 2019: 1218-1223 - [c48]Guoming Zhang, Lianyong Qi, Xuyun Zhang
, Xiaolong Xu
, Wanchun Dou:
Context-Aware Point-of-Interest Recommendation Algorithm with Interpretability. CollaborateCom 2019: 745-759 - [c47]Xihua Liu, Lianyong Qi, Xiaolong Xu
, Xuyun Zhang
, Shaohua Wan
:
Privacy-Aware Service Migration for Edge Computing in Urban Cities. CSS (1) 2019: 425-436 - [c46]Xiaolong Xu
, Yuan Xue, Lianyong Qi, Xuyun Zhang
, Shaohua Wan
, Wanchun Dou, Victor Chang
:
Load-Aware Edge Server Placement for Mobile Edge Computing in 5G Networks. ICSOC 2019: 494-507 - [c45]Xiaolong Xu
, Shucun Fu, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
A Multi-Objective Crowdsourcing Method for Mobile Video Streaming. ICWS 2019: 209-213 - [c44]Xihua Liu, Xiaolong Xu, Yuan Yuan, Xuyun Zhang
, Wanchun Dou:
Energy-Efficient Computation Offloading with Privacy Preservation for Edge Computing-Enabled 5G Networks. iThings/GreenCom/CPSCom/SmartData 2019: 176-181 - [c43]Xiaolong Xu
, Xihua Liu, Xuyun Zhang
, Lianyong Qi, Yuan Yuan:
Load-Aware Computation Offloading with Privacy Preservation for 5G Networks in Edge Computing. MobiCASE 2019: 171-183 - [r2]Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang:
Scalable Big Data Privacy with MapReduce. Encyclopedia of Big Data Technologies 2019 - 2018
- [j39]Chao Yan, Xinchun Cui, Lianyong Qi
, Xiaolong Xu
, Xuyun Zhang
:
Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation. IEEE Access 6: 43021-43028 (2018) - [j38]Deepak Puthal
, Xuyun Zhang
:
Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices. IEEE Consumer Electron. Mag. 7(6): 29-30 (2018) - [j37]Lianyong Qi, Xuyun Zhang
, Wanchun Dou, Chunhua Hu, Chi Yang, Jinjun Chen:
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Future Gener. Comput. Syst. 88: 636-643 (2018) - [j36]Xiaolong Xu
, Shucun Fu, Lianyong Qi, Xuyun Zhang
, Qingxiang Liu
, Qiang He, Shancang Li:
An IoT-Oriented data placement method with privacy preservation in cloud environment. J. Netw. Comput. Appl. 124: 148-157 (2018) - [j35]Meng Liu
, Xuyun Zhang
, Chi Yang, Qiang He, Jianbing Zhang:
Curve fitting based efficient parameter selection for robust provable data possession. J. Parallel Distributed Comput. 120: 62-76 (2018) - [j34]Jie Zhang, Zhili Zhou, Shu Li, Leilei Gan, Xuyun Zhang
, Lianyong Qi, Xiaolong Xu
, Wanchun Dou:
Hybrid computation offloading for smart home automation in mobile cloud computing. Pers. Ubiquitous Comput. 22(1): 121-134 (2018) - [j33]Xuyun Zhang
, Julian Jang-Jaccard, Lianyong Qi
, Md. Zakirul Alam Bhuiyan
, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. Secur. Commun. Networks 2018: 6238607:1-6238607:3 (2018) - [j32]Lianyong Qi, Shunmei Meng, Xuyun Zhang
, Ruili Wang, Xiaolong Xu
, Zhili Zhou, Wanchun Dou:
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment. Sensors 18(7): 2037 (2018) - [j31]Zhanyang Xu, Renhao Gu, Tao Huang, Haolong Xiang, Xuyun Zhang
, Lianyong Qi, Xiaolong Xu
:
An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks. Sensors 18(9): 3030 (2018) - [j30]Lianyong Qi
, Xiaolong Xu, Xuyun Zhang
, Wanchun Dou
, Chunhua Hu, Yuming Zhou, Jiguo Yu
:
Structural Balance Theory-Based E-Commerce Recommendation over Big Rating Data. IEEE Trans. Big Data 4(3): 301-312 (2018) - [c42]Liangfu Lu, Zhenzhai Huan, Xuyun Zhang
, Lianyong Qi, Sicong Chen
, Yao Wu:
Collaborative Network Traffic Analysis via Alternating Direction Method of Multipliers. CSCWD 2018: 547-552 - [c41]Tao Xu, Yun Zhou
, Alexander Raake
, Xuyun Zhang
:
Analyzing Impact Factors for Smartphone Sharing Decisions Using Decision Tree. HCI (2) 2018: 628-637 - [c40]Sang Nguyen
, Zoran Salcic, Xuyun Zhang
:
Big Data Processing in Fog - Smart Parking Case Study. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 127-134 - [c39]Seoyoung Choi, Eli Salter, Xuyun Zhang
, Burkhard C. Wünsche:
Bird Eyes: A Cloud-Based Object Detection System for Customisable Surveillance. IVCNZ 2018: 1-6 - [c38]Xiaolong Xu
, Yuhao Chen, Lianyong Qi, Jing He, Xuyun Zhang
:
A Balanced Cloudlet Management Method for Wireless Metropolitan Area Networks. TRIDENTCOM 2018: 62-75 - [c37]Meng Liu
, Priyadarsi Nanda, Xuyun Zhang
, Chi Yang, Shui Yu
, Jianxin Li
:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995 - [c36]Liangfu Lu, Xinhe Zhu, Xuyun Zhang
, Junhan Liu, Md. Zakirul Alam Bhuiyan, Guangtai Cui:
One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information. TrustCom/BigDataSE 2018: 1236-1241 - [c35]Xiaolong Xu, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Xuyun Zhang
, Wanchun Dou:
Load Aware Management of Cloudlets for a Wireless Area Metropolitan Network. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1283-1288 - [c34]Xuyun Zhang
, Mahsa Salehi
, Christopher Leckie
, Yun Luo, Qiang He, Rui Zhou, Rao Kotagiri:
Density Biased Sampling with Locality Sensitive Hashing for Outlier Detection. WISE (2) 2018: 269-284 - 2017
- [j29]Wanchun Dou, Xiaolong Xu
, Shunmei Meng, Xuyun Zhang
, Chunhua Hu, Shui Yu
, Jian Yang:
An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j28]Lianyong Qi
, Xuyun Zhang
, Wanchun Dou
, Qiang Ni
:
A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data. IEEE J. Sel. Areas Commun. 35(11): 2616-2624 (2017) - [j27]Xiaolong Xu
, Wanchun Dou, Xuyun Zhang
, Chunhua Hu, Jinjun Chen:
A traffic hotline discovery method over cloud of things using big taxi GPS data. Softw. Pract. Exp. 47(3): 361-377 (2017) - [j26]Qiang He, Rui Zhou
, Xuyun Zhang
, Yanchun Wang, Dayong Ye
, Feifei Chen, John C. Grundy
, Yun Yang:
Keyword Search for Building Service-Based Systems. IEEE Trans. Software Eng. 43(7): 658-674 (2017) - [c33]Lianyong Qi, Wan-Chun Dou, Xuyun Zhang
:
An inverse collaborative filtering approach for cold-start problem in web service recommendation. ACSW 2017: 46:1-46:9 - [c32]Sibghat Ullah Bazai, Julian Jang-Jaccard
, Xuyun Zhang
:
A Privacy Preserving Platform for MapReduce. ATIS 2017: 88-99 - [c31]Lianyong Qi, Wanchun Dou, Xuyun Zhang
:
Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. CSS 2017: 176-188 - [c30]Yun Zhou
, Alexander Raake
, Tao Xu, Xuyun Zhang
:
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. CSS 2017: 427-441 - [c29]Mahsa Salehi
, Christopher Leckie
, James C. Bezdek, Tharshan Vaithianathan, Xuyun Zhang
:
Fast Memory Efficient Local Outlier Detection in Data Streams (Extended Abstract). ICDE 2017: 51-52 - [c28]Xuyun Zhang
, Wan-Chun Dou, Qiang He, Rui Zhou
, Christopher Leckie
, Kotagiri Ramamohanarao, Zoran A. Salcic
:
LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis. ICDE 2017: 983-994 - [c27]Qiang He, Rui Zhou
, Xuyun Zhang
, Yanchun Wang, Dayong Ye
, Feifei Chen, Shiping Chen
, John Grundy
, Yun Yang:
Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming. ICSOC 2017: 462-470 - [c26]Yiwen Zhang, Xiaofei Ai, Qiang He, Xuyun Zhang
, Wanchun Dou, Feifei Chen, Liang Chen, Yun Yang:
Personalized Quality Centric Service Recommendation. ICSOC 2017: 528-544 - [c25]Lianyong Qi, Haolong Xiang, Wanchun Dou, Chi Yang, Yongrui Qin, Xuyun Zhang
:
Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive Hashing. ICWS 2017: 49-56 - [c24]Lianyong Qi, Wanchun Dou, Xuyun Zhang
, Shui Yu
:
Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. SpaCCS 2017: 280-297 - [c23]Meng Liu
, Xuyun Zhang
, Chi Yang, Shaoning Pang
, Deepak Puthal, Kaijun Ren:
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. TrustCom/BigDataSE/ICESS 2017: 502-509 - [e1]Lynn Batten, Dong Seong Kim, Xuyun Zhang
, Gang Li:
Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings. Communications in Computer and Information Science 719, Springer 2017, ISBN 978-981-10-5420-4 [contents] - 2016
- [j25]Chang Liu, Nick Beaugeard, Chi Yang, Xuyun Zhang
, Jinjun Chen:
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing. Concurr. Comput. Pract. Exp. 28(3): 646-660 (2016) - [j24]Mao Lin Huang
, Tze-Haw Huang, Xuyun Zhang
:
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinates. Future Gener. Comput. Syst. 55: 510-523 (2016) - [j23]Lianyong Qi
, Xiaolong Xu
, Wanchun Dou, Jiguo Yu
, Zhili Zhou, Xuyun Zhang
:
Time-Aware IoE Service Recommendation on Sparse Data. Mob. Inf. Syst. 2016: 4397061:1-4397061:12 (2016) - [j22]Xiaolong Xu
, Wan-Chun Dou, Xuyun Zhang
, Jinjun Chen:
EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment. IEEE Trans. Cloud Comput. 4(2): 166-179 (2016) - [j21]Mahsa Salehi
, Christopher Leckie
, James C. Bezdek, Tharshan Vaithianathan, Xuyun Zhang
:
Fast Memory Efficient Local Outlier Detection in Data Streams. IEEE Trans. Knowl. Data Eng. 28(12): 3246-3260 (2016) - [c22]Lianyong Qi, Wan-Chun Dou, Xuyun Zhang
:
Combining Social Balance Theory and Collaborative Filtering for Service Recommendation in Sparse Environment. APSCC 2016: 357-374 - [c21]Mahsa Salehi
, Xuyun Zhang
, James C. Bezdek, Christopher Leckie
:
Smart Sampling: A Novel Unsupervised Boosting Approach for Outlier Detection. Australasian Conference on Artificial Intelligence 2016: 469-481 - [c20]Xuyun Zhang
, Christopher Leckie
, Wanchun Dou, Jinjun Chen, Kotagiri Ramamohanarao, Zoran Salcic
:
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation. CIKM 2016: 1793-1802 - [c19]Lianyong Qi
, Wan-Chun Dou, Xuyun Zhang
:
Service Recommendation Based on Social Balance Theory and Collaborative Filtering. ICSOC 2016: 637-645 - [c18]Xuyun Zhang
, Lianyong Qi, Qiang He, Wanchun Dou:
Scalable Iterative Implementation of Mondrian for Big Data Multidimensional Anonymisation. SpaCCS Workshops 2016: 311-320 - 2015
- [j20]Mao Lin Huang
, Liang Fu Lu, Xuyun Zhang
:
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing. Computing 97(4): 425-437 (2015) - [j19]Chang Liu, Chi Yang, Xuyun Zhang
, Jinjun Chen:
External integrity verification for outsourced big data in cloud and IoT: A big picture. Future Gener. Comput. Syst. 49: 58-67 (2015) - [j18]Xuyun Zhang
, Wan-Chun Dou, Jian Pei
, Surya Nepal
, Chi Yang, Chang Liu, Jinjun Chen:
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud. IEEE Trans. Computers 64(8): 2293-2307 (2015) - [j17]Chang Liu, Rajiv Ranjan
, Chi Yang, Xuyun Zhang
, Lizhe Wang
, Jinjun Chen:
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. IEEE Trans. Computers 64(9): 2609-2622 (2015) - [j16]Chi Yang, Chang Liu, Xuyun Zhang
, Surya Nepal
, Jinjun Chen:
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. IEEE Trans. Parallel Distributed Syst. 26(2): 329-339 (2015) - [j15]Wanchun Dou, Xuyun Zhang
, Jianxun Liu, Jinjun Chen:
HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications. IEEE Trans. Parallel Distributed Syst. 26(2): 455-466 (2015) - [c17]Lianyong Qi
, Xuyun Zhang
, Yiping Wen, Yuming Zhou:
A Social Balance Theory-Based Service Recommendation Approach. APSCC 2015: 48-60 - [c16]Lianyong Qi
, Xuyun Zhang
, Yiping Wen, Yuming Zhou:
A Context-Aware Service Selection Approach Based on Historical Records. CCBD 2015: 127-134 - [r1]Chang Liu, Rajiv Ranjan
, Xuyun Zhang
, Chi Yang, Jinjun Chen:
A Big Picture of Integrity Verification of Big Data in Cloud Computing. Handbook on Data Centers 2015: 631-645 - 2014
- [j14]Xuyun Zhang
, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J. Comput. Syst. Sci. 80(5): 1008-1020 (2014) - [j13]Chi Yang, Xuyun Zhang
, Changmin Zhong, Chang Liu, Jian Pei
, Kotagiri Ramamohanarao
, Jinjun Chen:
A spatiotemporal compression based approach for efficient big data processing on Cloud. J. Comput. Syst. Sci. 80(8): 1563-1583 (2014) - [j12]Xuyun Zhang
, Laurence T. Yang, Chang Liu, Jinjun Chen:
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud. IEEE Trans. Parallel Distributed Syst. 25(2): 363-373 (2014) - [j11]Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang
, Chi Yang, Rajiv Ranjan
, Kotagiri Ramamohanarao:
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates. IEEE Trans. Parallel Distributed Syst. 25(9): 2234-2244 (2014) - [j10]Shunmei Meng, Wanchun Dou, Xuyun Zhang
, Jinjun Chen:
KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications. IEEE Trans. Parallel Distributed Syst. 25(12): 3221-3231 (2014) - [i2]Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen:
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. IACR Cryptol. ePrint Arch. 2014: 391 (2014) - 2013
- [j9]Mingzhong Wang
, Xuyun Zhang
, Liehuang Zhu, Lejian Liao:
Trust-based workflow refactoring for concurrent scheduling in service-oriented environment. Concurr. Comput. Pract. Exp. 25(13): 1879-1893 (2013) - [j8]Xuyun Zhang
, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud. Concurr. Comput. Pract. Exp. 25(18): 2561-2576 (2013) - [j7]Chang Liu, Xuyun Zhang
, Chi Yang, Jinjun Chen:
CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Gener. Comput. Syst. 29(5): 1300-1308 (2013) - [j6]Xuyun Zhang
, Chang Liu, Surya Nepal
, Jinjun Chen:
An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5): 542-555 (2013) - [j5]Wanchun Dou, Lianyong Qi
, Xuyun Zhang
, Jinjun Chen:
An evaluation method of outsourcing services for developing an elastic cloud platform. J. Supercomput. 63(1): 1-23 (2013) - [j4]Xuyun Zhang
, Chang Liu, Surya Nepal
, Suraj Pandey, Jinjun Chen:
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. IEEE Trans. Parallel Distributed Syst. 24(6): 1192-1202 (2013) - [c15]Xuyun Zhang
, Chi Yang, Surya Nepal
, Chang Liu, Wanchun Dou, Jinjun Chen:
A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud. CGC 2013: 105-112 - [c14]Chi Yang, Chang Liu, Xuyun Zhang
, Surya Nepal
, Jinjun Chen:
Querying Streaming XML Big Data with Multiple Filters on Cloud. CSE 2013: 1121-1127 - [c13]Chang Liu, Rajiv Ranjan
, Xuyun Zhang
, Chi Yang, Dimitrios Georgakopoulos
, Jinjun Chen:
Public Auditing for Big Data Storage in Cloud Computing - A Survey. CSE 2013: 1128-1135 - [c12]Chang Liu, Xuyun Zhang
, Chengfei Liu
, Yun Yang, Rajiv Ranjan
, Dimitrios Georgakopoulos
, Jinjun Chen:
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing. TrustCom/ISPA/IUCC 2013: 9-16 - [c11]Xuyun Zhang
, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. TrustCom/ISPA/IUCC 2013: 501-508 - 2012
- [j3]Lianyong Qi
, Wanchun Dou, Xuyun Zhang
, Jinjun Chen:
A QoS-aware composition method supporting cross-platform service invocation in cloud environment. J. Comput. Syst. Sci. 78(5): 1316-1329 (2012) - [j2]Wanchun Dou, Chao Lv, Xuyun Zhang
, Jinjun Chen:
A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service. Int. J. Web Serv. Res. 9(1): 30-50 (2012) - [c10]Gaofeng Zhang, Yun Yang, Xuyun Zhang
, Chang Liu, Jinjun Chen:
Key Research Issues for Privacy Protection and Preservation in Cloud Computing. CGC 2012: 47-54 - [c9]Xuyun Zhang
, Chang Liu, Surya Nepal
, Wanchun Dou, Jinjun Chen:
Privacy-Preserving Layer over MapReduce on Cloud. CGC 2012: 304-310 - [c8]Gaofeng Zhang, Xuyun Zhang
, Yun Yang, Chang Liu, Jinjun Chen:
An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing. ICSOC 2012: 639-647 - [i1]Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen:
CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing. IACR Cryptol. ePrint Arch. 2012: 385 (2012) - 2011
- [j1]Jianxun Liu, Yiping Wen, Ting Li, Xuyun Zhang
:
A data-operation model based on partial vector space for batch processing in workflow. Concurr. Comput. Pract. Exp. 23(16): 1936-1950 (2011) - [c7]Chang Liu, Xuyun Zhang
, Jinjun Chen, Chi Yang:
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing. DASC 2011: 372-379 - [c6]Xuyun Zhang
, Chang Liu, Jinjun Chen, Wanchun Dou:
An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud. DASC 2011: 518-525 - [c5]Wanchun Dou, Chao Lv, Xuyun Zhang
, Jinjun Chen:
A QoS-Aware Service Evaluation Method for Co-selecting a Shared Service. ICWS 2011: 145-152 - 2010
- [c4]Lianyong Qi
, Rutao Yang, Wenmin Lin, Xuyun Zhang
, Wanchun Dou, Jinjun Chen:
A QoS-aware Web Service Selection Method Based on Credibility Evaluation. HPCC 2010: 471-476 - [c3]Xiaojie Si, Xuyun Zhang
, Wanchun Dou:
A Novel Local Optimization Method for QoS-Aware Web Service Composition. WISM 2010: 402-409 - [c2]Xuyun Zhang
, Wanchun Dou:
Preference-Aware QoS Evaluation for Cloud Web Service Composition Based on Artificial Neural Networks. WISM 2010: 410-417
2000 – 2009
- 2009
- [c1]Xuyun Zhang
, Wanchun Dou:
A Global QoS-Driven Evaluation Strategy for Web Services Composition. ISPA 2009: 595-600
Coauthor Index
aka: Gill Dobbie
aka: Wanchun Dou
aka: Zoran Salcic

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-24 00:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint