default search action
Xin-jun Pei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Xiaoheng Deng, Shunmeng Yin, Xinjun Pei, Lixin Lin, Xuechen Chen, Jinsong Gui:
E-DBRL: efficient double broad reinforcement learning for adaptive traffic signal control. Appl. Intell. 54(17-18): 8563-8575 (2024) - [j17]Peng Chen, Shengwei Tian, Xin Wang, Xinjun Pei, Weitao Nong, Hao Zhang:
Efficient malware detection through inter-component communication analysis. Clust. Comput. 27(8): 11667-11682 (2024) - [j16]Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Jianqing Liu, Kaiping Xue:
Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs. IEEE Trans. Inf. Forensics Secur. 19: 1614-1629 (2024) - [j15]Xiaoheng Deng, Bin Chen, Xuechen Chen, Xinjun Pei, Shaohua Wan, Sotirios K. Goudos:
A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT. IEEE Trans. Ind. Informatics 20(2): 1445-1454 (2024) - [j14]Xiaoheng Deng, Zhe Wang, Xinjun Pei, Kaiping Xue:
TransMalDE: An Effective Transformer Based Hierarchical Framework for IoT Malware Detection. IEEE Trans. Netw. Sci. Eng. 11(1): 140-151 (2024) - [j13]Xinjun Pei, Xiaoheng Deng, Neal N. Xiong, Shahid Mumtaz, Jie Wu:
Complex Graph Analysis and Representation Learning: Problems, Techniques, and Applications. IEEE Trans. Netw. Sci. Eng. 11(5): 4990-5007 (2024) - [c4]Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen:
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing. CVPR 2024: 24316-24325 - [c3]Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Husnain Mushtaq:
SecBFL-IoV: A Secure Blockchain-Enabled Federated Learning Framework for Resilience Against Poisoning Attacks in Internet of Vehicles. PRCV (1) 2024: 410-428 - [i1]Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen:
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing. CoRR abs/2406.18540 (2024) - 2023
- [j12]Feng Pi, Shengwei Tian, Xinjun Pei, Peng Chen, Xin Wang, Xiaowei Wang:
AdaTrans: An adaptive transformer for IoT Malware detection based on sensitive API call graph and inter-component communication analysis. J. Intell. Fuzzy Syst. 45(6): 11439-11452 (2023) - [j11]Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Ping Jiang, Husnain Mushtaq:
A verifiable and privacy-preserving blockchain-based federated learning approach. Peer Peer Netw. Appl. 16(5): 2256-2270 (2023) - [j10]Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Lan Zhang, Kaiping Xue:
A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2127-2143 (2023) - [j9]Xiaoheng Deng, Haowen Tang, Xinjun Pei, Deng Li, Kaiping Xue:
MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network. IEEE Trans. Inf. Forensics Secur. 18: 5950-5963 (2023) - [j8]Xiaoheng Deng, Xinjun Pei, Shengwei Tian, Lan Zhang:
Edge-Based IIoT Malware Detection for Mobile Devices With Offloading. IEEE Trans. Ind. Informatics 19(7): 8093-8103 (2023) - [j7]Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue:
Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks. IEEE Trans. Netw. Serv. Manag. 20(1): 684-696 (2023) - [c2]Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Kaiping Xue:
Efficient Privacy Preserving Graph Neural Network for Node Classification. ICASSP 2023: 1-5 - [c1]Yunlong Zhao, Xiaoheng Deng, Xinjun Pei, Xuechen Chen, Deng Li:
Parallel Gradient Blend for Class Incremental Learning. ICIP 2023: 1220-1224 - 2021
- [j6]Jianting Yuan, Guanxin Chen, Shengwei Tian, Xinjun Pei:
Malicious URL Detection Based on a Parallel Neural Joint Model. IEEE Access 9: 9464-9472 (2021) - 2020
- [j5]Xin-jun Pei, Long Yu, Shengwei Tian:
AMalNet: A deep learning framework based on graph convolutional networks for malware detection. Comput. Secur. 93: 101792 (2020) - [j4]Huanhuan Wang, Long Yu, Shengwei Tian, Shiqi Luo, Xin-jun Pei:
Malicious webpages analysis and detection algorithm based on BiLSTM. Int. J. Electron. Bus. 15(4): 351-367 (2020) - [j3]Xin-jun Pei, Long Yu, Shengwei Tian, Huan-huan Wang, Yongfang Peng:
Combining multi-features with a neural joint model for Android malware detection. J. Intell. Fuzzy Syst. 38(2): 2151-2163 (2020) - [j2]Xinjun Pei, Shengwei Tian, Long Yu, Huanhuan Wang, Yongfang Peng:
A Two-Stream Network Based on Capsule Networks and Sliced Recurrent Neural Networks for DGA Botnet Detection. J. Netw. Syst. Manag. 28(4): 1694-1721 (2020)
2010 – 2019
- 2019
- [j1]Huan-huan Wang, Long Yu, Shengwei Tian, Yongfang Peng, Xin-jun Pei:
Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl. Intell. 49(8): 3016-3026 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint