


default search action
Xiaoyong Li 0003
Person information
- affiliation: Bejing University of Posts and Telecommunications, MOE, Key Laboratory of Trustworthy Distributed Computing and Service, China
- affiliation (PhD 2009): Xi'an Jiaotong University, China
Other persons with the same name
- Xiaoyong Li — disambiguation page
- Xiaoyong Li 0001 — Shanghai Jiao Tong University, School of Microelectronics, China (and 2 more)
- Xiaoyong Li 0002
— National University of Defense Technology, College of Computer Science, College of Meteorology and Oceanography, Changsha, China
- Xiaoyong Li 0004 — Texas A&M University, TX, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Yingying Hou
, Wenbin Yao
, Xiaoyong Li
, Yamei Xia, Mingqing Wang:
Lattice-Based Semantic-Aware Searchable Encryption for Internet of Things. IEEE Internet Things J. 11(17): 28370-28384 (2024) - [j52]Yueqin Ge
, Yali Gao
, Xiaoyong Li
, Binsi Cai, Jinwen Xi
, Shui Yu
:
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT. IEEE Internet Things J. 11(19): 30725-30741 (2024) - [j51]Ximing Li
, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Jia Jia
, Yali Gao
, Shui Yu
:
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 19: 7161-7175 (2024) - [c56]Yiyang Huang
, Xiaoyong Li
, Jie Yuan
, Kaiguo Yuan
:
A machine learning-based trust evaluation model for wireless sensor networks. CSAIDE 2024: 654-658 - [c55]Yu Jin
, Chunlu Wang
, Pengfei Qiu
, Chang Liu
, Yihao Yang
, Hongpei Zheng
, Yongqiang Lyu
, Xiaoyong Li
, Gang Qu
, Dongsheng Wang
:
Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR. DAC 2024: 188:1-188:6 - [c54]Yueqin Ge, Yali Gao, Xiaoyong Li, Binsi Cai, Jinwen Xi, Qiang Han, Yongxin Liang:
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning. ICA3PP (5) 2024: 1-11 - [c53]Jia Jia
, Linghui Li
, Pengfei Qiu
, Binsi Cai
, Xu Kang
, Ximing Li
, Xiaoyong Li
:
Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation. ICIC (9) 2024: 386-396 - 2023
- [j50]Jie Yuan, Rui Qian, Tingting Yuan
, Mingliang Sun, Jirui Li, Xiaoyong Li:
LayerCFL: an efficient federated learning with layer-wised clustering. Cybersecur. 6(1): 39 (2023) - [j49]Wenbin Yao, Bangli Pan, Yingying Hou
, Xiaoyong Li, Yamei Xia:
An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning. Entropy 25(5): 715 (2023) - [j48]Wenbin Yao, Zhuqing Wang, Yingying Hou
, Xikang Zhu
, Xiaoyong Li, Yamei Xia:
An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment. Future Gener. Comput. Syst. 146: 222-233 (2023) - [j47]Wenbin Yao
, Longcan Hu
, Yingying Hou
, Xiaoyong Li
:
A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT. Sensors 23(8): 4141 (2023) - [j46]Pengfei Qiu
, Qiang Gao, Chang Liu
, Dong-Sheng Wang, Yongqiang Lyu
, Xiaoyong Li
, Chunlu Wang, Gang Qu
:
PMU-Spill: A New Side Channel for Transient Execution Attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5048-5059 (2023) - [j45]Ximing Li
, Xiaoyong Li
, Jia Jia
, Linghui Li, Jie Yuan
, Yali Gao, Shui Yu
:
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 18: 1638-1652 (2023) - [c52]Yu Jin
, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang, Xiaoyong Li, Qian Wang, Gang Qu:
Overtake: Achieving Meltdown-type Attacks with One Instruction. AsianHOST 2023: 1-6 - [c51]Zhuoer Lu, Xiaoyong Li, Pengfei Qiu:
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection. DSC 2023: 213-220 - [c50]Yihao Yang
, Pengfei Qiu, Chunlu Wang, Yu Jin, Qiang Gao, Xiaoyong Li, Dongsheng Wang, Gang Qu:
Exploration and Exploitation of Hidden PMU Events. ICCAD 2023: 1-9 - [c49]Xinghai Wei
, Jie Yuan
, Xiaoyong Li
, Dongxiao Liu
:
NDRA: An Efficient Multi-Objective Optimal Routing Algorithm Using Pareto Domination. MobiArch 2023: 19-24 - [c48]Liwei Zhang
, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Yali Gao
, Ruobin Dou
, Luying Chen
:
Efficient Membership Inference Attacks against Federated Learning via Bias Differences. RAID 2023: 222-235 - [c47]Ximing Li, Linghui Li, Xiaoyong Li, Binsi Cai, Bingyu Li:
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection. TrustCom 2023: 1249-1257 - [c46]Yueqin Ge, Xiaoyong Li, Binsi Cai:
A Lightweight Bit-Operation Abnormal Traffic Detection Method Based On XNOR-CNN. WCNC 2023: 1-6 - 2022
- [j44]Wenbin Yao
, Mengyao Hao
, Yingying Hou
, Xiaoyong Li
:
FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems. IEEE Access 10: 15311-15321 (2022) - [j43]Wenbin Yao
, Ke Guo
, Yingying Hou
, Xiaoyong Li
:
Hierarchical Structure-Feature Aware Graph Neural Network for Node Classification. IEEE Access 10: 36846-36855 (2022) - [j42]Pengfei Du
, Yali Gao, Xiaoyong Li:
Towards an Intrinsic Interpretability Approach for Multimodal Hate Speech Detection. Int. J. Pattern Recognit. Artif. Intell. 36(13): 2250040:1-2250040:16 (2022) - [j41]Binsi Cai
, Xiaoyong Li
, Wenping Kong
, Jie Yuan
, Shui Yu
:
A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT. IEEE Internet Things J. 9(13): 10988-11003 (2022) - [j40]Wenping Kong
, Xiaoyong Li
, Liyang Hou
, Jie Yuan
, Yali Gao
, Shui Yu
:
A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing. IEEE Internet Things J. 9(15): 13927-13941 (2022) - [j39]Jirui Li
, Xiaoyong Li
, Jie Yuan
, Yunquan Gao, Rui Zhang:
An Energy-Constrained Forwarding Scheme Based on Group Trustworthiness in Mobile Internet of Things. IEEE Syst. J. 16(1): 531-542 (2022) - [j38]Chuanyi Liu, Xiaoyong Li
, Mingliang Sun, Yali Gao
, Jie Yuan
, Shaoming Duan:
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback. IEEE Trans. Cloud Comput. 10(2): 1021-1037 (2022) - [j37]Linghui Li, Yongdong Zhang
, Sheng Tang
, Lingxi Xie
, Xiaoyong Li, Qi Tian
:
Adaptive Spatial Location With Balanced Loss for Video Captioning. IEEE Trans. Circuits Syst. Video Technol. 32(1): 17-30 (2022) - [j36]Yali Gao
, Xiaoyong Li
, Hao Peng
, Binxing Fang, Philip S. Yu
:
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network. IEEE Trans. Knowl. Data Eng. 34(2): 708-722 (2022) - [c45]Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chang Liu, Xiaoyong Li, Chunlu Wang, Gang Qu:
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions. AsianHOST 2022: 1-6 - [c44]Wenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li:
A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection. DSN Workshops 2022: 155-161 - [c43]Pengfei Du
, Yali Gao, Xiaoyong Li:
Bi-attention Modal Separation Network for Multimodal Video Fusion. MMM (1) 2022: 585-598 - [c42]Jia Jia, Xiaoyong Li, Ximing Li, Linghui Li, Jie Yuan, Hongmiao Wang, Yali Gao, Pengfei Qiu, Jialu Tang:
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1189-1194 - 2021
- [c41]Mingjie Sun, Xiaoyong Li, Yali Gao, Jie Yuan, Wenping Kong, Haifeng Chang:
An Improved Random Walk Algorithm for Resource Scheduling in Cloud Datacenter. ICCDE 2021: 1-7 - [c40]Ning Pan, Wenbin Yao, Xiaoyong Li:
Friends Recommendation Based on KBERT-CNN Text Classification Model. IJCNN 2021: 1-6 - [c39]Li Xue
, Wenbin Yao
, Yamei Xia
, Xiaoyong Li
:
Deep Attributed Network Embedding with Community Information. MMM (1) 2021: 653-665 - 2020
- [j35]Limengwei Liu, Modi Hu, Chaoqun Kang, Xiaoyong Li
:
Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems. Inf. 11(2): 105 (2020) - [j34]Chuanyi Liu, Xiaoyong Li
:
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks. Sensors 20(6): 1592 (2020) - [c38]Chaoshun Chang, Xiaoyong Li
, Yali Gao:
A Graph Convolution model considering label co-occurrence LC_GCN. ACAI 2020: 23:1-23:6 - [c37]Yang Chen, Xiaoyong Li:
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering. CIS 2020: 374-377 - [c36]Li Tan
, Wenbin Yao
, Xiaoyong Li
:
Expanding Training Set for Graph-Based Semi-supervised Classification. DEXA (2) 2020: 245-258 - [c35]Yunfeng Li, Xiaoyong Li
, Mingjian Lei:
CTransE: An Effective Information Credibility Evaluation Method Based on Classified Translating Embedding in Knowledge Graphs. DEXA (2) 2020: 287-300 - [c34]Binsi Cai, Xiaoyong Li
, Yali Gao:
An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation. ICC 2020: 1-6 - [c33]Shuang Xun, Xiaoyong Li
, Yali Gao:
AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network. ICIAI 2020: 20-24 - [c32]Mingjian Lei, Xiaoyong Li
, Binsi Cai, Yunfeng Li, Limengwei Liu, Wenping Kong:
P-DNN: An Effective Intrusion Detection Method based on Pruning Deep Neural Network. IJCNN 2020: 1-9 - [c31]Chao Yang, Wenbin Yao, Xiaoyong Li
:
Cross-Scale Correlation Stereo Network. IJCNN 2020: 1-6 - [c30]L. Yang, F. Zhou, Xiaoyong Li
:
Information Eye: A Hybrid Visualization Approach of Exploring Relational Information Space. SMC 2020: 3753-3759
2010 – 2019
- 2019
- [j33]Yali Gao
, Xiaoyong Li
, Jirui Li
, Yunquan Gao
, Philip S. Yu:
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources. IEEE Access 7: 13999-14012 (2019) - [j32]Sheng-Yao Su, Wenbin Yao, Xiaoyong Li
:
SORD: a new strategy of online replica deduplication in Cloud-P2P. Clust. Comput. 22(1): 1-23 (2019) - [j31]Sheng-Yao Su, Wenbin Yao, Baojun Qiao, Ming Zong, Xin He, Xiaoyong Li
:
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment. Future Gener. Comput. Syst. 100: 844-858 (2019) - [j30]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Tingting Yuan
, Xiaoyong Li
:
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers. Future Internet 11(8): 168 (2019) - [j29]Erxia Li, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He, Xiaoyong Li
:
Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees. Inf. 10(8): 251 (2019) - [j28]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
:
Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Inf. 10(8): 259 (2019) - [j27]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
:
Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Information 2019, 10, 259. Inf. 10(10): 319 (2019) - [j26]Jirui Li
, Xiaoyong Li
, Jie Yuan
, Rui Zhang, Binxing Fang:
Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things. IEEE Internet Things J. 6(2): 2778-2796 (2019) - [j25]Yunquan Gao
, Xiaoyong Li
, Jirui Li
, Yali Gao
:
Distributed and Efficient Minimum-Latency Data Aggregation Scheduling for Multichannel Wireless Sensor Networks. IEEE Internet Things J. 6(5): 8482-8495 (2019) - [j24]Jirui Li, Xiaoyong Li
, Xianglong Cheng, Jie Yuan, Rui Zhang:
A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things. J. Netw. Comput. Appl. 140: 40-53 (2019) - [j23]Jirui Li, Xiaoyong Li
, Rui Zhang:
Cross-layer collaboration handoff mechanism based on multi-attribute decision in mobile computation offloading. Soft Comput. 23(1): 323-341 (2019) - [j22]Xiaoyong Li
, Jie Yuan
, Erxia Li, Wenbin Yao, Junping Du
:
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service. IEEE Trans. Netw. Serv. Manag. 16(3): 1240-1254 (2019) - [c29]Ning Guo, Xiaoyong Li
, Hui Yin, Yali Gao
:
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. ICICS 2019: 199-218 - 2018
- [j21]Jie Yuan, Xiaoyong Li
:
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion. IEEE Access 6: 23626-23638 (2018) - [j20]Yunquan Gao
, Xiaoyong Li
, Jirui Li
, Yali Gao
:
Construction of Optimal Trees for Maximizing Aggregation Information in Deadline- and Energy-Constrained Unreliable Wireless Sensor Networks. IEEE Access 6: 27451-27464 (2018) - [j19]Jirui Li
, Xiaoyong Li
, Yunquan Gao
, Jie Yuan, Binxing Fang:
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things. IEEE Access 6: 74579-74597 (2018) - [j18]Sheng-Yao Su, Wenbin Yao, Xiaoyong Li
:
DARS: A dynamic adaptive replica strategy under high load Cloud-P2P. Future Gener. Comput. Syst. 78: 31-40 (2018) - [j17]Xiaoyong Li
, Jie Yuan, Huadong Ma, Wenbin Yao:
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. IEEE Trans. Inf. Forensics Secur. 13(8): 1917-1931 (2018) - [j16]Xiaoyong Li
, Huadong Ma
, Wenbin Yao, Xiaolin Gui:
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services. IEEE Trans. Serv. Comput. 11(4): 671-684 (2018) - [c28]Xianglong Cheng, Xiaoyong Li
:
Trust Evaluation in Online Social Networks Based on Knowledge Graph. ACAI 2018: 23:1-23:7 - [c27]Xinyu Ma, Xiaoyong Li
:
Trust Evaluation Model in Edge Computing Based on Integrated Trust. ACAI 2018: 26:1-26:6 - [c26]Yali Gao
, Xiaoyong Li
, Jirui Li, Yunquan Gao, Ning Guo:
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence. IEEE BigData 2018: 1272-1277 - [c25]Jie Yuan, Xiaoyong Li
:
A multi-source feedback based trust calculation mechanism for edge computing. INFOCOM Workshops 2018: 819-824 - [c24]Jie Yuan, Xiaoyong Li
:
A Broker-guided Trust Calculation Model for Mobile Devices of D2D Communications. ISCC 2018: 1-6 - [c23]Wenbin Yao, Yuanhao Ding, Xiaoyong Li
:
LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 231-236 - [c22]Wenbin Yao, Lijuan Zhang, Xiaoyong Li
:
Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 517-524 - [c21]Wenbin Yao, Yuanhao Ding, Xiaoyong Li
:
Deep Learning for Phishing Detection. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 645-650 - [c20]Yunquan Gao, Xiaoyong Li, Jirui Li, Yali Gao
:
A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree. MSWiM 2018: 265-273 - [c19]Xin Men, Feng Zhou, Xiaoyong Li:
A Deep Learned Method for Video Indexing and Retrieval. PG (Short Papers and Posters) 2018: 85-88 - 2017
- [j15]Jirui Li
, Xiaoyong Li
, Yunquan Gao, Yali Gao
, Rui Zhang:
Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks. IEEE Access 5: 20908-20920 (2017) - [j14]Jingkun Chang, Wenbin Yao, Xiaoyong Li
:
The design of a context-aware service system in intelligent transportation system. Int. J. Distributed Sens. Networks 13(10) (2017) - [j13]Jingkun Chang
, Wenbin Yao, Xiaoyong Li
:
A Context-Aware S-Health Service System for Drivers. Sensors 17(3): 609 (2017) - [j12]Binxing Fang, Yan Jia, Xiaoyong Li
, Aiping Li, Xindong Wu
:
Big Search in Cyberspace. IEEE Trans. Knowl. Data Eng. 29(9): 1793-1805 (2017) - [c18]Xiaoyan Jia, Xiaoyong Li
, Yali Gao
:
A Novel Semi-Automatic Vulnerability Detection System for Smart Home. BDIOT 2017: 195-199 - [c17]Yali Gao
, Xiaoyong Li
, Jirui Li, Yunquan Gao:
A dynamic-trust-based recruitment framework for mobile crowd sensing. ICC 2017: 1-6 - [c16]Yali Gao
, Xiaoyong Li
, Jirui Li, Yunquan Gao:
DTRF: A dynamic-trust-based recruitment framework for Mobile Crowd Sensing system. IM 2017: 632-635 - [c15]Lei Li, Xiaoyong Li
, Yali Gao
:
MTIV: A Trustworthiness Determination Approach for Threat Intelligence. SpaCCS Workshops 2017: 5-14 - [c14]Zhaojie Xu, Xiaoyong Li
:
Secure Transfer Protocol Between App and Device of Internet of Things. SpaCCS Workshops 2017: 25-34 - [c13]Xiaoyan Li, Xiaoyong Li:
Rogue Access Points Detection Based on Theory of Semi-Supervised Learning. SpaCCS Workshops 2017: 35-44 - [c12]Jiahua Zhang, Xiaoyong Li
:
Phishing Detection Method Based on Borderline-Smote Deep Belief Network. SpaCCS Workshops 2017: 45-53 - 2016
- [c11]Jirui Li, Xiaoyong Li
, Rui Zhang:
Energy-and-Time-Saving Task Scheduling Based on Improved Genetic Algorithm in Mobile Cloud Computing. CollaborateCom 2016: 418-428 - [c10]Hong-Qiang Wu, Xiaoyong Li
, Bin Xing Fang, Yi-Ping Wang:
Resource Scheduling Based on Improved FCM Algorithm for Mobile Cloud Computing. ICPADS 2016: 128-132 - [c9]Hong-Qiang Wu, Xiaoyong Li
, Bin-Xing Fang:
Research of User Request Algorithm in Mobile Cloud Computing Based on Improved FCM and Collaborative Filtering. PDCAT 2016: 40-44 - [c8]Jiali Dong, Xiaoyong Li
, Binxing Fang:
A Recommendation System Based on Multi-attribute. ICSS 2016: 165-169 - [c7]Jiali Dong, Xiaoyong Li
, Binxing Fang:
Community-Based Recommendations: A Solution to the Vulnerability Problem. SKG 2016: 150-153 - [c6]Qi Tang, Wen Zhang, Xiaoyong Li
, Bin Wang:
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications. TSA 2016: 17-22 - 2015
- [j11]Xiaoyong Li
, Huadong Ma, Feng Zhou, Wenbin Yao:
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services. IEEE Trans. Inf. Forensics Secur. 10(7): 1402-1415 (2015) - [j10]Xiaoyong Li
, Huadong Ma, Feng Zhou, Xiaolin Gui:
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds. IEEE Trans. Parallel Distributed Syst. 26(5): 1419-1429 (2015) - [j9]Wenbin Yao, Si Han, Xiaoyong Li
:
LKH++ Based Group Key Management Scheme for Wireless Sensor Network. Wirel. Pers. Commun. 83(4): 3057-3073 (2015) - [c5]Yi-Ping Wang, Xiaoyong Li
:
Analysis of the Performance of Hadoop Applications on Eucalyptus Cloud. SocialSec 2015: 28-31 - 2013
- [j8]Xiaoyong Li
, Junping Du:
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf. Secur. 7(1): 39-50 (2013) - [j7]Xiaoyong Li
, Feng Zhou, Junping Du:
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(6): 924-935 (2013) - [c4]MeiYu Liang, Junping Du, Xiaoyong Li
, Liang Xu, Honggang Liu, Yawen Li:
Spatio-temporal super-resolution reconstruction based on robust optical flow and Zernike moment for dynamic image sequences. ISIE 2013: 1-6 - 2012
- [j6]Xiaoyong Li
, Feng Zhou, Xudong Yang:
Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management. IEEE Trans. Parallel Distributed Syst. 23(10): 1944-1957 (2012) - [c3]Cheng Chen, Xiaoyong Li
, Zhongying Bai:
A BPNN-based dynamic trust predicting model for distributed systems. IC-NIDC 2012: 601-605 - 2011
- [j5]Xiaoyong Li
, Feng Zhou:
Pg-Trust: a Self-Adaptive and Scalable Trust Computing Model for Large-Scale Peer-to-Peer Grid Computing. Int. J. Softw. Eng. Knowl. Eng. 21(5): 667-692 (2011) - [j4]Xiaoyong Li
, Feng Zhou, Xudong Yang:
Research on Trust Prediction Model for Selecting Web Services Based on Multiple Decision Factors. Int. J. Softw. Eng. Knowl. Eng. 21(8): 1075-1096 (2011) - [j3]Xiaoyong Li
, Feng Zhou, Xudong Yang:
A multi-dimensional trust evaluation model for large-scale P2P computing. J. Parallel Distributed Comput. 71(6): 837-847 (2011)
2000 – 2009
- 2009
- [j2]Xiaoyong Li
, Xiaolin Gui:
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments. Int. J. Comput. Appl. Technol. 36(3/4): 297-307 (2009) - [j1]Xiaoyong Li
, Xiaolin Gui:
A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks. J. Comput. Sci. Technol. 24(5): 868-882 (2009) - 2007
- [c2]Xiaoyong Li
, Xiaolin Gui:
engineering trusted P2P system with fast reputation aggregating mechanism. ROBIO 2007: 2007-2012 - 2006
- [c1]Xiaoyong Li
, Xiaolin Gui:
Merging Source and Shared Trees Multicast in MPLS Networks. PDCAT 2006: 23-28
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 20:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint