default search action
Lili Xu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Li Mao, Lili Xu, Gumuyang Zhang, Hao Sun, Xiuli Li:
Exploring multi-b-value diffusion-weighted imaging for more accurate prostate segmentation and uncertainty estimation. Biomed. Signal Process. Control. 89: 105684 (2024) - [j71]Houfu Peng, Xing Lu, Lili Xu, Daoxun Xia, Xiaoyao Xie:
Parameter instance learning with enhanced vision transformers for aerial person re-identification. Concurr. Comput. Pract. Exp. 36(12) (2024) - [j70]Arya Adesh, G. Shobha, Jyoti Shetty, Lili Xu:
Local outlier factor for anomaly detection in HPCC systems. J. Parallel Distributed Comput. 192: 104923 (2024) - [j69]Xia Li, Xiaobiao Mo, Cheng Zhang, Qing Wang, Lili Xu, Ze Ren, Gregory W. McCarty, Baoshan Cui:
Unraveling the Impacts of River Network Connectivity on Ecological Quality Dynamics at a Basin Scale. Remote. Sens. 16(13): 2370 (2024) - [j68]Lili Xu, Lin Wang, Minmin Zhu:
Application of BIM Technology in Structural Design of Prefabricated Building Based on Big Data Simulation Modeling Analysis. Scalable Comput. Pract. Exp. 25(4): 2862-2875 (2024) - [j67]Li Wang, Yumeng Yang, Lili Xu, Ziyu Ren, Shurui Fan, Yong Zhang:
A particle swarm optimization-based deep clustering algorithm for power load curve analysis. Swarm Evol. Comput. 89: 101650 (2024) - [j66]Lili Xu, Jiansha Lu, Yan Zhan:
Scheduling Optimization of Compound Operations in Autonomous Vehicle Storage and Retrieval System. Symmetry 16(2): 168 (2024) - [j65]Xingyu Cui, Yong Li, Lili Xu:
Deep Neural Network with a Characteristic Analysis for Seal Stroke Recognition. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(11): 152:1-152:22 (2024) - [c36]Yakun Wang, Lili Xu, Liangze Mo:
Research on the Market Structure Visualization of Chinese High-Liquidity Equity ETFs Based on the Affinity Propagation Algorithm. ICMLC 2024: 511-516 - 2023
- [j64]Xingyu Cui, Yong Li, Lili Xu:
Adaptive Extension Fitting Scheme: An Effective Curve Approximation Method Using Piecewise Bézier Technology. IEEE Access 11: 58422-58435 (2023) - [j63]Qing-Wei Chai, Wei-Min Zheng, Lili Xu, Lyuchao Liao:
A Novel ECG Noise Reduction Technique Employing the Chaotic Adaptive Fish Migration Optimization Algorithm. IEEE Access 11: 118037-118047 (2023) - [j62]Lili Xu, Houfu Peng, Xing Lu, Daoxun Xia:
Learning to generalize aerial person re-identification using the meta-transfer method. Concurr. Comput. Pract. Exp. 35(12) (2023) - [j61]Yubin Yang, Lili Xu, Xuejian Chu, Ruiqi Pang, Zunli Zhang:
Research on financing availability of small and micro logistics enterprises in China. Int. J. Appl. Decis. Sci. 16(5): 587-612 (2023) - [j60]Haojie Liu, Lili Xu, Xingyu Tian, Houfu Peng, Daoxun Xia:
Visible-Thermal Person Reidentification in Visual Internet of Things With Random Gray Data Augmentation and a New Pooling Mechanism. IEEE Internet Things J. 10(10): 9022-9037 (2023) - [j59]Lili Xu, Binjie Chen, Chenhao Huang, Mengmeng Zhou, Shucheng You, Fangming Jiang, Weirong Chen, Jinsong Deng:
Identifying PM2.5-Related Health Burden in the Context of the Integrated Development of Urban Agglomeration Using Remote Sensing and GEMM Model. Remote. Sens. 15(11): 2770 (2023) - [j58]Lili Xu, Tianyu Chen, Baolin Li, Yecheng Yuan, Nandin-Erdene Tsendbazar:
Spatiotemporal Evolution of Arid Ecosystems Using Thematic Land Cover Products. Remote. Sens. 15(12): 3178 (2023) - [j57]Lili Xu, Jizu Li, Ding Feng:
Miner Fatigue Detection from Electroencephalogram-Based Relative Power Spectral Topography Using Convolutional Neural Network. Sensors 23(22): 9055 (2023) - [c35]He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo:
Splendor: Static Detection of Stored XSS in Modern Web Applications. ISSTA 2023: 1043-1054 - [c34]Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo:
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. RAID 2023: 412-425 - 2022
- [j56]Lili Xu, Yalong Xue, Xiangdong Xie, Qifa Lin:
Dynamic Behaviors of an Obligate Commensal Symbiosis Model with Crowley-Martin Functional Responses. Axioms 11(6): 298 (2022) - [j55]Lili Xu, Yalong Xue, Qifa Lin, Chaoquan Lei:
Global Attractivity of Symbiotic Model of Commensalism in Four Populations with Michaelis-Menten Type Harvesting in the First Commensal Populations. Axioms 11(7): 337 (2022) - [j54]Teng Long, Qi Gao, Lili Xu, Zhangbing Zhou:
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions. Comput. Secur. 121: 102847 (2022) - [j53]Lili Xu, C. L. Philip Chen, Ruizhi Han:
Graph-based sparse bayesian broad learning system for semi-supervised learning. Inf. Sci. 597: 193-210 (2022) - [j52]Lili Xu, Lilei Wen:
Application Research of Deep Learning Technology in Natural Landscape Animation Design. J. Sensors 2022: 1-10 (2022) - [j51]Lili Xu, C. L. Philip Chen, Feng Qing, Xingmin Meng, Yan Zhao, Tianjun Qi, Tianyao Miao:
Graph-Represented Broad Learning System for Landslide Susceptibility Mapping in Alpine-Canyon Region. Remote. Sens. 14(12): 2773 (2022) - [c33]Lili Xu, Houfu Peng, Linna Wang, Daoxun Xia:
Meta-transfer Learning for Person Re-identification in Aerial Imagery. ChineseCSCW (2) 2022: 634-644 - [c32]Qing Sun, Lili Xu, Yang Xiao, Feng Li, He Su, Yiming Liu, Hongyun Huang, Wei Huo:
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis. ICSME 2022: 329-339 - [c31]He Su, Lili Xu, Huina Chao, Feng Li, Zimu Yuan, Jianhua Zhou, Wei Huo:
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs. ISSRE 2022: 355-365 - 2021
- [j50]Daoxun Xia, Haojie Liu, Lili Xu, Jiawen Li, Linna Wang:
Self-training with one-shot stepwise learning method for person re-identification. Concurr. Comput. Pract. Exp. 33(17) (2021) - [j49]Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo:
B2SMatcher: fine-Grained version identification of open-Source software in binary files. Cybersecur. 4(1): 21 (2021) - [j48]Daoxun Xia, Haojie Liu, Lili Xu, Linna Wang:
Visible-infrared person re-identification with data augmentation via cycle-consistent adversarial network. Neurocomputing 443: 35-46 (2021) - [j47]Flavio Villanustre, Arjuna Chala, Roger Dev, Lili Xu, Jesse Shaw, Borko Furht, Taghi M. Khoshgoftaar:
Modeling and tracking Covid-19 cases using Big Data analytics on HPCC system platformm. J. Big Data 8(1): 33 (2021) - [j46]Murtadha D. Hssayeni, Arjuna Chala, Roger Dev, Lili Xu, Jesse Shaw, Borko Furht, Behnaz Ghoraani:
The forecast of COVID-19 spread risk at the county level. J. Big Data 8(1): 99 (2021) - [j45]Lili Xu, Feng Liu, Xuejian Chu:
The credit analysis of transportation capacity supply chain finance based on core enterprise credit radiation. J. Intell. Fuzzy Syst. 40(6): 10811-10824 (2021) - [j44]Lili Xu:
Face Reconstruction Based on Multiscale Feature Fusion and 3D Animation Design. Mob. Inf. Syst. 2021: 3737189:1-3737189:10 (2021) - [j43]Fan Wu, Xiong Li, Lili Xu, Pandi Vijayakumar, Neeraj Kumar:
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion. IEEE Syst. J. 15(1): 1120-1129 (2021) - [j42]Shuang Feng, C. L. Philip Chen, Lili Xu, Zhulin Liu:
On the Accuracy-Complexity Tradeoff of Fuzzy Broad Learning System. IEEE Trans. Fuzzy Syst. 29(10): 2963-2974 (2021) - [c30]Dongjun Li, Guoying Meng, Zhiyuan Sun, Lili Xu, Wei Cui:
Weight Estimation Method of Coal and Gangue on Conveyor Belt Based on Instance Segmentation. AIAM (IEEE) 2021: 432-435 - [c29]Lili Xu:
Mathematical Modeling into the Teaching Method of Higher Mathematics Courses in Application-Oriented Universities under the Epidemic Situation. CIPAE 2021: 652-655 - [c28]Jiabin Wu, Lili Xu, Hexiang Zheng, Xuesong Cao, Haiyuan Lu:
Spatiotemporal Assessment of Evapotranspiration of Desert Steppe in Northern China: A Case of OTOG Front Banner. IGARSS 2021: 6347-6350 - 2020
- [j41]Lili Xu, C. L. Philip Chen, Ruizhi Han:
Sparse Bayesian Broad Learning System for Probabilistic Estimation of Prediction. IEEE Access 8: 56267-56280 (2020) - [j40]Weihua Su, Dingxin Wang, Lili Xu, Shouzhen Zeng, Chonghui Zhang:
A Nonradial Super Efficiency DEA Framework Using a MCDM to Measure the Research Efficiency of Disciplines at Chinese Universities. IEEE Access 8: 86388-86399 (2020) - [j39]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Dingbao Lin, Joel J. P. C. Rodrigues:
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. des Télécommunications 75(7-8): 307-317 (2020) - [j38]Quanxi Feng, Huazhou Chen, Hai Xie, Ken Cai, Bin Lin, Lili Xu:
A Novel Genetic Algorithm-Based Optimization Framework for the Improvement of Near-Infrared Quantitative Calibration Models. Comput. Intell. Neurosci. 2020: 7686724:1-7686724:10 (2020) - [j37]Yue Fan, Tianyu Li, Lili Xu, Tiantao Kuang, Lei Chen:
Comprehensive Analysis of Immunoinhibitors Identifies LGALS9 and TGFBR1 as Potential Prognostic Biomarkers for Pancreatic Cancer. Comput. Math. Methods Medicine 2020: 6138039:1-6138039:13 (2020) - [j36]Fan Wu, Xiong Li, Lili Xu, Saru Kumari:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - [j35]Lili Xu, Mingjie Xu, Feng Li, Wei Huo:
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. Cybersecur. 3(1): 1-19 (2020) - [j34]Lili Xu, Sunjie Zhang, Licheng Wang:
Distributed resilient filtering of large-scale systems with channel scheduling. Kybernetika 56(1): 170-188 (2020) - [j33]Xiaoying Wang, Yuke Zhou, Rihong Wen, Chenghu Zhou, Lili Xu, Xi Xi:
Mapping Spatiotemporal Changes in Vegetation Growth Peak and the Response to Climate and Spring Phenology over Northeast China. Remote. Sens. 12(23): 3977 (2020) - [c27]Matthias Murray, Arjuna Chala, Lili Xu, Roger Dev:
Large Scale Financial Filing Analysis on HPCC Systems. IEEE BigData 2020: 4429-4436 - [c26]Lili Xu, C. L. Philip Chen:
Comparison and Combination of Activation Functions in Broad Learning System. SMC 2020: 3537-3542
2010 – 2019
- 2019
- [j32]Dongjun Li, Zhenxin Zhang, Zhihua Xu, Lili Xu, Guoying Meng, Zhen Li, Siyun Chen:
An Image-Based Hierarchical Deep Learning Framework for Coal and Gangue Detection. IEEE Access 7: 184686-184699 (2019) - [j31]Hengnian Qi, Kai Fang, Xiaoping Wu, Lili Xu, Qing Lang:
Human activity recognition method based on molecular attributes. Int. J. Distributed Sens. Networks 15(4) (2019) - [j30]Xiong Li, Fan Wu, Saru Kumari, Lili Xu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j29]Lili Xu, Hong Li, Jin Li:
基于灰色预测和径向基网络的人口预测研究 (Research on Population Prediction Based on Grey Prediction and Radial Basis Function Network). 计算机科学 46(6A): 431-435 (2019) - [j28]Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat:
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 13(3): 2830-2838 (2019) - [j27]Huazhou Chen, Hanli Qiao, Lili Xu, Quanxi Feng, Ken Cai:
A Fuzzy Optimization Strategy for the Implementation of RBF LSSVR Model in Vis-NIR Analysis of Pomelo Maturity. IEEE Trans. Ind. Informatics 15(11): 5971-5979 (2019) - [c25]Ye Liang, Lili Xu, Tianhao Huang:
Sentiment Tendency Analysis of NPC&CPPCC in German News. WISA 2019: 298-308 - [c24]Lili Xu, Xiuling He, Jing Zhang, Yangyang Li:
Automatic Classification of Discourse in Chinese Classroom Based on Multi-feature Fusion. CITS 2019: 1-5 - [c23]Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, Wei Huo:
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches. DSN 2019: 605-616 - [c22]Huiqin Wei, Long Chen, Lili Xu:
Tensor Decomposition for Poisson Image Denoising. iFUZZY 2019: 158-162 - 2018
- [j26]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Arun Kumar Sangaiah:
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68: 107-118 (2018) - [j25]Fan Wu, Xiong Li, Lili Xu, Arun Kumar Sangaiah, Joel J. P. C. Rodrigues:
Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices. IEEE Consumer Electron. Mag. 7(6): 38-44 (2018) - [j24]Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j23]Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j22]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j21]Lili Xu, Yihong Dong, Jianfei Pan, Huahui Chen:
面向复杂网络的图稀疏算法综述 (Survey of Graph Sparsification Algorithms for Complex Networks). 计算机科学 45(5): 24-30 (2018) - [j20]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 11(1): 1-20 (2018) - [c21]Lili Xu, Weilian Kong, Yinghui Wang, Xiaofeng Sun, Xuezhong Zhou, Runshun Zhang, Yanxing Xue, Weibin Wang:
Discovery of Xuantoujiedu Decoction and its Molecular Mechanisms Using Integrated Network Analysis. BIBM 2018: 1934-1940 - [c20]Mingjie Xu, Shengnan Li, Lili Xu, Feng Li, Wei Huo, Jing Ma, Xinhua Li, Qingjia Huang:
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. Inscrypt 2018: 404-423 - [c19]Ke Zhan, Lili Xu, Zimu Yuan, Weijuan Zhang:
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 525-532 - 2017
- [j19]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j18]Tong Yu, Jinghua Li, Qi Yu, Ye Tian, Xiaofeng Shun, Lili Xu, Ling Zhu, Hongjie Gao:
Knowledge graph for TCM health preservation: Design, construction, and applications. Artif. Intell. Medicine 77: 48-52 (2017) - [j17]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Marimuthu Karuppiah, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j16]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1): 101-116 (2017) - [j15]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j14]Hong Li, Lili Xu, Jin Li:
基于MATLAB遗传算法的优化断路器温控工艺 (Optimizing Circuit Breaker Temperature Control Technique Based on GA Toolbox of MATLAB). 计算机科学 44(Z11): 557-560 (2017) - [j13]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim. Syst. 23(2): 195-205 (2017) - [j12]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1): 16-30 (2017) - [c18]Lili Xu, Edin Muharemagic, Amy W. Apon:
ECL-watch: A big data application performance tuning tool in the HPCC systems platform. IEEE BigData 2017: 2941-2950 - [c17]Michael Dominik Görtz, Roland Kühn, Oliver Zietek, Roman Bernhard, Michael Bulinski, Dennis Duman, Benedikt Freisen, Uwe Jentsch, Tobias Klöppner, Dragana Popovic, Lili Xu:
Energy Efficiency of a Low Power Hardware Cluster for High Performance Computing. GI-Jahrestagung 2017: 2537-2548 - [c16]Tong Yu, Jinghua Li, Qi Yu, Ye Tian, Zongyou Li, Yinghui Wang, Xiaofeng Sun, Lili Xu, Ling Zhu:
Research on the construction of knowledge service platform for TCM health preservation. Healthcom 2017: 1-6 - [c15]Fan Wu, Lili Xu:
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing. ICCCS (2) 2017: 189-200 - [c14]Lili Xu, Guangming Yu, Zhenfa Tu, Yuke Zhou:
Profile human-induced vegetation change in ArHorqin banner of China using time series datasets. IGARSS 2017: 1107-1110 - [c13]Yuke Zhou, Shuli Niu, Lili Xu, Xizhang Gao:
Spatial analysis of growing season peak control over gross primary production in northern ecosystems using modis-GPP dataset. IGARSS 2017: 6221-6224 - 2016
- [j11]Lili Xu, Baolin Li, Yecheng Yuan, Xizhang Gao, Tao Zhang, Qingling Sun:
Detecting Different Types of Directional Land Cover Changes Using MODIS NDVI Time Series Dataset. Remote. Sens. 8(6): 495 (2016) - [j10]Lili Xu, Fan Wu:
A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. Secur. Commun. Networks 9(16): 3428-3443 (2016) - [j9]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks 9(16): 3527-3542 (2016) - 2015
- [b1]Lili Xu:
Formal Verification of Differential Privacy in Concurrent Systems. (Ve'rification formelle de la vie prive'e dans les systèmes concurrents). École Polytechnique, Palaiseau, France, 2015 - [j8]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45: 274-285 (2015) - [j7]Fan Wu, Lili Xu:
An improved and provable self-certified digital signature scheme with message recovery. Int. J. Commun. Syst. 28(2): 344-357 (2015) - [j6]Lili Xu, Fan Wu:
Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care. J. Medical Syst. 39(2): 10 (2015) - [j5]Lili Xu, Baolin Li, Yecheng Yuan, Xizhang Gao, Tao Zhang:
A Temporal-Spatial Iteration Method to Reconstruct NDVI Time Series Datasets. Remote. Sens. 7(7): 8906-8924 (2015) - [j4]Lili Xu, Fan Wu:
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Networks 8(2): 245-260 (2015) - [j3]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Abdulhameed Alelaiwi:
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur. Commun. Networks 8(18): 3847-3863 (2015) - [c12]Lili Xu, Baolin Li, Yecheng Yuan, Tao Zhang:
A novel method to reconstruct normalized difference vegetation index time series based on temporal-spatial iteration estimation. IGARSS 2015: 1654-1657 - 2014
- [c11]Lili Xu, Kun Wang, Zhiyou Ouyang, Xin Qi:
An improved binary PSO-based task scheduling algorithm in green cloud computing. ChinaCom 2014: 126-131 - [c10]Qiang Li, Kun Wang, Suwei Wei, Xuefeng Han, Lili Xu, Min Gao:
A data placement strategy based on clustering and consistent hashing algorithm in cloud computing. ChinaCom 2014: 478-483 - [c9]Konstantinos Chatzikokolakis, Daniel Gebler, Catuscia Palamidessi, Lili Xu:
Generalized Bisimulation Metrics. CONCUR 2014: 32-46 - [c8]Lili Xu, Konstantinos Chatzikokolakis, Huimin Lin:
Metrics for Differential Privacy in Concurrent Systems. FORTE 2014: 199-215 - 2013
- [j2]Lili Xu, Shanglin Zhou, Kunqian Yu, Bo Gao, Hualiang Jiang, Xuechu Zhen, Wei Fu:
Molecular Modeling of the 3D Structure of 5-HT1AR: Discovery of Novel 5-HT1AR Agonists via Dynamic Pharmacophore-Based Virtual Screening. J. Chem. Inf. Model. 53(12): 3202-3211 (2013) - [c7]Lili Xu, Hong Zhang:
An improved SFMEA method integrated with assistive techniques. ISSRE (Supplemental Proceedings) 2013: 343-348 - [c6]Chenchen Zhao, Lili Xu, Fule Li, Zhihua Wang:
An efficient calibration technique for pipeline ADC. MWSCAS 2013: 669-672 - [c5]Hong Zhang, Lili Xu:
Application of Software Safety Analysis Using Event-B. SERE (Companion) 2013: 137-144 - 2012
- [j1]Fan Wu, Lili Xu:
Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(4): 9958 (2012) - [c4]Lili Xu:
Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. TGC 2012: 198-212 - 2010
- [c3]Zhong Wei, Lili Xu, Cheng Wei:
A Research of PBL Platform for E-education Based on Embedded Recording and Broadcasting System. ICEE 2010: 1994-1997
2000 – 2009
- 2009
- [c2]Yibo Li, Lili Xu, Hui Piao:
Semi-automatic Road Extraction from High-Resolution Remote Sensing Image: Review and Prospects. HIS (1) 2009: 204-209 - 2003
- [c1]Carmen M. Pancerella, John C. Hewson, Wendy S. Koegler, David Leahy, Michael Lee, Larry A. Rahn, Christine L. Yang, James D. Myers, Brett T. Didier, Renata McCoy, Karen Schuchardt, Eric G. Stephan, Theresa L. Windus, Kaizar Amin, Sandra Bittner, Carina Lansing, Michael Minkoff, Sandeep Nijsure, Gregor von Laszewski, Reinhardt Pinzon, Branko Ruscic, Al Wagner, Baoshan Wang, William Pitz, Yen-Ling Ho, David Montoya, Lili Xu, Thomas C. Allison, William H. Green Jr., Michael Frenklach:
Metadata in the Collaboratory for Multi-Scale Chemical Science. Dublin Core Conference 2003: 121-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint