default search action
Lixia Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Lixia Xie, Bingdi Yuan, Hongyu Yang, Ze Hu, Laiwei Jiang, Liang Zhang, Xiang Cheng:
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping. Comput. Stand. Interfaces 89: 103829 (2024) - 2023
- [c16]Lixia Xie, Yange Li, Hongyu Yang, Peng Wang, Ze Hu, Xiang Cheng, Liang Zhang:
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement. Inscrypt (1) 2023: 418-432 - 2022
- [j11]Hongyu Yang, Zixin Zhang, Lixia Xie, Liang Zhang:
Network security situation assessment with network attack behavior classification. Int. J. Intell. Syst. 37(10): 6909-6927 (2022) - [c15]Lixia Xie, Xueou Li, Hongyu Yang, Liang Zhang:
A Multi-stage APT Attack Detection Method Based on Sample Enhancement. CSS 2022: 209-216 - [c14]Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
A Defect Level Assessment Method Based on Weighted Probability Ensemble. CSS 2022: 293-300 - [c13]Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
A Defect Heterogeneous Risk Assessment Method with Misclassification Cost. SocialSec 2022: 281-293 - [c12]Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
DRICP: Defect Risk Identification Using Sample Category Perception. TrustCom 2022: 441-448 - 2021
- [c11]Lixia Xie, Honghong Sun, Hongyu Yang, Liang Zhang:
Comprehensive Degree Based Key Node Recognition Method in Complex Networks. ICICS (1) 2021: 348-367 - 2020
- [j10]Lixia Xie, Ying Ding, Hongyu Yang, Ze Hu:
Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection. J. Netw. Comput. Appl. 164: 102690 (2020) - [j9]Lixia Xie, Huiyu Ni, Hongyu Yang, Jiyong Zhang:
A Key Business Node Identification Model for Internet of Things Security. Secur. Commun. Networks 2020: 6654283:1-6654283:11 (2020) - [j8]Lixia Xie, Liping Yan, Xugao Zhang, Hongyu Yang:
A Security Situation Assessment Model of Information System for Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2020: 8886516:1-8886516:11 (2020) - [c10]Lixia Xie, Liping Yan, Guangquan Xu, Jiyong Zhang:
Analysis Model of Node Failures and Impact for AANET. FCS 2020: 55-64 - [c9]Lixia Xie, Huiyu Ni, Guangquan Xu, Jiyong Zhang:
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method. FCS 2020: 643-653
2010 – 2019
- 2019
- [j7]Lixia Xie, Ying Ding, Hongyu Yang, Xinmu Wang:
Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs. IEEE Access 7: 56656-56666 (2019) - [c8]Lixia Xie, Ying Ding, Hongyu Yang:
Mitigating Link-Flooding Attack with Segment Rerouting in SDN. CSS (1) 2019: 57-69 - 2018
- [j6]Xiao-Chen Hao, Lixia Xie, Jinshuo Liu, Bai Chen, Ning Yao, Liyuan Wang:
Topology Control Algorithm and Channel Allocation Algorithm Based on Load Balancing in Wireless Sensor Network. Ad Hoc Sens. Wirel. Networks 40(3-4): 191-216 (2018) - [j5]Lixia Xie, Ziying Wang, Yue Wang, Hongyu Yang, Jiyong Zhang:
New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms. Sensors 18(9): 3047 (2018) - [c7]Lixia Xie, Ruixin Wei, Yuguang Ning, Hongyu Yang:
Dynamic Risk Access Control Model for Cloud Platform. ICCCS (3) 2018: 12-22 - 2017
- [j4]Yali Wu, Ge Liu, Xiaoping Guo, Yuhui Shi, Lixia Xie:
A self-adaptive chaos and Kalman filter-based particle swarm optimization for economic dispatch problem. Soft Comput. 21(12): 3353-3365 (2017) - 2016
- [j3]Lixia Xie, Fukuan Bo, Binbin Zhao:
虚拟分组撤销策略的云存储访问控制模型 (Virtual Group Revocation Policy-based Cloud Storage Access Control Model). 计算机科学 43(5): 122-126 (2016) - [c6]Yali Wu, Lixia Xie, Qing Liu:
Multi-objective Brain Storm Optimization Based on Estimating in Knee Region and Clustering in Objective-Space. ICSI (1) 2016: 479-490 - 2015
- [c5]Xiaoping Guo, Yali Wu, Lixia Xie, Shi Cheng, Jing Xin:
An Adaptive Brain Storm Optimization Algorithm for Multiobjective Optimization Problems. ICSI (1) 2015: 365-372 - 2014
- [c4]Lixia Xie, Yali Wu:
A Modified Multi-Objective Optimization Based on Brain Storm Optimization Algorithm. ICSI (2) 2014: 328-339 - [c3]Xiaoping Guo, Yali Wu, Lixia Xie:
Modified Brain Storm Optimization Algorithm for Multimodal Optimization. ICSI (2) 2014: 340-351 - 2013
- [j2]Lixia Xie, Xiao Zhang, Jiyong Zhang:
Network Security Risk Assessment Based on Attack Graph. J. Comput. 8(9): 2339-2347 (2013) - [j1]Lixia Xie, Yanxin Yan, Jiyong Zhang:
Research on Security Evaluation of XML Communication Protocol. J. Softw. 8(6): 1428-1435 (2013) - [c2]Feng Xie, Lixia Xie:
Using information theory to measure call site information of system call in anomaly detection. ICCT 2013: 6-10
2000 – 2009
- 2008
- [c1]Hongyu Yang, Lixia Xie, Feng Xie:
A New Approach to Network Anomaly Attack Detection. FSKD (4) 2008: 317-321
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint