default search action
Xuehui Du
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Xiangyu Wu, Xuehui Du, Qiantao Yang, Aodi Liu, Wenjuan Wang:
Dynamic fine-grained access control for smart contracts based on improved attribute-based signature. J. Supercomput. 81(1): 44 (2025) - 2024
- [j34]Ruoxi Qin, Linyuan Wang, Xuehui Du, Jian Chen, Xingyuan Chen, Bin Yan:
Adversarial robust decision-making under uncertainty learning and dynamic ensemble selection. Eng. Appl. Artif. Intell. 135: 108653 (2024) - [j33]Dibin Shan, Xuehui Du, Wenjuan Wang, Na Wang, Aodi Liu:
KPI-HGNN: Key provenance identification based on a heterogeneous graph neural network for big data access control. Inf. Sci. 659: 120059 (2024) - [j32]Xiangyu Wu, Xuehui Du, Qiantao Yang, Na Wang, Wenjuan Wang:
Redactable consortium blockchain based on verifiable distributed chameleon hash functions. J. Parallel Distributed Comput. 183: 104777 (2024) - [c13]Liu Zhang, Xuehui Du, Aodi Liu:
Image data confirmation method based on security watermarking and blockchain. CNIOT 2024 - 2023
- [j31]Yuanzhao Gao, Xingyuan Chen, Binglong Li, Xuehui Du:
A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs. IEEE Access 11: 80806-80821 (2023) - [j30]Ruoxi Qin, Linyuan Wang, Xuehui Du, Shuxiao Ma, Xingyuan Chen, Bin Yan:
An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness. Appl. Intell. 53(10): 11636-11653 (2023) - [j29]Ruoxi Qin, Linyuan Wang, Xuehui Du, Pengfei Xie, Xingyuan Chen, Bin Yan:
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model. Frontiers Neurorobotics 17 (2023) - [j28]Qiantao Yang, Xuehui Du, Aodi Liu, Na Wang, Wenjuan Wang, Xiangyu Wu:
AdaSTopk: Adaptive federated shuffle model based on differential privacy. Inf. Sci. 642: 119186 (2023) - [j27]Feng Li, Xuehui Du, Liu Zhang, Aodi Liu:
Image Feature Fusion Method Based on Edge Detection. Inf. Technol. Control. 52(1): 5-24 (2023) - [j26]Xiangyu Wu, Xuehui Du, Qiantao Yang, Aodi Liu, Na Wang, Wenjuan Wang:
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level. J. Syst. Archit. 141: 102925 (2023) - [j25]Lifeng Cao, Shoucai Zhao, Zhensheng Gao, Xuehui Du:
Cross-chain data traceability mechanism for cross-domain access. J. Supercomput. 79(5): 4944-4961 (2023) - [i2]Ruoxi Qin, Linyuan Wang, Xuehui Du, Xingyuan Chen, Bin Yan:
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness. CoRR abs/2308.00346 (2023) - 2022
- [j24]Wenjuan Wang, Xuehui Du, Dibin Shan, Ruoxi Qin, Na Wang:
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine. IEEE Trans. Cloud Comput. 10(3): 1634-1646 (2022) - [c12]Jiashun Zhou, Na Wang, Aodi Liu, Xuehui Du:
FAVT: A Feature-Anchored Video Data Trading Mechanism. DSC 2022: 275-282 - [c11]Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang:
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. SP 2022: 2114-2129 - 2021
- [j23]Zhao Zhang, Zhi Yang, Xuehui Du, Wenfa Li, Xingyuan Chen, Lei Sun:
Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines. IEEE Access 9: 15156-15169 (2021) - [j22]Zhanhui Yuan, Wenfa Li, Zhi Yang, Lei Sun, Xuehui Du, Hongqi Zhang:
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification. Secur. Commun. Networks 2021: 2481818:1-2481818:22 (2021) - [j21]Aodi Liu, Xuehui Du, Na Wang:
Efficient Access Control Permission Decision Engine Based on Machine Learning. Secur. Commun. Networks 2021: 3970485:1-3970485:11 (2021) - [c10]Yang Yang, Xuehui Du, Zhi Yang:
PRADroid: Privacy Risk Assessment for Android Applications. CSP 2021: 90-95 - [i1]Ruoxi Qin, Linyuan Wang, Xingyuan Chen, Xuehui Du, Bin Yan:
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model. CoRR abs/2105.02803 (2021) - 2020
- [j20]Yuanzhao Gao, Xingyuan Chen, Xuehui Du:
A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model. IEEE Access 8: 38742-38752 (2020) - [j19]Xin Lu, Lifeng Cao, Xuehui Du:
Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition. IEEE Access 8: 162548-162568 (2020) - [j18]Zhuo Yi, Ying Liao, Xuehui Du, Xin Lu, Lifeng Cao:
HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony. Int. J. Distributed Sens. Networks 16(3) (2020) - [j17]Yi Sun, Qian Liu, Xingyuan Chen, Xuehui Du:
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3295-3310 (2020) - [c9]Shaozhuo Li, Na Wang, Xuehui Du, Xuan Li:
Supervisable Anonymous Management of Digital Certificates for Blockchain PKI. ICPCSEE (1) 2020: 130-144
2010 – 2019
- 2019
- [j16]Wenjuan Wang, Xuehui Du, Na Wang:
Building a Cloud IDS Using an Efficient Feature Selection Method and SVM. IEEE Access 7: 1345-1354 (2019) - [j15]Aodi Liu, Xuehui Du, Na Wang:
Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network. IEEE Access 7: 43031-43041 (2019) - [j14]Chencheng Ma, Xuehui Du, Lifeng Cao:
Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection. IEEE Access 7: 148363-148380 (2019) - [j13]Xianguang Lu, Xuehui Du, Wenjuan Wang:
基于改进FP growth的告警关联算法 (Alert Correlation Algorithm Based on Improved FP Growth). 计算机科学 46(8): 64-70 (2019) - [j12]Zezhi Wu, Xingyuan Chen, Zhi Yang, Xuehui Du:
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model. IEEE Trans. Inf. Forensics Secur. 14(9): 2427-2440 (2019) - [c8]Zhuo Yi, Xuehui Du, Ying Liao, Xin Lu:
An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network. CommNet 2019: 1-9 - [c7]Xin Lu, Lifeng Cao, Xuehui Du, Zhanbing Zhu:
Business-Oriented Dynamic Reconfiguration Model of Cloud Computing Network. ICPCSEE (2) 2019: 225-245 - [c6]Shaozhuo Li, Na Wang, Xuehui Du, Aodi Liu:
Internet Web Trust System Based on Smart Contract. ICPCSEE (1) 2019: 295-311 - 2018
- [j11]Yan Yang, Xingyuan Chen, Hao Chen, Xuehui Du:
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing. IEEE Access 6: 18009-18021 (2018) - [j10]Zezhi Wu, Xingyuan Chen, Xuehui Du, Zhi Yang:
CDroid: practically implementation a formal-analyzed CIFC model on Android. Comput. Secur. 78: 231-244 (2018) - [c5]Xin Lu, Lifeng Cao, Xuehui Du, Zhiyan Hu:
A Tag-Based Protection Method for Multi-tenant Data Security. ICCCS (2) 2018: 553-565 - [c4]Yuanyan Luo, Xuehui Du, Yi Sun:
Data streams anomaly detection algorithm based on self-set threshold. ICCIP 2018: 18-26 - 2017
- [j9]Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:
Dynamic authenticated data structures with access control for outsourcing data stream. IET Inf. Secur. 11(5): 235-242 (2017) - [j8]Zhuo Yi, Xuehui Du, Ying Liao, Lifeng Cao:
A quality-of-service-aware dynamic evolution model for space-ground integrated network. Int. J. Distributed Sens. Networks 13(8) (2017) - [j7]Wenjuan Wang, Xuehui Du, Na Wang, Dibin Shan:
云计算安全审计技术研究综述 (Review on Security Audit Technology for Cloud Computing). 计算机科学 44(7): 16-20 (2017) - [j6]Yuanzhi Du, Xuehui Du, Zhi Yang:
基于混合流策略的按需分布式云信息流控制模型 (Mixed Flow Policy Based On-demand Distributed Cloud Information Flow Control Model). 计算机科学 44(10): 150-158 (2017) - 2016
- [j5]Cheng Lei, Hongqi Zhang, Yi Sun, Xuehui Du, Xudong Jia:
Multilayer collaborative traceback technique based on net-flow fingerprint. Int. J. Embed. Syst. 8(1): 1-11 (2016) - [c3]Zhuo Yi, Xuehui Du, Ying Liao, Lifeng Cao:
A Trust Holding Based Secure Seamless Handover in Space Information Network. SINC 2016: 137-150 - 2015
- [j4]Liang Chen, Xingyuan Chen, Yi Sun, Xuehui Du:
基于结构路径的恶意PDF文档检测 (Detection of Malicious PDF Based on Structural Path). 计算机科学 42(2): 90-94 (2015) - [j3]Yingbin Su, Xuehui Du, Chuntao Xia, Lifeng Cao, Huacheng Chen:
基于半监督聚类的文档敏感信息推导方法 (Sensitive Information Inference Method Based on Semi-supervised Document Clustering). 计算机科学 42(10): 132-137 (2015) - [j2]Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:
可验证授权计算研究综述 (Survey on Verifiable Delegation of Computation). 计算机科学 42(11): 1-7 (2015) - 2013
- [j1]Yi Sun, Xingyuan Chen, Xuehui Du:
An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure. J. Comput. 8(11): 2851-2856 (2013)
2000 – 2009
- 2009
- [c2]Daowen Hua, Xuehui Du, Yanbin Qian, Shaoge Yan:
A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control. CIS (2) 2009: 397-401 - 2008
- [c1]Yanbin Qian, Xingyuan Chen, Xuehui Du, Hongqi Zhang:
Layered Secure Access Research for Space Network. ISCSCT (1) 2008: 307-311
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint