default search action
Xinli Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Siyuan Meng, Jie Zhou, Xuxin Chen, Yufei Liu, Fengyuan Lu, Xinli Huang:
Structure-Information-Based Reasoning over the Knowledge Graph: A Survey of Methods and Applications. ACM Trans. Knowl. Discov. Data 18(8): 210:1-210:42 (2024) - [c24]Baiqi Li, Yedi Ma, Yufei Liu, Hongyan Gu, Zhenghan Chen, Xinli Huang:
Federated Learning on Distributed Graphs Considering Multiple Heterogeneities. ICASSP 2024: 5140-5144 - [c23]Yuxing Zhang, Siyuan Meng, Chunchun Chen, Mengyao Peng, Hongyan Gu, Xinli Huang:
LinkThief: Combining Generalized Structure Knowledge with Node Similarity for Link Stealing Attack against GNN. ACM Multimedia 2024: 4947-4956 - [c22]Hongyan Gu, Xinyi Zhang, Jiang Li, Hui Wei, Baiqi Li, Xinli Huang:
Federated Learning Vulnerabilities: Privacy Attacks with Denoising Diffusion Probabilistic Models. WWW 2024: 1149-1157 - [i1]Yuxing Zhang, Siyuan Meng, Chunchun Chen, Mengyao Peng, Hongyan Gu, Xinli Huang:
LinkThief: Combining Generalized Structure Knowledge with Node Similarity for Link Stealing Attack against GNN. CoRR abs/2410.02826 (2024) - 2023
- [j9]Fengyuan Lu, Jie Zhou, Xinli Huang:
Enhancing the convolution-based knowledge graph embeddings by increasing dimension-wise interactions. Data Knowl. Eng. 146: 102184 (2023) - [c21]Chaoyi Yan, Xinli Huang, Hongyan Gu, Siyuan Meng:
SimulE: A novel convolution-based model for knowledge graph embedding. CSCWD 2023: 624-629 - 2021
- [j8]Yujuan Wen, Fengyuan Lu, Yufei Liu, Xinli Huang:
Attacks and countermeasures on blockchains: A survey from layering perspective. Comput. Networks 191: 107978 (2021) - 2020
- [j7]Fengyuan Lu, Peijin Cong, Xinli Huang:
Utilizing Textual Information in Knowledge Graph Embedding: A Survey of Methods and Applications. IEEE Access 8: 92072-92088 (2020) - [j6]Jie Zhou, Siqi Jin, Xinli Huang:
ADeCNN: An Improved Model for Aspect-Level Sentiment Analysis Based on Deformable CNN and Attention. IEEE Access 8: 132970-132979 (2020) - [j5]Xinli Huang, Peng Shi, Yufei Liu, Fei Xu:
Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme. Comput. Networks 170: 107119 (2020) - [j4]Xinli Huang, Fanshuo Li, Kun Cao, Peijin Cong, Tongquan Wei, Shiyan Hu:
Queueing Theoretic Approach for Performance-Aware Modeling of Sustainable SDN Control Planes. IEEE Trans. Sustain. Comput. 5(1): 121-133 (2020) - [c20]Yufei Liu, Xuqi Fang, Fengyuan Lu, Xuxin Chen, Xinli Huang:
Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications. ICA3PP (3) 2020: 537-548 - [c19]Yujuan Wen, Fengyuan Lu, Yufei Liu, Peijin Cong, Xinli Huang:
Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey. ICA3PP (3) 2020: 564-579 - [c18]Xuqi Fang, Fengyuan Lu, Xuxin Chen, Xinli Huang:
Accurate Indoor Positioning Prediction Using the LSTM and Grey Model. WISE (1) 2020: 357-368 - [c17]Yufei Liu, Shang Cheng, Xinli Huang:
Towards Web-Scale and Energy-Efficient Hybrid SDNs: Deployment Optimization and Fine-Grained Link State Management. WISE (1) 2020: 559-573
2010 – 2019
- 2019
- [j3]Xinli Huang, Shang Cheng, Kun Cao, Peijin Cong, Tongquan Wei, Shiyan Hu:
A Survey of Deployment Solutions and Optimization Strategies for Hybrid SDN Networks. IEEE Commun. Surv. Tutorials 21(2): 1483-1507 (2019) - 2016
- [c16]Yufan Yang, Xinli Huang, Shang Cheng, Shiyun Chen, Peijin Cong:
SHSA: A Method of Network Verification with Stateful Header Space Analysis. ICPADS 2016: 232-238 - 2014
- [c15]Tiantian Ren, Xinli Huang:
A modified max-min ant colony optimization algorithm for virtual machines replacement in cloud datacenter§. IPCCC 2014: 1-2 - 2013
- [c14]Yue Zhou, Xinli Huang:
Scheduling Workflow in Cloud Computing Based on Ant Colony Optimization Algorithm. BIFE 2013: 57-61 - 2012
- [j2]Haifeng Qian, Xiangxue Li, Xinli Huang:
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica 23(3): 443-460 (2012)
2000 – 2009
- 2007
- [j1]Xinli Huang, Futai Zou, Fan-Yuan Ma:
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. J. Comput. Sci. Technol. 22(3): 457-468 (2007) - 2005
- [c13]Xinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li:
Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays. EUC Workshops 2005: 724-733 - [c12]Yin Li, Xinli Huang, Fanyuan Ma, Futai Zou:
Building Efficient Super-Peer Overlay Network for DHT Systems. GCC 2005: 787-798 - [c11]Xinli Huang, Yin Li, Wenju Zhang, Fanyuan Ma:
Smart Search over Desirable Topologies: Towards Scalable and Efficient P2P File Sharing. GCC 2005: 990-995 - [c10]Xinli Huang, Yin Li, Fei Liu, Fanyuan Ma:
ToA3: Beyond the Limit of Unstructured P2P Networks. ICAS/ICNS 2005: 40 - [c9]Yin Li, Xinli Huang, Futai Zou, Fanyuan Ma:
eDSR: A Decentralized Service Registry for e-Commerce. ICEBE 2005: 615-619 - [c8]Xinli Huang, Fanyuan Ma, Yin Li:
Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. ISPA Workshops 2005: 45-53 - [c7]Xinli Huang, Fanyuan Ma, Wenju Zhang:
TAON: A Topology-Oriented Active Overlay Network Protocol. IWAN 2005: 247-252 - [c6]Xinli Huang, Yin Li, Fanyuan Ma:
GToS: Examining the Role of Overlay Topology on System Performance Improvement. IWDC 2005: 213-225 - [c5]Ruijun Yang, Qi Xia, Weinong Wang, Qunhua Pan, Xinli Huang, Minglu Li:
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks. PDCAT 2005: 201-204 - [c4]Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma:
Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. PDCAT 2005: 503-506 - [c3]Xinli Huang, Yin Li, Fei Liu, Fanyuan Ma:
Towards Efficient and Scalable Searches for Mass-Market, Decentralized File-Sharing Applications. PDCAT 2005: 768-772 - [c2]Xinli Huang, Fanyuan Ma, Wenju Zhang, Yin Li:
On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications. WINE 2005: 936-946 - [c1]Xinli Huang, Fanyuan Ma, Wenju Zhang:
A Unique Design for High-Performance Decentralized Resources Locating: A Topological Perspective. WISE 2005: 609-610
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint