


default search action
Xiaoqiang Di
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j53]Nannan Xie, Qizhao Yuan
, Lijia Xie, Xiaoqiang Di:
SAGIN-ID: A rapid intrusion detection method for space-air-ground integrated network based on smart contracts. Comput. Electr. Eng. 123: 110084 (2025) - [j52]Jinhui Cao, Xiaoqiang Di
, Jinqing Li, Keping Yu, Liang Zhao:
IoVST: An anomaly detection method for IoV based on spatiotemporal feature fusion. Future Gener. Comput. Syst. 166: 107636 (2025) - 2024
- [j51]Nannan Xie, Chuanxue Zhang
, Qizhao Yuan, Jing Kong, Xiaoqiang Di:
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning. Ad Hoc Networks 163: 103590 (2024) - [j50]Songsong Zheng, Jinyao Liu, Xu Yan, Ziyang Xing, Xiaoqiang Di, Hui Qi:
BBR-R: Improving BBR performance in multi-flow competition scenarios. Comput. Networks 254: 110816 (2024) - [j49]Xu Yan, Jinyao Liu, Ligang Cong, Xiaoqiang Di, Nannan Xie, Ziyang Xing, Hui Qi:
Game theory-based switch migration strategy for satellite networks. Comput. Commun. 221: 10-18 (2024) - [j48]Haiyang Shen, Jinqing Li, Xiaoqiang Di, Xusheng Li, Zhenxun Liu, Makram Ibrahim
:
A novel secure scheme for remote sensing image transmission: an integrated approach with compression and encoding. Earth Sci. Informatics 17(5): 4875-4900 (2024) - [j47]Mengli Gao
, Jinqing Li
, Xiaoqiang Di, Xusheng Li
, Mingao Zhang:
A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher. Expert Syst. Appl. 246: 123215 (2024) - [j46]Jing Chen
, Xiaoqiang Di
, Rui Xu
, Hao Luo
, Hui Qi
, Panpan Zhan, Yuming Jiang
:
An efficient scheme for in-orbit remote sensing image data retrieval. Future Gener. Comput. Syst. 150: 103-114 (2024) - [j45]Jinhui Cao, Xiaoqiang Di, Xu Liu, Rui Xu
, Jinqing Li, Weiwu Ren, Hui Qi, Pengfei Hu, Kehan Zhang, Bo Li:
Towards robust log parsing using self-supervised learning for system security analysis. Intell. Data Anal. 28(4): 1093-1113 (2024) - [j44]Rui Xu
, Xiaoqiang Di
, Jing Chen
, Hui Qi
, Liang Zhao
:
Community Division-Based Content Distribution in Information-Centric Satellite Networks: An Efficient Approach for Remote Sensing. IEEE Internet Things J. 11(12): 21970-21984 (2024) - [j43]Xusheng Li, Jinqing Li
, Xiaoqiang Di, Hongmei Guan, Mingao Zhang, Mengli Gao, Makram Ibrahim
:
3D point cloud encryption algorithm based on hybrid key and spatial maintenance. J. Inf. Secur. Appl. 87: 103896 (2024) - [j42]Ziyang Xing, Xiaoqiang Di
, Hui Qi, Jing Chen, Jinhui Cao, Jinyao Liu, Xusheng Li, Zichu Zhang, Yuchen Zhu, Lei Chen, Kai Huang, Xinghan Huo:
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission. Frontiers Inf. Technol. Electron. Eng. 25(6): 791-808 (2024) - [j41]Jinhui Cao
, Xiaoqiang Di
, Xu Liu, Jinqing Li
, Zhi Li
, Liang Zhao
, Ammar Hawbani, Mohsen Guizani
:
Anomaly Detection for In-Vehicle Network Using Self-Supervised Learning With Vehicle-Cloud Collaboration Update. IEEE Trans. Intell. Transp. Syst. 25(7): 7454-7466 (2024) - [c29]Hamza Mokhtar, Xiaoqiang Di, Zhengang Jiang, Mosab Hamdan:
Dynamic Controller Assignment in LEO Satellite based SDN using Multi-Agent Deep Reinforcement Learning. CSCN 2024: 208-211 - [c28]Zhengping Ni, Xiaoqiang Di, Xu Liu, Lianjie Chang, Jinqing Li, Qiyue Tang:
LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly Detection. ISPA 2024: 1917-1924 - [c27]Qiyue Tang, Xiaoqiang Di, Xu Liu, Ligang Cong, Weiwu Ren, Zhengping Ni:
DeepARR: Alert risk rating based on deep learning. ISPA 2024: 2097-2104 - 2023
- [j40]Rui Xu
, Xiaoqiang Di
, Jing Chen
, Haowei Wang, Hao Luo
, Hui Qi, Xiongwen He, Wenping Lei, Shiwei Zhang:
A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness. Comput. Commun. 197: 186-198 (2023) - [j39]Jing Chen
, Xiaoqiang Di, Rui Xu
, Hui Qi, Ligang Cong, Kehan Zhang, Ziyang Xing, Xiongwen He, Wenping Lei, Shiwei Zhang:
A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology. Future Gener. Comput. Syst. 145: 337-353 (2023) - [j38]Zhenlong Man
, Jinqing Li, Xiaoqiang Di, Ripei Zhang, Xusheng Li, Xiaohan Sun:
Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf. Sci. 622: 629-651 (2023) - [j37]Chunbo Wang, Xu Liu, Hang Li, Xiaoqiang Di, Ligang Cong, Siyu Zhang, Hui Qi:
Smart contract-based integrity audit method for IoT. Inf. Sci. 647: 119413 (2023) - [j36]Huan Wang
, Xiaoqiang Di
, Yan Wang
, Bin Ren, Ge Gao, Junyi Deng
:
An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification. IEEE J. Sel. Areas Commun. 41(11): 3561-3572 (2023) - [j35]Ziyang Xing
, Hui Qi, Xiaoqiang Di
, Jinyao Liu, Rui Xu
, Jing Chen
, Ligang Cong:
A multipath routing algorithm for satellite networks based on service demand and traffic awareness. Frontiers Inf. Technol. Electron. Eng. 24(6): 844-858 (2023) - [j34]Hui Qi
, Peipei Li, Chunbo Wang, Jinlei Du, Xiaoqiang Di:
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication. Mob. Networks Appl. 28(2): 473-485 (2023) - [j33]Hui Qi, Junrui Si, Jiahui Hou, Zhe Tian, Aowei Zhang, Jing Chen
, Weiwu Ren, Shiwei Zhang, Xiaoqiang Di:
Subflow scheduling strategy for multipath transmission in SDN-based spatial network. Wirel. Networks 29(2): 941-953 (2023) - [c26]Jinyao Liu, Xiaoqiang Di, Weiwu Ren, Ligang Cong, Hui Qi:
MPQUIC Transmission Control Strategy for SDN-Based Satellite Network. ICA3PP (6) 2023: 453-464 - 2022
- [j32]Wenming Hou, Xiaoqiang Di, Jinqing Li, Li Cheng, Huamin Yang:
Research on the behaviour and law of quantity growth of followers based on WeChat official account. Behav. Inf. Technol. 41(8): 1724-1739 (2022) - [j31]Zefei Liu
, Jinqing Li
, Xiaoqiang Di:
A New Hyperchaotic 4D-FDHNN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption. Entropy 24(7): 900 (2022) - [j30]Xin Meng, Jinqing Li
, Xiaoqiang Di, Yaohui Sheng, Donghua Jiang
:
An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map. Entropy 24(7): 901 (2022) - [j29]Yaohui Sheng, Jinqing Li
, Xiaoqiang Di, Xusheng Li
, Rui Xu
:
An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion. Entropy 24(9): 1247 (2022) - [j28]Hui Qi, Yingjun Guo
, Dinghui Hou, Ziyang Xing, Weiwu Ren, Ligang Cong, Xiaoqiang Di:
SDN-based dynamic multi-path routing strategy for satellite networks. Future Gener. Comput. Syst. 133: 254-265 (2022) - [j27]Yaohui Sheng, Jinqing Li
, Xiaoqiang Di, Zhenlong Man, Zefei Liu:
Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels. IET Image Process. 16(10): 2769-2790 (2022) - [j26]Weiwu Ren
, Jialin Zhu, Hui Qi, Ligang Cong, Xiaoqiang Di:
Dynamic optimization of intersatellite link assignment based on reinforcement learning. Int. J. Distributed Sens. Networks 18(2): 155014772110702 (2022) - [j25]Donghan Li
, Jinqing Li
, Xiaoqiang Di:
A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. J. Inf. Secur. Appl. 69: 103304 (2022) - [j24]Jinqing Li, Jia Wang, Xiaoqiang Di:
Image encryption algorithm based on bit-level permutation and "Feistel-like network" diffusion. Multim. Tools Appl. 81(30): 44335-44362 (2022) - [c25]Fengkun Gao, Chunbo Wang, Xiaoqiang Di, Jinhui Cao, Xu Liu, Hui Qi:
Secure deduplication method based on tag clustering. ISPA/BDCloud/SocialCom/SustainCom 2022: 838-844 - [c24]Haowei Wang, Rui Xu
, Xiaoqiang Di, Jing Chen
, Dejun Zhu, Juping Sun, Yuchen Zhu:
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks. WASA (1) 2022: 153-164 - [c23]Kehan Zhang
, Xiaoqiang Di
, Xu Liu, Bo Li, Luyue Fang, Yiping Qin, Jinhui Cao:
LogLR: A Log Anomaly Detection Method Based on Logical Reasoning. WASA (2) 2022: 489-500 - 2021
- [j23]Zhen Liu
, Xiaoqiang Di
, Wei Song
, Weiwu Ren
:
A Sentence-Level Joint Relation Classification Model Based on Reinforcement Learning. Comput. Intell. Neurosci. 2021: 5557184:1-5557184:10 (2021) - [j22]Hamza Mokhtar
, Xiaoqiang Di, Ying Zhou, Alzubair Hassan
, Ziyi Ma, Shafiu Musa:
Multiple-level threshold load balancing in distributed SDN controllers. Comput. Networks 198: 108369 (2021) - [j21]Rui Xu
, Xiaoqiang Di
, Xiongwen He, Hui Qi:
Evaluation method of node importance in temporal satellite networks based on time slot correlation. EURASIP J. Wirel. Commun. Netw. 2021(1): 188 (2021) - [j20]Xu Liu
, Weiyou Liu, Xiaoqiang Di, Jinqing Li, Binbin Cai, Weiwu Ren, Huamin Yang:
LogNADS: Network anomaly detection scheme based on log semantics representation. Future Gener. Comput. Syst. 124: 390-405 (2021) - [j19]Zhenlong Man
, Jinqing Li, Xiaoqiang Di:
Medical image encryption scheme based on self-verification matrix. IET Image Process. 15(12): 2787-2798 (2021) - [j18]Zhenlong Man
, Jinqing Li, Xiaoqiang Di, Xu Liu, Jian Zhou, Jia Wang, Xingxu Zhang:
A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multim. Tools Appl. 80(18): 27445-27469 (2021) - [c22]Zhen Liu, Xiaoqiang Di, Wei Song, Weiwu Ren:
Vulnerability knowledge extraction method based on joint extraction model. CBD 2021: 101-106 - [c21]Zhongyu Liang
, Xiaoqiang Di
, Zhen Liu, Xu Liu, Xingxu Zhang, Zhi Yu:
Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective. ICA3PP (1) 2021: 402-421 - [c20]Luyue Fang, Xiaoqiang Di, Xu Liu, Yiping Qin, Weiwu Ren, Qiang Ding:
QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity. TrustCom 2021: 1085-1092 - 2020
- [j17]Chunbo Wang
, Xiaoqiang Di:
Research on Integrity Check Method of Cloud Storage Multi-Copy Data Based on Multi-Agent. IEEE Access 8: 17170-17178 (2020) - [j16]Jian Zhou
, Jinqing Li
, Xiaoqiang Di
:
A Novel Lossless Medical Image Encryption Scheme Based on Game Theory With Optimized ROI Parameters and Hidden ROI Position. IEEE Access 8: 122210-122228 (2020) - [j15]Jia Wang
, Jinqing Li
, Xiaoqiang Di
, Jian Zhou
, Zhenlong Man
:
Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion. IEEE Access 8: 160004-160024 (2020) - [j14]Hongpeng Bai
, Nannan Xie
, Xiaoqiang Di
, Qing Ye:
FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation. IEEE Access 8: 194729-194740 (2020) - [j13]Xu Liu
, Xiaoqiang Di
, Qiang Ding
, Weiyou Liu
, Hui Qi
, Jinqing Li
, Huamin Yang
:
NADS-RA: Network Anomaly Detection Scheme Based on Feature Representation and Data Augmentation. IEEE Access 8: 214781-214800 (2020) - [j12]Zhifei Mao, Yuming Jiang
, Xiaoqiang Di, Yordanos Woldeyohannes:
Joint head selection and airtime allocation for data dissemination in mobile social networks. Comput. Networks 166 (2020) - [j11]Weiwu Ren, Jianfei Zhang, Xiaoqiang Di, Yinan Lu, Bochen Zhang, Jianping Zhao:
Anomaly Detection Algorithm Based on CFSFDP. J. Adv. Comput. Intell. Intell. Informatics 24(4): 453-460 (2020) - [c19]Xingxu Zhang, Yong Ma, Xiaoqiang Di, Huamin Yang, Binbin Cai:
Correlation Analysis of Internet Addiction with Daily Behavior: A Data-Driven Method. ICBDT 2020: 41-46 - [c18]Nannan Xie, Hongpeng Bai, Rui Sun, Xiaoqiang Di:
Android Vault Application Behavior Analysis and Detection. ICPCSEE (1) 2020: 428-439 - [c17]Hui Qi, Tianwei Lu, Ligang Cong, Xiaoqiang Di:
Secure Deduplication Method Based on Autoencoder. ISPA/BDCloud/SocialCom/SustainCom 2020: 345-352 - [c16]Weiyou Liu
, Xu Liu, Xiaoqiang Di, Binbin Cai:
FastLogSim: A Quick Log Pattern Parser Scheme Based on Text Similarity. KSEM (1) 2020: 211-219 - [c15]Xu Liu
, Xiaoqiang Di, Weiyou Liu, Xingxu Zhang, Hui Qi, Jinqing Li, Jianping Zhao, Huamin Yang:
NADSR: A Network Anomaly Detection Scheme Based on Representation. KSEM (1) 2020: 380-387
2010 – 2019
- 2019
- [j10]Zhenlong Man
, Jinqing Li, Xiaoqiang Di, Ou Bai
:
An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System. IEEE Access 7: 103047-103058 (2019) - [j9]Huan Wang
, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on classification and recognition of attacking factors based on radial basis function neural network. Clust. Comput. 22(Supplement): 5573-5585 (2019) - [j8]Ligang Cong, Huamin Yang, Xiaoqiang Di:
Storage Allocation Plan for Routing Nodes in Delay Tolerant Network. Ingénierie des Systèmes d Inf. 24(1): 89-94 (2019) - [j7]Hefei Jia, Xu Liu, Xiaoqiang Di, Hui Qi, Binbin Cai, Jinqing Li, Huamin Yang, Jianping Zhao:
A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks. J. Adv. Comput. Intell. Intell. Informatics 23(5): 898-908 (2019) - [c14]Ligang Cong, Huamin Yang, Xiaoqiang Di:
Research on Spatial Network Routing Model Based on Price Game. CSPS 2019: 459-468 - [c13]Ying Zhou, Xiaoqiang Di, Ligang Cong, Weiwu Ren, Weiyou Liu, Yuming Jiang
, Huilin Jiang:
Performance Analysis of Three-Layered Satellite Network Based on Stochastic Network Calculus. CSPS 2019: 2285-2294 - [c12]Ziyi Ma, Xiaoqiang Di, Jinqing Li, Ligang Cong, Ping Li:
MPTCP Based Load Balancing Mechanism in Software Defined Satellite Networks. WISATS (1) 2019: 294-302 - [c11]Hui Qi, Yue Wang, Jinyu Dai, Jinqing Li, Xiaoqiang Di:
Attention-Based Hybrid Model for Automatic Short Answer Scoring. SimuTools 2019: 385-394 - [i2]Xu Liu, Xiaoqiang Di, Jinqing Li, Huan Wang, Jianping Zhao, Huamin Yang, Ligang Cong:
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model. CoRR abs/1902.08712 (2019) - 2018
- [j6]Huan Wang
, Zhanfang Chen, Jianping Zhao
, Xiaoqiang Di, Dan Liu:
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow. IEEE Access 6: 8599-8609 (2018) - [j5]Shan Jiang, Cheng Han, Xiaoqiang Di:
An Efficient Misalignment Method for Visual Tracking Based on Sparse Representation. IEICE Trans. Inf. Syst. 101-D(8): 2123-2131 (2018) - [j4]Hui Qi, Xiaoqiang Di, Jinqing Li:
Formal definition and analysis of access control model based on role and attribute. J. Inf. Secur. Appl. 43: 53-60 (2018) - [j3]Huan Wang
, Zhanfang Chen, Xin Feng, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process. Wirel. Pers. Commun. 102(2): 1401-1420 (2018) - [c10]Syed Umer Bukhari, Liwei Yu, Xiaoqiang Di, Chunyi Chen, Xu Liu:
Fuzzy C-Mean Clustering Based: LEO Satellite Handover. ICPCSEE (1) 2018: 347-358 - [c9]Hefei Jia, Xu Liu, Xiaoqiang Di, Hui Qi, Ligang Cong, Jinqing Li, Huamin Yang:
Security Strategy for Virtual Machine Allocation in Cloud Computing. IIKI 2018: 140-144 - [c8]Ziyi Ma, Xiaoqiang Di, Yuming Jiang
, Huilin Jiang, Huamin Yang:
Delay-Constrained Load Balancing in the SDN. SINC 2018: 124-134 - [i1]Zhifei Mao, Yuming Jiang, Xiaoqiang Di, Yordanos Woldeyohannes:
Joint Head Selection and Airtime Allocation for Data Dissemination in Mobile Social Networks. CoRR abs/1803.08634 (2018) - 2017
- [c7]Xiaoqiang Di, Yingzheng Wang, Jinqing Li, Ligang Cong, Hui Qi, Yuxin Zhang:
An optimized video selective encryption algorithm. CISP-BMEI 2017: 1-5 - [c6]Jinqing Li, Xiaoqiang Di, Xingchen Liu, Xiaodong Chen:
Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform. CISP-BMEI 2017: 1-6 - [c5]Hui Qi, Xiaoqiang Di, Jinqing Li:
Heuristic Map Tiles Prefetch Strategy Based on Road Network Analysis. ISCID (2) 2017: 321-325 - [c4]Ligang Cong, Huamin Yang, Yanghui Wang, Xiaoqiang Di:
An Auction-Gaming Based Routing Model for LEO Satellite Networks. MLICOM (2) 2017: 498-508 - 2016
- [c3]Xu Liu
, Xiaoqiang Di, Jinqing Li, Hui Qi, Huamin Yang, Ligang Cong:
Optimal backup strategy in cloud disaster tolerance. CITS 2016: 1-5 - [c2]Hui Qi, Xiong Luo, Xiaoqiang Di, Jinqing Li, Huamin Yang, Zhengang Jiang:
Access Control Model Based on Role and Attribute and Its Implementation. CyberC 2016: 66-71 - [c1]Min Wang, Xiaoqiang Di, Yuming Jiang
, Jinqing Li, Huilin Jiang, Huamin Yang:
End-to-End Stochastic QoS Performance Under Multi-layered Satellite Network. SINC 2016: 182-201 - 2013
- [j2]Jinqing Li, Fengming Bai, Xiaoqiang Di:
New color image encryption algorithm based on compound chaos mapping and hyperchaotic cellular neural network. J. Electronic Imaging 22(1): 013036 (2013) - 2012
- [j1]Honghua Xu, Xiaoqiang Di, Huamin Yang, Guangcai Cui:
Intelligent PID Controller on Soft Computing. J. Comput. 7(10): 2417-2424 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-14 17:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint