default search action
Hui Xia 0001
Person information
- affiliation: Ocean University of China, Qingdao, China
- affiliation (2013 - 2020): Qingdao University, College of Computer Science and Technology, China
- affiliation (PhD 2013): Shandong University, School of Computer Science and Technology, Jinan, China
Other persons with the same name
- Hui Xia — disambiguation page
- Hui Xia 0002 — Chinese Academy of Sciences, Institute of Electrical Engineering, Beijing, China (and 1 more)
- Hui Xia 0003 — Hunan Radio and Television University, Changsha, China
Other persons with a similar name
- Hui-xia Chai
- Xia Hui
- Hui-xia Jiang
- Hui-Xia Wang
- Ming Hui Xia
- Yong-Hui Xia
- Huifen Xia 0001 (aka: Hui-fen Xia 0001) — Jiangsu University, Changzhou Vocational Institute of Mechatronic Technology, School of Computer Science and Communication Engineering, Zhenjiang, China
- Hui-xia Xu
- Hui-Xia Yin
- Hui-Xia Zhou
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j42]Yingqi Zhang, Hui Xia, Shuo Xu, Xiangxiang Wang, Lijuan Xu:
AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices. Future Gener. Comput. Syst. 165: 107610 (2025) - [j41]Zuming Zhang, Hui Xia, Zi Kang, Rui Zhang, Xiaolong Shi:
CATIL: Customized adversarial training based on instance loss. Inf. Sci. 689: 121420 (2025) - 2024
- [j40]Hao Chi, Hui Xia, Shuo Xu, Yusheng He, Chunqiang Hu:
FMDADA: Federated multi-discriminative adversarial domain adaptation. Appl. Intell. 54(17-18): 7849-7863 (2024) - [j39]Kunkun Jia, Hui Xia, Rui Zhang, Yue Sun, Kai Wang:
Multi-agent DRL for edge computing: A real-time proportional compute offloading. Comput. Networks 252: 110665 (2024) - [j38]Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu:
FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation. Future Gener. Comput. Syst. 153: 1-11 (2024) - [j37]Shuo Xu, Hui Xia, Peishun Liu, Rui Zhang, Hao Chi, Wei Gao:
FLPM: A property modification scheme for data protection in federated learning. Future Gener. Comput. Syst. 154: 151-159 (2024) - [j36]Biao Xie, Chunqiang Hu, Hongyu Huang, Jiguo Yu, Hui Xia:
DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation. IEEE Internet Things J. 11(8): 13837-13850 (2024) - [j35]Rui Zhang, Hui Xia, Zi Kang, Zhengheng Li, Yu Du, Mingyang Gao:
Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack. IEEE Internet Things J. 11(15): 25625-25636 (2024) - [j34]Shuo Xu, Hui Xia, Rui Zhang, Peishun Liu, Yu Fu:
FedNor: A robust training framework for federated learning based on normal aggregation. Inf. Sci. 684: 121274 (2024) - [j33]Mingda Ma, Hui Xia, Xin Li, Rui Zhang, Shuo Xu:
Classification optimization node injection attack on graph neural networks. Knowl. Based Syst. 301: 112323 (2024) - [j32]Shuo Xu, Hui Xia, Lijuan Xu, Rui Zhang, Chunqiang Hu:
MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users. IEEE Trans. Consumer Electron. 70(1): 3098-3110 (2024) - [j31]Rui Zhang, Hui Xia, Zijun Chen, Zi Kang, Kai Wang, Wei Gao:
Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices. IEEE Trans. Consumer Electron. 70(1): 4120-4131 (2024) - [j30]Chunqiang Hu, Jianshuo Liu, Hui Xia, Shaojiang Deng, Jiguo Yu:
A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT. IEEE Trans. Netw. Sci. Eng. 11(2): 2138-2152 (2024) - [c19]Xiangyun Qian, Rui Zhang, Zi Kang, Hui Xia:
An Invisible Backdoor Attack on Cloud Computing in the Internet of Things. BigDataSecurity 2024: 101-106 - [c18]Xiangyun Qian, Yusheng He, Rui Zhang, Zi Kang, Yilin Sheng, Hui Xia:
Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. KSEM (3) 2024: 122-134 - [c17]Wenjiang Hu, Mingda Ma, Yanan Jiang, Hui Xia:
Scalable Attack on Graph Data by Important Nodes. KSEM (4) 2024: 176-188 - [c16]Shuliang Jiang, Yusheng He, Rui Zhang, Zi Kang, Hui Xia:
DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. KSEM (3) 2024: 274-285 - [c15]Hao Chi, Yingqi Zhang, Shuo Xu, Rui Zhang, Hui Xia:
Collaborative Adversarial Learning for Unsupervised Federated Domain Adaptation. KSEM (2) 2024: 346-357 - [c14]Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu:
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack. NDSS 2024 - 2023
- [j29]Zi Kang, Hui Xia, Rui Zhang, Shuliang Jiang, Xiaolong Shi, Zuming Zhang:
FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition. Comput. Secur. 135: 103522 (2023) - [j28]Xue-cai Feng, Hui Xia, Shuo Xu, Lijuan Xu, Rui Zhang:
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things. Expert Syst. Appl. 234: 120965 (2023) - [j27]Rui Zhang, Chengtian Jiang, Junbo Zhang, Jiteng Fan, Jiayi Ren, Hui Xia:
Reinvigorating sustainability in Internet of Things marketing: Framework for multi-round real-time bidding with game machine learning. Internet Things 24: 100921 (2023) - [j26]Hui Xia, Shuo Xu, Jiaming Pei, Rui Zhang, Zhi Yu, Weitao Zou, Lukun Wang, Chao Liu:
FedME2: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN. IEEE J. Sel. Areas Commun. 41(11): 3573-3588 (2023) - [j25]Run Du, Shuo Xu, Rui Zhang, Lijuan Xu, Hui Xia:
A dynamic adaptive iterative clustered federated learning scheme. Knowl. Based Syst. 276: 110741 (2023) - [j24]Zewei Liu, Chunqiang Hu, Ruinian Li, Tao Xiang, Xingwang Li, Jiguo Yu, Hui Xia:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Trans. Cloud Comput. 11(3): 2325-2336 (2023) - [j23]Hui Xia, Shu-shu Shao, Chunqiang Hu, Rui Zhang, Tie Qiu, Fu Xiao:
Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network. IEEE Trans. Knowl. Data Eng. 35(5): 5203-5215 (2023) - [c13]Zi Kang, Yumei Zhang, Rui Zhang, Yanan Jiang, Hui Xia:
QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition. PRCV (8) 2023: 417-429 - 2022
- [j22]Rui Zhang, Hui Xia, Chunqiang Hu, Cheng Zhang, Chao Liu, Fu Xiao:
Generating Adversarial Examples With Shadow Model. IEEE Trans. Ind. Informatics 18(9): 6283-6289 (2022) - [j21]Zewei Liu, Chunqiang Hu, Hui Xia, Tao Xiang, Baolin Wang, Jiajun Chen:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. IEEE Trans. Netw. Serv. Manag. 19(4): 5196-5207 (2022) - [c12]Ning Huang, Xue-cai Feng, Rui Zhang, Xiugui Yang, Hui Xia:
Network Defense Resource Allocation Scheme with Multi-armed Bandits. WASA (1) 2022: 326-337 - [c11]Xiugui Yang, Xiangyun Qian, Rui Zhang, Ning Huang, Hui Xia:
Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons. WASA (2) 2022: 375-383 - [i3]Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang:
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? CoRR abs/2206.10809 (2022) - [i2]Hui Xia, Rui Zhang, Shuliang Jiang, Zi Kang:
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture. CoRR abs/2206.10988 (2022) - [i1]Hui Xia, Xiugui Yang, Xiangyun Qian, Rui Zhang:
FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair. CoRR abs/2207.12863 (2022) - 2021
- [j20]Jufu Cui, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168: 136-145 (2021) - [j19]Rui Zhang, Hui Xia, Chao Liu, Ruobing Jiang, Xiangguo Cheng:
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning. Wirel. Commun. Mob. Comput. 2021: 6619715:1-6619715:9 (2021) - [c10]Shu-shu Shao, Hui Xia, Rui Zhang, Xiangguo Cheng:
Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. WASA (2) 2021: 96-106 - 2020
- [j18]Rui Zhang, Hui Xia, Fei Chen, Li Li, Xiangguo Cheng:
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System. IEEE Access 8: 12316-12326 (2020) - [j17]Li Li, Jufu Cui, Rui Zhang, Hui Xia, Xiangguo Cheng:
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things. IEEE Access 8: 64184-64192 (2020) - [j16]Yizhe Li, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things. IEEE Access 8: 123938-123951 (2020) - [j15]Hui Xia, Li Li, Xiangguo Cheng, Xiuzhen Cheng, Tie Qiu:
Modeling and Analysis Botnet Propagation in Social Internet of Things. IEEE Internet Things J. 7(8): 7470-7481 (2020) - [j14]Hui Xia, Li Li, Xiangguo Cheng, Chao Liu, Tie Qiu:
A Dynamic Virus Propagation Model Based on Social Attributes in City IoT. IEEE Internet Things J. 7(9): 8036-8048 (2020) - [j13]Rui Zhang, Hui Xia, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. Mob. Inf. Syst. 2020: 8844116:1-8844116:9 (2020) - [j12]Hui Xia, Fu Xiao, Sanshun Zhang, Xiangguo Cheng, Zhenkuan Pan:
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 792-804 (2020) - [j11]Hui Xia, Rui Zhang, Xiangguo Cheng, Tie Qiu, Dapeng Oliver Wu:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. IEEE/ACM Trans. Netw. 28(6): 2741-2754 (2020) - [j10]Hui Xia, Zhetao Li, Yuhui Zheng, Anfeng Liu, Young-June Choi, Hiroo Sekiya:
A Novel Light-Weight Subjective Trust Inference Framework in MANETs. IEEE Trans. Sustain. Comput. 5(2): 236-248 (2020) - [c9]Rui Zhang, Hui Xia, Jufu Cui, Yizhe Li, Shu-shu Shao, Hang Ren:
A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server. ML4CS (3) 2020: 183-192 - [c8]Rui Zhang, Hui Xia, Jufu Cui, Xiangguo Cheng:
A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems. WASA (2) 2020: 105-112
2010 – 2019
- 2019
- [j9]Hui Xia, Chun-qiang Hu, Fu Xiao, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j8]Hui Xia, Sanshun Zhang, Ye Li, Zhenkuan Pan, Xin Peng, Xiuzhen Cheng:
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(7): 7108-7120 (2019) - [c7]Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. INFOCOM 2019: 838-846 - [c6]Li Li, Hui Xia, Rui Zhang, Ye Li:
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. WASA 2019: 596-604 - 2018
- [j7]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j6]Hui Xia, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. Secur. Commun. Networks 2018: 7608198:1-7608198:12 (2018) - [c5]Sanshun Zhang, Shiwen Wang, Hui Xia, Xiangguo Cheng:
An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks. IIKI 2018: 473-479 - [c4]Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. WASA 2018: 893-906 - 2017
- [j5]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - 2016
- [j4]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j3]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j2]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j1]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c3]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - [c2]Hui Xia, Guodong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. Trustcom/BigDataSE/ISPA 2016: 50-56 - 2014
- [c1]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint