default search action
Xiaojun Ye
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Zhenming Yuan, Tianhao Xu, Cheng Yu, Xiaojun Ye, Jian Zhang:
Automatic measurement of fetal abdomen subcutaneous soft tissue thickness from ultrasound image based on a U-shaped attention network with morphological method. Int. J. Imaging Syst. Technol. 34(1) (2024) - [c64]Xiaojun Ye, Junhao Chen, Xiang Li, Haidong Xin, Chao Li, Sheng Zhou, Jiajun Bu:
MMAD: Multi-modal Movie Audio Description. LREC/COLING 2024: 11415-11428 - [c63]Yiren Song, Shijie Huang, Chen Yao, Hai Ci, Xiaojun Ye, Jiaming Liu, Yuxuan Zhang, Mike Zheng Shou:
ProcessPainter: Learning to draw from sequence data. SIGGRAPH Asia 2024: 18:1-18:10 - [i10]Mingjin Chen, Junhao Chen, Xiaojun Ye, Huan-ang Gao, Xiaoxue Chen, Zhaoxin Fan, Hao Zhao:
Ultraman: Single Image 3D Human Reconstruction with Ultra Speed and Detail. CoRR abs/2403.12028 (2024) - [i9]Junhao Chen, Xiang Li, Xiaojun Ye, Chao Li, Zhaoxin Fan, Hao Zhao:
Idea-2-3D: Collaborative LMM Agents Enable 3D Model Generation from Interleaved Multimodal Inputs. CoRR abs/2404.04363 (2024) - [i8]Yiren Song, Shijie Huang, Chen Yao, Xiaojun Ye, Hai Ci, Jiaming Liu, Yuxuan Zhang, Mike Zheng Shou:
ProcessPainter: Learn Painting Process from Sequence Data. CoRR abs/2406.06062 (2024) - 2023
- [j23]Jing Yu, Shukai Duan, Xiaojun Ye:
A White-Box Testing for Deep Neural Networks Based on Neuron Coverage. IEEE Trans. Neural Networks Learn. Syst. 34(11): 9185-9197 (2023) - [c62]Junhao Chen, Xiaojun Ye, Jingbo Sun, Chao Li:
Towards Energy-Efficient Sentiment Classification with Spiking Neural Networks. ICANN (10) 2023: 518-529 - [c61]Xiaojun Ye, Beixi Ning, Pengyuan Bian, Xiaoning Feng:
A Self-Attention-Based Stock Prediction Method Using Long Short-Term Memory Network Architecture. ICPCSEE (1) 2023: 12-24 - 2022
- [j22]Jing Yu, Xiaojun Ye, Hongbo Li:
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network. Future Gener. Comput. Syst. 129: 399-406 (2022) - [j21]Jing Yu, Xiaojun Ye, Qiang Tu:
Traffic Sign Detection and Recognition in Multiimages Using a Fusion Model With YOLO and VGG Network. IEEE Trans. Intell. Transp. Syst. 23(9): 16632-16642 (2022) - [j20]Jisheng Pei, Lijie Wen, Xiaojun Ye, Akhil Kumar:
Efficient Transition Adjacency Relation Computation for Process Model Similarity. IEEE Trans. Serv. Comput. 15(3): 1295-1308 (2022) - [c60]Guolou Ping, Xiaojun Ye:
Open-Set Intrusion Detection with MinMax Autoencoder and Pseudo Extreme Value Machine. IJCNN 2022: 1-8 - 2021
- [j19]Zheng Wang, Qiao Wang, Tingzhang Zhao, Chaokun Wang, Xiaojun Ye:
Zero-Shot Feature Selection via Transferring Supervised Knowledge. Int. J. Data Warehous. Min. 17(2): 1-20 (2021) - [j18]Zheng Wang, Xiaojun Ye, Chaokun Wang, Jian Cui, Philip S. Yu:
Network Embedding With Completely-Imbalanced Labels. IEEE Trans. Knowl. Data Eng. 33(11): 3634-3647 (2021) - [j17]Jisheng Pei, Lijie Wen, Hedong Yang, Jianmin Wang, Xiaojun Ye:
Estimating Global Completeness of Event Logs: A Comparative Study. IEEE Trans. Serv. Comput. 14(2): 441-457 (2021) - [c59]Jing Yu, Chenguang Mao, Xiaojun Ye:
A Novel Tree-based Neural Network for Android Code Smells Detection. QRS 2021: 738-748 - 2020
- [j16]Zheng Wang, Qiao Wang, Tanjie Zhu, Xiaojun Ye:
Extending LINE for Network Embedding With Completely Imbalanced Labels. Int. J. Data Warehous. Min. 16(3): 20-36 (2020) - [j15]Changping Wang, Chaokun Wang, Zheng Wang, Xiaojun Ye, Philip S. Yu:
Edge2vec: Edge-based Social Network Embedding. ACM Trans. Knowl. Discov. Data 14(4): 45:1-45:24 (2020) - [c58]Lin Sun, Xiaojun Ye, Jun Zhao, Chenhui Lu, Mengmeng Yang:
BiSample: Bidirectional Sampling for Handling Missing Data with Local Differential Privacy. DASFAA (1) 2020: 88-104 - [c57]Yao Lai, Guolou Ping, Yuexin Wu, Chenhui Lu, Xiaojun Ye:
OpenSMax: Unknown Domain Generation Algorithm Detection. ECAI 2020: 1850-1857 - [c56]Junyao Huang, Chenhui Lu, Guolou Ping, Lin Sun, Xiaojun Ye:
TCN-ATT: A Non-recurrent Model for Sequence-Based Malware Detection. PAKDD (2) 2020: 178-190 - [i7]Lin Sun, Xiaojun Ye, Jun Zhao, Chenhui Lu, Mengmeng Yang:
BiSample: Bidirectional Sampling for Handling Missing Data with Local Differential Privacy. CoRR abs/2002.05624 (2020) - [i6]Zheng Wang, Xiaojun Ye, Chaokun Wang, Jian Cui, Philip S. Yu:
Network Embedding with Completely-imbalanced Labels. CoRR abs/2007.03545 (2020)
2010 – 2019
- 2019
- [j14]Lan Zhang, Yao Lai, Xiaojun Ye:
基于注意力机制的恶意软件调用序列检测 (Attention Mechanism Based Detection of Malware Call Sequences). 计算机科学 46(12): 132-137 (2019) - [j13]Zheng Wang, Xiaojun Ye, Chaokun Wang, Philip S. Yu:
Feature Selection via Transferring Knowledge Across Different Classes. ACM Trans. Knowl. Discov. Data 13(2): 22:1-22:29 (2019) - [j12]Chaokun Wang, Changping Wang, Zheng Wang, Xiaojun Ye, Jeffrey Xu Yu, Bin Wang:
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding. IEEE Trans. Knowl. Data Eng. 31(12): 2277-2291 (2019) - [c55]Jing Yu, Yao Fu, Yanan Zheng, Zheng Wang, Xiaojun Ye:
Test4Deep: an Effective White-Box Testing for Deep Neural Networks. CSE/EUC 2019: 16-23 - [c54]Chaokun Wang, Changping Wang, Zheng Wang, Xiaojun Ye, Jeffrey Xu Yu, Bin Wang:
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding (Extended Abstract). ICDE 2019: 2149-2150 - [i5]Lin Sun, Jun Zhao, Xiaojun Ye:
Distributed Clustering in the Anonymized Space with Local Differential Privacy. CoRR abs/1906.11441 (2019) - [i4]Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, Tao Bai:
Conditional Analysis for Key-Value Data with Local Differential Privacy. CoRR abs/1907.05014 (2019) - [i3]Zheng Wang, Xiaojun Ye, Qiao Wang:
Zero-shot Feature Selection via Exploiting Semantic Knowledge. CoRR abs/1908.03464 (2019) - 2018
- [j11]Zhenzhi Lin, Fushuan Wen, Huifang Wang, Guanqiang Lin, Tianwen Mo, Xiaojun Ye:
CRITIC-Based Node Importance Evaluation in Skeleton-Network Reconfiguration of Power Grids. IEEE Trans. Circuits Syst. II Express Briefs 65-II(2): 206-210 (2018) - [j10]Changping Wang, Chaokun Wang, Gaoyang Guo, Xiaojun Ye, Philip S. Yu:
Efficient Computation of G-Skyline Groups. IEEE Trans. Knowl. Data Eng. 30(4): 674-688 (2018) - [c53]Zheng Wang, Xiaojun Ye, Chaokun Wang, Yuexin Wu, Changping Wang, Kaiwen Liang:
RSDNE: Exploring Relaxed Similarity and Dissimilarity from Completely-Imbalanced Labels for Network Embedding. AAAI 2018: 475-482 - [c52]Lin Sun, Lan Zhang, Xiaojun Ye:
Randomized Bit Vector: Privacy-Preserving Encoding Mechanism. CIKM 2018: 1263-1272 - [c51]Changping Wang, Chaokun Wang, Gaoyang Guo, Xiaojun Ye, Philip S. Yu:
Efficient Computation of G-Skyline Groups (Extended Abstract). ICDE 2018: 1769-1770 - 2017
- [j9]Lu Yang, Xiaojun Ye:
云服务环境下的密钥管理问题和挑战 (Key Management Issues and Challenges in Cloud). 计算机科学 44(3): 3-9 (2017) - [j8]Jisheng Pei, Xiaojun Ye:
Information-Balance-Aware Approximated Summarization of Data Provenance. Sci. Program. 2017: 4504589:1-4504589:11 (2017) - [c50]Zheng Wang, Chaokun Wang, Jisheng Pei, Xiaojun Ye:
Multiple Source Detection without Knowing the Underlying Propagation Model. AAAI 2017: 217-223 - [i2]Qiao Wang, Zheng Wang, Xiaojun Ye:
Equivalence between LINE and Matrix Factorization. CoRR abs/1707.05926 (2017) - 2016
- [j7]Naiqiao Du, Xiaojun Ye, Jianmin Wang:
A semantic-aware data generator for ETL workflows. Concurr. Comput. Pract. Exp. 28(4): 1016-1040 (2016) - [c49]Changping Wang, Chaokun Wang, Hao Wang, Jun Chen, Xiaojun Ye:
Preference Join on Heterogeneous Data. APWeb (2) 2016: 317-329 - [c48]Zheng Wang, Chaokun Wang, Jisheng Pei, Xiaojun Ye, Philip S. Yu:
Causality Based Propagation History Ranking in Social Networks. IJCAI 2016: 3917-3923 - [c47]Jisheng Pei, Lijie Wen, Xiaojun Ye, Akhil Kumar, Zijing Lin:
Transition Adjacency Relation Computation Based on Unfolding: Potentials and Challenges. OTM Conferences 2016: 61-79 - 2015
- [c46]Haowen Zhu, Xiaojun Ye, Xiaojun Zhang, Ke Shen:
A Context-Aware Approach for Dynamic GUI Testing of Android Applications. COMPSAC 2015: 248-253 - [c45]Letong Feng, Yanqing Li, Lin Liu, Xiaojun Ye, Jianmin Wang, Zhanqiang Cao, Xin Peng:
Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical Knowledge. COMPSAC Workshops 2015: 288-295 - [c44]Changping Wang, Chaokun Wang, Jingchao Hao, Hao Wang, Xiaojun Ye:
MAVis: A Multiple Microblogs Analysis and Visualization Tool. DASFAA (2) 2015: 541-545 - [c43]Lin Liu, Jianmin Wang, Xiaojun Ye, Hongji Yang:
A Creative Lifecycle Model for Internetware Based Software Development. Internetware 2015: 124-131 - [i1]Jisheng Pei, Lijie Wen, Xiaojun Ye:
Computation of Transition Adjacency Relations Based on Complete Prefix Unfolding (Technical Report). CoRR abs/1512.00428 (2015) - 2014
- [j6]Lin Liu, Chen Yang, Jianmin Wang, Xiaojun Ye, Yingbo Liu, Hongji Yang, Xiaodong Liu:
Requirements model driven adaption and evolution of Internetware. Sci. China Inf. Sci. 57(6): 1-19 (2014) - [j5]Naiqiao Du, Xiaojun Ye, Jianmin Wang:
A schema aware ETL workflow generator. Inf. Syst. Frontiers 16(3): 453-471 (2014) - [c42]Fei Yang, Xiaojun Ye, Yong Zhang, Chunxiao Xing:
DZMQ: A Decentralized Distributed Messaging System for Realtime Web Applications and Services. IEEE WISA 2014: 165-171 - [c41]Yu Wang, Xiaojun Ye:
Index-Based OLAP Aggregation for In-Memory Cluster Computing. CCBD 2014: 148-151 - [c40]Tianchun Wang, Xiaoming Jin, Xuetao Ding, Xiaojun Ye:
User Interests Imbalance Exploration in Social Recommendation: A Fitness Adaptation. CIKM 2014: 281-290 - [c39]Weiqian Huo, Jisheng Pei, Ke Zhang, Xiaojun Ye:
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration. PAAP 2014: 230-237 - [c38]Jisheng Pei, Xiaojun Ye:
Towards Policy Retrieval for Provenance Based Access Control Model. TrustCom 2014: 769-776 - 2013
- [c37]Yun Wei Zhao, Willem-Jan van den Heuvel, Xiaojun Ye:
Exploring big data in small forms: A multi-layered knowledge extraction of social networks. IEEE BigData 2013: 60-67 - [c36]Zijia Lin, Guiguang Ding, Mingqing Hu, Jianmin Wang, Xiaojun Ye:
Image Tag Completion via Image-Specific and Tag-Specific Linear Sparse Reconstructions. CVPR 2013: 1618-1625 - [c35]Dan Chen, Xiaojun Ye, Jianmin Wang:
A multidimensional data model for TPC-DS benchmarking. Internetware 2013: 21:1-21:4 - [c34]Hongwei Zhao, Xiaojun Ye:
A Practice of TPC-DS Multidimensional Implementation on NoSQL Database Systems. TPCTC 2013: 93-108 - [c33]Hongwei Zhao, Xiaojun Ye:
A Multidimensional OLAP Engine Implementation in Key-Value Database Systems. WBDB 2013: 155-170 - 2012
- [c32]Naiqiao Du, Xiaojun Ye, Jianmin Wang:
Approaches on Getting Workflow Task Execution Number of Times. APSCC 2012: 83-90 - [c31]Tao Li, Xiaojun Ye, Jianmin Wang:
Protecting data confidentiality in cloud systems. Internetware 2012: 18:1-18:12 - 2010
- [c30]Jun Gu, Yuexian Chen, Junning Fu, Huanchun Peng, Xiaojun Ye:
Synthesizing: Art of Anonymization. DEXA (1) 2010: 385-399
2000 – 2009
- 2009
- [j4]Huanchun Peng, Jun Gu, Xiaojun Ye:
Towards Compliance and Accountability: a Framework for Privacy Online. J. Comput. 4(6): 494-501 (2009) - [j3]Xiaojun Ye, Zhiwu Zhu, Yong Peng, Feng Xie:
Privacy Aware Engineering: A Case Study. J. Softw. 4(3): 218-225 (2009) - [c29]Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng:
A Practical Database Intrusion Detection System Framework. CIT (1) 2009: 342-347 - [c28]Lijian Lu, Xiaojun Ye:
An Improved Weighted-Feature Clustering Algorithm for K-anonymity. IAS 2009: 415-418 - [c27]Xiaojun Ye, Zude Li, Bin Li, Feng Xie:
Trust and Privacy in Dissemination Control. ICEBE 2009: 173-180 - [c26]Wenting Ma, Lin Liu, Xiaojun Ye, Jianmin Wang, John Mylopoulos:
Requirements-driven Internetware services evaluation. Internetware 2009: 6 - [c25]Zude Li, Xiaojun Ye, Jianmin Wang:
Trusted resource dissemination in Internetware systems. Internetware 2009: 17 - [c24]Naiqiao Du, Xiaojun Ye, Jianmin Wang:
A configurable benchmark test management framework. Internetware 2009: 25 - [c23]Naiqiao Du, Xiaojun Ye, Jianmin Wang:
Towards workflow-driven database system workload modeling. DBTest 2009 - [c22]Xiaojun Ye, Jingmin Xie, Jianmin Wang, Hao Tang, Naiqiao Du:
An Approach of Performance Evaluation in Authentic Database Applications. TPCTC 2009: 253-266 - 2008
- [j2]Zude Li, Xiaojun Ye:
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control. Int. J. Inf. Secur. Priv. 2(4): 1-21 (2008) - [c21]Yalong Dong, Zude Li, Xiaojun Ye:
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. APWeb 2008: 263-274 - [c20]Jingmin Xie, Xiaojun Ye, Bin Li, Feng Xie:
A Configurable Web Service Performance Testing Framework. HPCC 2008: 312-319 - [c19]Lei Jin, Yawei Zhang, Xiaojun Ye:
An Extensible Data Model with Security Support for Dataspace Management. HPCC 2008: 556-563 - [c18]Xiaojun Ye, Lei Jin, Bin Li:
A Multi-Dimensional K-Anonymity Model for Hierarchical Data. ISECS 2008: 327-332 - [c17]Huanchun Peng, Jun Gu, Xiaojun Ye:
Dynamic Purpose-Based Access Control. ISPA 2008: 695-700 - [c16]Lei Jin, Yawei Zhang, Xiaojun Ye:
Secure Dataspace with Access Policies. ISPA 2008: 701-706 - [c15]Xiaojun Ye, Yawei Zhang, Ming Liu:
A Personalized (a, k)-Anonymity Model. WAIM 2008: 341-348 - 2007
- [c14]Xiaojun Ye, Zude Li, Yongnian Li:
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. DASFAA 2007: 676-687 - [c13]Zhen Li, Xiaojun Ye:
Privacy Protection on Multiple Sensitive Attributes. ICICS 2007: 141-152 - [c12]Wei Li, Xiaoming Jin, Xiaojun Ye:
Detecting Change in Data Stream: Using Sampling Technique. ICNC (1) 2007: 130-134 - [c11]Jinze Li, Xiaojun Ye:
Study on Linked List-based Algorithm for Metarule-guided Mining of Multidimensional Quantitative Association Rules. ICNC (1) 2007: 300-304 - [c10]Hua Zhu, Xiaojun Ye:
Achieving k -Anonymity Via a Density-Based Clustering Method. APWeb/WAIM 2007: 745-752 - [c9]Shenkun Xu, Xiaojun Ye:
Risk & Distortion Based K-Anonymity. WISA 2007: 345-358 - 2006
- [j1]Zude Li, Xiaojun Ye:
Towards a dynamic multi-policy dissemination control model: (DMDCON). SIGMOD Rec. 35(1): 33-38 (2006) - [c8]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Resource Management Continuity With Constraint Inheritance Relation. ARES 2006: 609-616 - [c7]Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang:
Privacy Preservation and Protection by Extending Generalized Partial Indices. BNCOD 2006: 102-114 - [c6]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Towards a More Reasonable Generalization Cost Metric for K-Anonymization. BNCOD 2006: 258-261 - [c5]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. DEXA 2006: 883-893 - [c4]Min Wu, Xiaojun Ye:
Towards the Diversity of Sensitive Attributes in k-Anonymity. IAT Workshops 2006: 98-104 - [c3]Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang:
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. TrustBus 2006: 132-141 - [c2]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. WAIM 2006: 193-204 - 2005
- [c1]Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li:
An Improved Algorithm to Watermark Numeric Relational Data. WISA 2005: 138-149
1990 – 1999
- 1994
- [b1]Xiaojun Ye:
Modélisation et simulation des systèmes de production : une approche orientée-objets. (Object-riented modeling and simulation for manufacturing systems). INSA de Lyon, Lyon - Villeurbanne, France, 1994
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint