default search action
Xiuxia Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Xiuxia Tian, Mengting Zhang, Guanyu Lu:
Power line insulator defect detection using CNN with dense connectivity and efficient attention mechanism. Multim. Tools Appl. 83(10): 28305-28322 (2024) - [j16]Jianhao Xing, Xiuxia Tian, Yi Han:
A Dual-channel Augmented Attentive Dense-convolutional Network for power image splicing tamper detection. Neural Comput. Appl. 36(15): 8301-8316 (2024) - [j15]Xiuxia Tian, Jianren Zhao, Longfang Wen:
DUFormer: dual-channel image splicing detection based on anchor-shaped U-Net and stepwise transformer for power systems. Signal Image Video Process. 18(10): 7237-7245 (2024) - 2023
- [j14]Mengting Zhang, Xiuxia Tian:
A Transformer Architecture based mutual attention for Image Anomaly Detection. Virtual Real. Intell. Hardw. 5(1): 57-67 (2023) - 2022
- [j13]Guoshuai Zhou, Xiuxia Tian, Aoying Zhou:
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images. Frontiers Comput. Sci. 16(4): 164705 (2022) - 2021
- [j12]Guanyu Lu, Xiuxia Tian:
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM. Secur. Commun. Networks 2021: 6631075:1-6631075:21 (2021) - [j11]Xiuxia Tian, Can Li, Bo Zhao:
A Novel Classification Model SA-MPCNN for Power Equipment Defect Text. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(6): 105:1-105:21 (2021) - 2020
- [j10]Jiaxun Hua, Yu Liu, Yibin Shen, Xiuxia Tian, Yifeng Luo, Cheqing Jin:
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services. Frontiers Comput. Sci. 14(3): 143605 (2020) - [j9]Xiuxia Tian, Guoshuai Zhou, Man Xu:
Image copy-move forgery detection algorithm based on ORB and novel similarity metric. IET Image Process. 14(10): 2092-2100 (2020) - [j8]Jiaxun Hua, Yu Liu, He Chen, Xiuxia Tian, Cheqing Jin:
An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23(3): 2185-2214 (2020) - 2019
- [j7]Xiuxia Tian, Fuliang Tian, Anqin Zhang, Xi Chen:
Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering. Int. J. Netw. Secur. 21(1): 62-70 (2019) - 2018
- [j6]Xiuxia Tian, Qian Song, Fuliang Tian:
Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy. Int. J. Netw. Secur. 20(6): 1137-1148 (2018) - 2016
- [j5]Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li, Chunhua Gu:
Secret Share Based Program Access Authorization Protocol for Smart Metering. Int. J. Netw. Secur. 18(6): 1071-1079 (2016) - 2015
- [j4]Yajun Du, Xiuxia Tian, Wenjun Liu, Min Wang, Wen Song, Yongquan Fan, Xiaoming Wang:
A novel page ranking algorithm based on triadic closure and hyperlink-induced topic search. Intell. Data Anal. 19(5): 1131-1149 (2015) - [j3]Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang:
DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS. Secur. Commun. Networks 8(8): 1494-1508 (2015) - [j2]Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou:
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework. IEEE Trans. Knowl. Data Eng. 27(12): 3217-3230 (2015) - 2013
- [j1]Xiuxia Tian, Xiaoling Wang, Aoying Zhou:
DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS. Int. J. Netw. Secur. 15(1): 28-41 (2013)
Conference and Workshop Papers
- 2024
- [c18]Xiaoyu Niu, Xiuxia Tian:
Efficient Verifiable Range Query For The Light Client in DBaaS. ICCDE 2024: 1-7 - [c17]Yunfei He, Xiuxia Tian:
Robust Contrastive Learning: PSSI - Image Entropy Positive Samples with Semantic Invariance. ICSCA 2024: 237-241 - [c16]Xiuxia Tian, Zhuang Pei, Bingxue Li:
Subject Knowledge Entity Relationship Extraction Based on Multi-feature Fusion and Relation Specific Horns Tagging. KSEM (1) 2024: 255-267 - 2023
- [c15]Yingru Lu, Xiuxia Tian:
Efficient Privacy-preserving Multi-Dimensional Range Query with Hierarchical Hilbert Code-based Tree. ICCCM 2023: 205-214 - [c14]Zhaochen Wang, Xiuxia Tian:
Power Equipment Nameplate Text Detection Based on Improved Multiscale Feature Fusion Network. ICDIP 2023: 40:1-40:8 - [c13]Yuan Wei, Xiuxia Tian:
Deep Learning-Based Attribute Optimization Method for ABAC. ISDFS 2023: 1-5 - [c12]Siqi Xie, Xiuxia Tian:
Fused Syntactic and Semantic Parsing for Measuring Privacy Level in Unstructured Text. ISDFS 2023: 1-6 - 2018
- [c11]He Chen, Xiuxia Tian, Cheqing Jin:
Fuzzy Searching Encryption with Complex Wild-Cards Queries on Encrypted Database. APWeb/WAIM (2) 2018: 3-18 - [c10]Jiaxun Hua, Yu Liu, Yibin Shen, Xiuxia Tian, Cheqing Jin:
DCA: The Advanced Privacy-Enhancing Schemes for Location-Based Services. APWeb/WAIM (2) 2018: 63-71 - 2016
- [c9]Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou:
CloudKeyBank: Privacy and owner authorization enforced key management framework. ICDE 2016: 1478-1479 - [c8]Dapeng Zhao, Jiansong Ma, Xiaoling Wang, Xiuxia Tian:
Personalized Location Anonymity - A Kernel Density Estimation Approach. WAIM (2) 2016: 52-64 - 2012
- [c7]Xiuxia Tian, Yangli Song, Xiaoling Wang, Xueqing Gong:
Shortest Path Based Potential Common Friend Recommendation in Social Networks. CGC 2012: 541-548 - 2011
- [c6]Xiuxia Tian, Chaofeng Sha, Xiaoling Wang, Aoying Zhou:
Privacy Preserving Query Processing on Secret Share Based Data Storage. DASFAA (1) 2011: 108-122 - [c5]Xiuxia Tian, Chaofeng Sha, Xiaoling Wang, Aoying Zhou:
Privacy Preserving Personalized Access Control Service at Third Service Provider. ICWS 2011: 694-695 - [c4]Xiuxia Tian, Xiaoling Wang, Aoying Zhou:
A Privacy Preserving Selective Authorization Enforcement Approach in Daas. SERVICES 2011: 363-370 - 2009
- [c3]Xiuxia Tian, Xiaoling Wang, Aoying Zhou:
DSP RE-Encryption: A Flexible Mechanism for Access Control Enforcement Management in DaaS. IEEE CLOUD 2009: 25-32 - [c2]Hongjiao Li, Xiuxia Tian:
Research of Trust Chain of Operating System. AICI 2009: 96-102 - [c1]Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu:
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. WISM 2009: 413-425
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint