Du, Xuehui
~ 300  results:
Search for persons X
?
3

Redactable consortium blockchain based on verifiable distri..:

Wu, Xiangyu ; Du, Xuehui ; Yang, Qiantao..
Journal of Parallel and Distributed Computing.  183 (2024)  - p. 104777 , 2024
 
?
4

Adversarial robust decision-making under uncertainty learni..:

Qin, Ruoxi ; Wang, Linyuan ; Du, Xuehui...
Engineering Applications of Artificial Intelligence.  135 (2024)  - p. 108653 , 2024
 
?
6

TaintGuard: Preventing implicit privilege leakage in smart ..:

Wu, Xiangyu ; Du, Xuehui ; Yang, Qiantao...
Journal of Systems Architecture.  141 (2023)  - p. 102925 , 2023
 
?
7

Image Security Attribute Inference Method Based on Class At..:

, In: 2023 3rd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT),
Li, Feng ; Du, Xuehui ; Liu, Aodi. - p. 1-9 , 2023
 
?
8

Image Measurement Attribute Extraction Method under Large E..:

Li, Feng ; Du, Xuehui ; Liu, Aodi.
Journal of Physics: Conference Series.  2456 (2023)  1 - p. 012006 , 2023
 
?
12

GNN-based Method for Predicting Access Control Relationship..:

, In: 2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI),
Shan, Dibin ; Du, Xuehui ; Wang, Wenjuan. - p. 342-346 , 2022
 
?
13

HB+-MHT: Lightweight and Efficient Data Integrity Verificat..:

Yang, Zhi ; Li, Xiaopeng ; Jin, Shuyuan...
Security and Communication Networks.  2022 (2022)  - p. 1-13 , 2022
 
?
14

An adversarial transferability metric based on SVD of Jacob..:

Qin, Ruoxi ; Wang, Linyuan ; Du, Xuehui...
Applied Intelligence.  53 (2022)  10 - p. 11636-11653 , 2022
 
?
15

Cloud Intrusion Detection Method Based on Stacked Contracti..:

Wang, Wenjuan ; Du, Xuehui ; Shan, Dibin..
IEEE Transactions on Cloud Computing.  10 (2022)  3 - p. 1634-1646 , 2022
 
1-15