关注
xie xueshuo
xie xueshuo
在 nankai.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Confidence guided anomaly detection model for anti-concept drift in dynamic logs
X Xie, Z Jin, J Wang, L Yang, Y Lu, T Li
Journal of network and computer applications 162, 102659, 2020
182020
AWAP: Adaptive weighted attribute propagation enhanced community detection model for bitcoin de-anonymization
X Xueshuo, W Jiming, Y Junyi, F Yaozheng, L Ye, L Tao, W Guiling
Applied Soft Computing 109, 107507, 2021
142021
An efficient log parsing algorithm based on heuristic rules
L Zhang, X Xie, K Xie, Z Wang, Y Lu, Y Zhang
Advanced Parallel Processing Technologies: 13th International Symposium …, 2019
132019
Trusted-dnn: A trustzone-based adaptive isolation strategy for deep neural networks
Z Liu, Y Lu, X Xie, Y Fang, Z Jian, T Li
Proceedings of the ACM Turing Award Celebration Conference-China, 67-71, 2021
122021
ATOM: Architectural support and optimization mechanism for smart contract fast update and execution in blockchain-based IoT
T Li, Y Fang, Z Jian, X Xie, Y Lu, G Wang
IEEE Internet of Things Journal 9 (11), 7959-7971, 2021
92021
A confidence-guided evaluation for log parsers inner quality
X Xie, Z Wang, X Xiao, Y Lu, S Huang, T Li
Mobile Networks and Applications 26, 1638-1649, 2021
92021
Blockchain-driven anomaly detection framework on edge intelligence
X Xie, Y Fang, Z Jian, Y Lu, T Li, G Wang
CCF Transactions on Networking 3 (3), 171-192, 2020
92020
Fast Policy Interpretation and Dynamic Conflict Resolution for Blockchain‐Based IoT System
Y Fang, Z Jian, Z Jin, X Xie, Y Lu, T Li
Wireless Communications and Mobile Computing 2021 (1), 9968743, 2021
52021
DRS: A deep reinforcement learning enhanced Kubernetes scheduler for microservice‐based system
Z Jian, X Xie, Y Fang, Y Jiang, Y Lu, A Dash, T Li, G Wang
Software: Practice and Experience, 2023
42023
A confidence-guided anomaly detection approach jointly using multiple machine learning algorithms
X Xie, Z Jin, Q Han, S Huang, T Li
Cyberspace Safety and Security: 11th International Symposium, CSS 2019 …, 2019
42019
Sysnif: A log-based workflow construction method and performance measurement in intelligent IoT system
Z Jian, Z Jin, XS Xie, Y Lu, G Li, X Chen, T Baker
Measurement 186, 110175, 2021
32021
A pvalue-guided anomaly detection approach combining multiple heterogeneous log parser algorithms on IIoT systems
X Xie, Z Wang, X Xiao, L Yang, S Huang, T Li
arXiv preprint arXiv:1907.02765, 2019
32019
Quantitative evaluation of deep learning frameworks in heterogeneous computing environment
Z Lu, C Du, Y Jiang, X Xie, T Li, F Yang
CCF Transactions on High Performance Computing 6 (1), 94-111, 2024
22024
Block-gram: mining knowledgeable features for efficiently smart contract vulnerability detection
X Xie, H Wang, Z Jian, Y Fang, Z Wang, T Li
Digital Communications and Networks, 2023
22023
TSC-VEE: A trustzone-based smart contract virtual execution environment
Z Jian, Y Lu, Y Qiao, Y Fang, X Xie, D Yang, Z Zhou, T Li
IEEE Transactions on Parallel and Distributed Systems 34 (6), 1773-1788, 2023
22023
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing
J Wang, X Xie, Y Fang, Y Lu, T Li, G Wang
Machine Learning for Cyber Security: Third International Conference, ML4CS …, 2020
12020
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
X Xie, H Wang, Z Jian, T Li, W Wang, Z Xu, G Wang
arXiv preprint arXiv:2403.12568, 2024
2024
ResEnsemble-DDPM: Residual Denoising Diffusion Probabilistic Models for Ensemble Learning
S Zhenning, D Changsheng, X Xueshuo, P Bin, H Along, L Tao
arXiv preprint arXiv:2312.01682, 2023
2023
Resfusion: Prior Residual Noise embedded Denoising Diffusion Probabilistic Models
S Zhenning, D Changsheng, P Bin, X Xueshuo, H Along, Q Qiaoying, ...
arXiv preprint arXiv:2311.14900, 2023
2023
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection
T Li, H Wang, Y Fang, Z Jian, Z Wang, X Xie
International Conference on Smart Computing and Communication, 546-557, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20