default search action
Xuelian Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Weicheng Sun, Jinsheng Xu, Weihan Zhang, Xuelian Li, Yongbin Zeng, Ping Zhang:
Funnel graph neural networks with multi-granularity cascaded fusing for protein-protein interaction prediction. Expert Syst. Appl. 257: 125030 (2024) - [j38]Linqing Xiao, Juntao Gao, Baocang Wang, Xuelian Li:
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values. IET Blockchain 4(1): 1-17 (2024) - [j37]Xuelian Li, Zhuohao Chen, Juntao Gao:
Ciphertext face recognition system based on secure inner product protocol. J. Inf. Secur. Appl. 80: 103681 (2024) - [j36]Xuelian Li, Cheng Shen, Hui Zhu, Yujian Yang, Qing Wang, Jincai Yang, Niu Huang:
A High-Quality Data Set of Protein-Ligand Binding Interactions Via Comparative Complex Structure Modeling. J. Chem. Inf. Model. 64(7): 2454-2466 (2024) - [j35]Bi Wang, Xuelian Li, Yang Chen, Jianqing Wu, Bowen Zeng, Junfu Chen:
Continuous Control With Swarm Intelligence Based Value Function Approximation. IEEE Trans Autom. Sci. Eng. 21(1): 976-988 (2024) - 2023
- [j34]Xuelian Li, Hui Li, Juntao Gao, Runsong Wang:
Privacy preserving via multi-key homomorphic encryption in cloud computing. J. Inf. Secur. Appl. 74: 103463 (2023) - [j33]BoXue Huang, Juntao Gao, Xuelian Li:
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. J. Cloud Comput. 12(1): 37 (2023) - [j32]Yimin Zhao, Xiaofei Wang, Xiao Shi, Xuelian Li:
Research on the Digitization of Yunnan Pu'er Tea Processing Technology. Libr. Trends 71(3): 416-435 (2023) - [j31]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak. Quantum Inf. Comput. 23(3&4): 223-234 (2023) - [j30]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting. Quantum Inf. Process. 22(6): 228 (2023) - [j29]Yangru Zheng, Juntao Gao, Xuelian Li, Baocang Wang:
A polynomial system for bit-based division property solving by quantum algorithm. Quantum Inf. Process. 22(12): 448 (2023) - [c12]Xuelian Li, Xuefeng Han:
Research on Countermeasures and Simulation of R32 Tank Leakage Accident Based on TNO Multienergy Model. BDEIM 2023: 175-180 - [c11]Yikemaiti Sataer, Zhiqiang Gao, Xuelian Li:
Disease Diagnosis with Cost-Sensitive Grouped Features Based on Deep Reinforcement Learning. IJCNN 2023: 1-7 - 2022
- [j28]Dengmei Xiang, Xuelian Li, Juntao Gao, Xiachuan Zhang:
A secure and efficient certificateless signature scheme for Internet of Things. Ad Hoc Networks 124: 102702 (2022) - [j27]Ying Qian, Xuelian Li, Jian Wu, Aimin Zhou, Zhijian Xu, Qian Zhang:
Picture-word order compound protein interaction: Predicting compound-protein interaction using structural images of compounds. J. Comput. Chem. 43(4): 255-264 (2022) - [j26]Ying Qian, Xuelian Li, Jian Wu, Aimin Zhou, Zhijian Xu, Qian Zhang:
Cover Image. J. Comput. Chem. 43(4): i (2022) - [j25]Bi Wang, Jianqing Wu, Xuelian Li, Jun Shen, Yangjun Zhong:
Uncertainty quantification for operators in online reinforcement learning. Knowl. Based Syst. 258: 109998 (2022) - [j24]Juntao Gao, Hao Li, Baocang Wang, Xuelian Li:
AES-128 under HHL algorithm. Quantum Inf. Comput. 22(3&4): 209-240 (2022) - [j23]Juntao Gao, Xinxiang Liu, Xuelian Li, Baocang Wang:
Leakage-Suppressed Range Query Scheme for Structured Data in IoT. IEEE Syst. J. 16(3): 3531-3542 (2022) - [j22]Ying Qian, Xuelian Li, Qian Zhang, Jiongmin Zhang:
SPP-CPI: Predicting Compound-Protein Interactions Based On Neural Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 19(1): 40-47 (2022) - [c10]Hui Li, Xuelian Li, Juntao Gao, Runsong Wang:
Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model. CSS 2022: 342-357 - [i4]Shuang Peng, Shuai Zhu, Minghui Yang, Haozhou Huang, Dan Liu, Zujie Wen, Xuelian Li, Biao Fan:
AdaCoach: A Virtual Coach for Training Customer Service Agents. CoRR abs/2204.12935 (2022) - [i3]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2022: 13 (2022) - [i2]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. IACR Cryptol. ePrint Arch. 2022: 977 (2022) - 2021
- [j21]Xuelian Li, Lisha Chen, Juntao Gao:
An Efficient Data Auditing Protocol With a Novel Sampling Verification Algorithm. IEEE Access 9: 95194-95207 (2021) - [j20]Bi Wang, Xuelian Li, Zhiqiang Gao, Chen Yang:
Gradient compensation traces based temporal difference learning. Neurocomputing 442: 221-235 (2021) - [j19]Bi Wang, Yang Chen, Xuelian Li, Junfu Chen:
Lifelong Classification in Open World With Limited Storage Requirements. Neural Comput. 33(7): 1818-1852 (2021) - [j18]Juntao Gao, Haiyong Yu, Xiuqin Zhu, Xuelian Li:
Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption. IEEE Syst. J. 15(4): 5233-5244 (2021) - [j17]Wei Li, Xuelian Li, Juntao Gao, Haiyu Wang:
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments. IEEE Trans. Dependable Secur. Comput. 18(3): 1276-1290 (2021) - 2020
- [j16]Bi Wang, Xuelian Li, Zhiqiang Gao, Yangjun Zhong:
Risk Aversion Operator for Addressing Maximization Bias in Q-Learning. IEEE Access 8: 43098-43110 (2020) - [j15]Xuelian Li, Bi Wang, Lixin Li, Zhiqiang Gao, Qian Liu, Hancheng Xu, Lanting Fang:
Deep2s: Improving Aspect Extraction in Opinion Mining With Deep Semantic Representation. IEEE Access 8: 104026-104038 (2020) - [j14]Xuelian Li, Yue Han, Juntao Gao, Jie Niu:
Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1): 99-110 (2020) - [j13]Jie Niu, Xuelian Li, Juntao Gao, Yue Han:
Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT. IEEE Internet Things J. 7(2): 1502-1518 (2020) - [j12]Juntao Gao, Tong Wu, Xuelian Li:
Secure, fair and instant data trading scheme based on bitcoin. J. Inf. Secur. Appl. 53: 102511 (2020) - [j11]Zhibin Quan, Weili Zeng, Xuelian Li, Yandong Liu, Yunxiu Yu, Wankou Yang:
Recurrent Neural Networks With External Addressable Long-Term and Working Memory for Learning Long-Term Dependences. IEEE Trans. Neural Networks Learn. Syst. 31(3): 813-826 (2020)
2010 – 2019
- 2019
- [j10]Xuelian Li, Shang Zhang, Bi Wang, Zhiqiang Gao, Lanting Fang, Hancheng Xu:
A Hybrid Framework for Problem Solving of Comparative Questions. IEEE Access 7: 185961-185976 (2019) - [j9]Haiyu Wang, Xuelian Li, Juntao Gao, Wei Li:
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions. Future Gener. Comput. Syst. 101: 315-326 (2019) - [j8]Lijuan Guo, Xuelian Li, Juntao Gao:
Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin. Int. J. Netw. Secur. 21(1): 71-82 (2019) - [j7]Liyan Wang, Juntao Gao, Xuelian Li:
Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security. Int. J. Netw. Secur. 21(5): 774-784 (2019) - [j6]Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li:
Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s). J. Inf. Secur. Appl. 47: 65-77 (2019) - [j5]Xuelian Li, Jie Niu, Juntao Gao, Yue Han:
Secure Electronic Ticketing System based on Consortium Blockchain. KSII Trans. Internet Inf. Syst. 13(10): 5219-5243 (2019) - [c9]Haiyong Yu, Juntao Gao, Tong Wu, Xuelian Li:
A Novel Fair and Verifiable Data Trading Scheme. FCS 2019: 308-326 - [c8]Xue Wang, Youtian Du, Xuelian Li, Fuyuan Cao, Chang Su:
Embedded Representation of Relation Words with Visual Supervision. IRC 2019: 409-412 - 2018
- [j4]Zhibin Quan, Zhiqiang Gao, Weili Zeng, Xuelian Li, Man Zhu:
On the Duration, Addressability, and Capacity of Memory-Augmented Recurrent Neural Networks. IEEE Access 6: 12462-12472 (2018) - [c7]Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li:
Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security. FCS 2018: 138-152 - [c6]Danni Wang, Juntao Gao, Haiyong Yu, Xuelian Li:
A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. FCS 2018: 227-240 - 2017
- [c5]Lijuan Guo, Xuelian Li, Xiaolin Lv, Juntao Gao:
Anonymous Fair Exchange Protocol with a Semitrusted Third Party. DSC 2017: 431-440 - [c4]Feifei Xu, Huiying Li, Xuelian Li:
Named entity recognition in the domain of geographical subject. ICNC-FSKD 2017: 2229-2234 - [c3]Xuelian Li, Qian Liu, Man Zhu, Feifei Xu, Yunxiu Yu, Shang Zhang, Zhaoxi Ni, Zhiqiang Gao:
Geography Gaokao-Oriented Knowledge Acquisition for Comparative Sentences Based on Logic Programming. NLPCC 2017: 101-113 - 2012
- [j3]Juntao Gao, Yupu Hu, Xuelian Li:
Linear spans of optimal sets of frequency hopping sequences. RAIRO Theor. Informatics Appl. 46(3): 343-354 (2012) - 2011
- [j2]Xuelian Li, Yupu Hu, Juntao Gao:
On the value distributions of Walsh spectrums of quadratic Plateaued functions. Comput. Electr. Eng. 37(6): 849-857 (2011) - [j1]Xuelian Li, Yupu Hu, Juntao Gao:
Lower Bounds on the Second Order nonlinearity of Boolean Functions. Int. J. Found. Comput. Sci. 22(6): 1331-1349 (2011) - [c2]Juntao Gao, Xuelian Li:
Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets. INCoS 2011: 108-114 - 2010
- [i1]Xuelian Li, Yupu Hu, Juntao Gao:
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions. IACR Cryptol. ePrint Arch. 2010: 9 (2010)
2000 – 2009
- 2009
- [c1]Xuelian Li, Yao Sun, Hongwei Mo, Kejun Wang:
Study of the GM(1, 1) Model and Improved Model of the Trend Term of Micromechanical Gyroscope Drift. CSO (2) 2009: 221-223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint