default search action
Xiaolong Lan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. Comput. J. 67(3): 851-863 (2024) - [j28]Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li:
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning. Comput. J. 67(5): 1747-1762 (2024) - [j27]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024) - [j26]Tianheng Wang, Shuo Wang, Xiaolong Lan, Yong Liu, Qingchun Chen, Pei Xiao:
On the AoI-Aware Status Update in Buffer-Aided Wireless-Powered Internet of Things Network. IEEE Internet Things J. 11(7): 12551-12566 (2024) - [j25]Xiaolong Lan, Ziheng Xu, Junjiang He, Liang Liu, Qingchun Chen, Tao Li:
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication. IEEE Internet Things J. 11(9): 15940-15956 (2024) - [j24]Qingquan Zhang, Ziheng Xu, Xiaolong Lan, Jialin Chen, Junjiang He, Wengang Ma, Qingchun Chen:
Optimal Age of Information and Throughput Scheduling in Heterogeneous Traffic Wireless Physical-Layer Security Communications. IEEE Internet Things J. 11(13): 23644-23660 (2024) - [j23]Junjiang He, Yaxin Li, Jiahang Tang, Hongxia Wang, Geying Yang, Tao Li, Xiaolong Lan:
An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model. IEEE Internet Things J. 11(18): 29956-29970 (2024) - [j22]Geying Yang, Junjiang He, Xiaolong Lan, Tao Li, Wenbo Fang:
A fast dual-module hybrid high-dimensional feature selection algorithm. Inf. Sci. 681: 121185 (2024) - [j21]Yuan Yao, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. IEEE Trans. Dependable Secur. Comput. 21(4): 2852-2868 (2024) - [j20]Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - 2023
- [j19]Yongbin Zhu, Tao Li, Xiaolong Lan:
Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation. Appl. Intell. 53(11): 13972-13992 (2023) - [j18]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023) - [j17]Linfeng Du, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yunhua Huang:
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range. Comput. Secur. 129: 103202 (2023) - [j16]Yuxuan Luan, Junjiang He, Jingmin Yang, Xiaolong Lan, Geying Yang:
Uniformity-Comprehensive Multiobjective Optimization Evolutionary Algorithm Based on Machine Learning. Int. J. Intell. Syst. 2023: 1-21 (2023) - [j15]Ge Zhang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023) - [j14]Wenbo Fang, Junjiang He, Wenshan Li, Xiaolong Lan, Yang Chen, Tao Li, Jiwu Huang, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - [c10]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359 - 2022
- [j13]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - [c9]Runhao Yu, Yong Liu, Xiaolong Lan, Qingchun Chen:
Optimal Offloading Percentage for Fresh Status Updates in Mobile Edge Computing Networks. ICCCS 2022: 524-529 - [c8]Guang Yang, Yong Liu, Xiaolong Lan, Qingchun Chen:
On the Energy Constrained Data Collection in Multi-UAV-enabled Wireless Sensor Networks. ICCCS 2022: 638-643 - 2021
- [j12]Junjiang He, Tao Li, Beibei Li, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. Comput. Secur. 102: 102134 (2021) - [j11]Yihong Li, Yunpeng Wang, Tao Li, Xiaolong Lan, Han Song:
GNN-DBSCAN: A new density-based algorithm using grid and the nearest neighbor. J. Intell. Fuzzy Syst. 41(6): 7589-7601 (2021) - [j10]Yihong Li, Yunpeng Wang, Tao Li, Beibei Li, Xiaolong Lan:
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique. Knowl. Based Syst. 228: 107269 (2021) - [j9]Yulong Nie, Xiaolong Lan, Yong Liu, Qingchun Chen, Gaojie Chen, Lisheng Fan, Dong Tang:
Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks. IEEE Trans. Inf. Forensics Secur. 16: 1610-1625 (2021) - [c7]Yongwei Fu, Yong Liu, Xiaolong Lan, Qingchun Chen:
On the Achievable Rate of Multi-Hop Buffer-Aided Relay Networks. ICCCS 2021: 626-631 - [c6]Zheng Zhang, Yongwei Fu, Gang Cheng, Xiaolong Lan, Qingchun Chen:
Secure Offloading Design in Multi-user Mobile-Edge Computing Systems. ICCCS 2021: 695-703 - [c5]Junjie Chen, Yong Liu, Qingchun Chen, Xiaolong Lan, Gang Cheng, Yongwei Fu, Zheng Zhang:
On the Adaptive AoI-aware Buffer-aided Transmission Scheme for NOMA Networks. WCNC 2021: 1-6 - 2020
- [j8]Xiaolong Lan, Yongmin Zhang, Lin Cai, Qingchun Chen:
Adaptive Transmission Design for Rechargeable Wireless Sensor Network With a Mobile Sink. IEEE Internet Things J. 7(9): 9011-9025 (2020) - [j7]Xiaolong Lan, Yongmin Zhang, Qingchun Chen, Lin Cai:
Energy Efficient Buffer-Aided Transmission Scheme in Wireless Powered Cooperative NOMA Relay Network. IEEE Trans. Commun. 68(3): 1432-1447 (2020) - [j6]Xiaolong Lan, Juanjuan Ren, Qingchun Chen, Lin Cai:
Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems. IEEE Trans. Inf. Forensics Secur. 15: 3311-3324 (2020) - [j5]Yongmin Zhang, Xiaolong Lan, Ju Ren, Lin Cai:
Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks. IEEE/ACM Trans. Netw. 28(3): 1227-1240 (2020) - [j4]Xiaolong Lan, Yi Chen, Lin Cai:
Throughput-Optimal H-QMW Scheduling for Hybrid Wireless Networks With Persistent and Dynamic Flows. IEEE Trans. Wirel. Commun. 19(2): 1182-1195 (2020)
2010 – 2019
- 2019
- [j3]Yongmin Zhang, Xiaolong Lan, Yue Li, Lin Cai, Jianping Pan:
Efficient Computation Resource Management in Mobile Edge-Cloud Computing. IEEE Internet Things J. 6(2): 3455-3466 (2019) - [j2]Xiaolong Lan, Qingchun Chen, Lin Cai, Lisheng Fan:
Buffer-Aided Adaptive Wireless Powered Communication Network With Finite Energy Storage and Data Buffer. IEEE Trans. Wirel. Commun. 18(12): 5764-5779 (2019) - [c4]Lei Zhao, Xiaolong Lan, Lin Cai, Jianping Pan:
Adaptive Content Placement in Edge Networks Based on Hybrid User Preference Learning. GLOBECOM 2019: 1-6 - [c3]Xiaolong Lan, Lin Cai, Qingchun Chen:
Execution Latency and Energy Consumption Tradeoff in Mobile-Edge Computing Systems. ICCC 2019: 123-128 - 2018
- [j1]Xiaolong Lan, Qingchun Chen, Xiaohu Tang, Lin Cai:
Achievable Rate Region of the Buffer-Aided Two-Way Energy Harvesting Relay Network. IEEE Trans. Veh. Technol. 67(11): 11127-11142 (2018) - [c2]Xiaolong Lan, Qingchun Chen, Lin Cai:
Wireless Powered Buffer-Aided Communication Over $K$-User Interference Channel. VTC Fall 2018: 1-6 - 2016
- [c1]Xiaolong Lan, Qingchun Chen, Xiaohu Tang:
On the transmit power and delivery delay tradeoff in buffer-aided two-way relay networks. ICCC 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint