default search action
Jiuyun Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang:
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning. Computing 106(5): 1659-1679 (2024) - [j19]Jiuyun Xu, Xuemei Cao, Qiang Duan, Shibao Li:
Service Function Chain Deployment Using Deep Q Learning and Tidal Mechanism. IEEE Internet Things J. 11(3): 5401-5416 (2024) - [j18]Shibao Li, Chengsuo Zhao, Ziyi Tang, Xuerong Cui, Yujie Song, Zhihao Cui, Jianhang Liu, Jiuyun Xu:
A One-bit quantized low-sampling-rate timing recovery algorithm based on cyclic correlation preservation for millimeter wave communication. Phys. Commun. 66: 102397 (2024) - [j17]Jiuyun Xu, Hanfei Fan, Qiqi Wang, Yinyue Jiang, Qiang Duan:
Adaptive Idle Model Fusion in Hierarchical Federated Learning for Unbalanced Edge Regions. IEEE Trans. Netw. Sci. Eng. 11(5): 4603-4616 (2024) - 2023
- [j16]Jiuyun Xu, Yue Zhang, Qiang Duan:
Concept drift detection and localization framework based on behavior replacement. Appl. Intell. 53(13): 16776-16796 (2023) - [j15]Jinwen Xi, Guosheng Xu, Shihong Zou, Yueming Lu, Guoqiang Li, Jiuyun Xu, Ruisheng Wang:
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT. IEEE Internet Things J. 10(16): 14896-14907 (2023) - [j14]Shibao Li, Zekun Jia, Yixuan Liu, Xuerong Cui, Jianhang Liu, Tingpei Huang, Jiuyun Xu:
CLS-DETR: A DETR-series object detection network using classification information to accelerate convergence. Pattern Recognit. Lett. 165: 168-175 (2023) - [j13]Jiuyun Xu, Xingru Zhao:
FPSA-SMS: first price sealed auction-based service migration strategy in mobile edge computing. J. Supercomput. 79(6): 5920-5938 (2023) - 2022
- [j12]Jiuyun Xu, Shan Sun, Miao Li:
An optimal strategy with various QoS requirement for data fusion for Internet of Things. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - 2021
- [j11]Jiuyun Xu, Lele Liu, Ruru Zhang, Jin Xie, Qiang Duan, Leyi Shi:
IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments. IEEE Access 9: 18112-18122 (2021) - [j10]Jie Liu, Jiuyun Xu, Ruru Zhang, Stephan Reiff-Marganiec:
A repairing missing activities approach with succession relation for event logs. Knowl. Inf. Syst. 63(2): 477-495 (2021)
2010 – 2019
- 2019
- [j9]Jiuyun Xu, Jie Liu:
A Profile Clustering Based Event Logs Repairing Approach for Process Mining. IEEE Access 7: 17872-17881 (2019) - [j8]Jiuyun Xu, Zhuangyuan Hao, Ruru Zhang, Xiaoting Sun:
A Method Based on the Combination of Laxity and Ant Colony System for Cloud-Fog Task Scheduling. IEEE Access 7: 116218-116226 (2019) - [j7]Jiuyun Xu, Chao Zhang:
Semantic connection set-based massive RDF data query processing in Spark environment. EURASIP J. Wirel. Commun. Netw. 2019: 256 (2019) - [j6]Jiuyun Xu, Zhuangyuan Hao, Xiaoting Sun:
Optimal Offloading Decision Strategies and Their Influence Analysis of Mobile Edge Computing. Sensors 19(14): 3231 (2019) - 2018
- [j5]Jiuyun Xu, Shuang Liu, Xiaoxuan Lu, Li Li, Hongliang Liang, Qiang Duan, Runjie Liu:
A Temporal Adaptive Access Mechanism for Data Fusion in an IoT Environment. Sensors 18(12): 4205 (2018) - [c18]Jiuyun Xu, Chao Guan, Xiangrui Xu:
Energy-Efficiency for Smartphones Using Interaction Link Prediction in Mobile Cloud Computing. ChineseCSCW 2018: 517-526 - 2017
- [j4]Xin Liu, Feng Wang, Yang Yang, Jiuyun Xu, Pingjun Zou, Yiwen Wang:
Defense against malicious URL spreading in micro-blog network with hub nodes. Concurr. Comput. Pract. Exp. 29(14) (2017) - 2016
- [j3]Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:
MLSA: a static bugs analysis tool based on LLVM IR. Int. J. Networked Distributed Comput. 4(3): 137-144 (2016) - [j2]Jiuyun Xu, Xiao Ning, Stephan Reiff-Marganiec, Qiang Duan, Zibin Zheng:
Run-time resolution of service property conflicts in web service composition. Int. J. Web Grid Serv. 12(2): 142-161 (2016) - [c17]Hongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu:
A Correctness Verification Method for C Programs Based on VCC. CSCloud 2016: 172-177 - [c16]Jiuyun Xu, Zhaotong Li, Huanxing Chi, Muhan Wang, Chao Guan, Stephan Reiff-Marganiec, Huilin Shen:
Optimized Composite Service Transactions through Execution Results Prediction. ICWS 2016: 690-693 - [c15]Jiuyun Xu, Dan Yang, Jiazhen Wang, Chao Guan, Stephan Reiff-Marganiec, Huilin Shen:
Increasing Energy Efficiency on Smartphones through Data Forecashing. IEEE MS 2016: 150-155 - [c14]Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:
MLSA: A static bugs analysis tool based on LLVM IR. SNPD 2016: 407-412 - 2015
- [c13]Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma:
Survey on Privacy Protection of Android Devices. CSCloud 2015: 241-246 - [c12]Jiuyun Xu, Dan Jiang, Bin Wang, Dan Yang, Stephan Reiff-Marganiec:
Local Reputation Management in Cloud Computing. SERVICES 2015: 261-267 - 2014
- [c11]Jiuyun Xu, Xiao Ning, Nan Xu, Di Li, Stephan Reiff-Marganiec:
A Utility-Aware Runtime Conflict Resolver for Composite Web Services. ICWS 2014: 682-683 - 2013
- [c10]Jiuyun Xu, Ruru Zhang, Kunming Xing, Stephan Reiff-Marganiec:
Service Discovery Using Ontology Encoding Enhanced by Similarity of Information Content. SERVICES 2013: 209-214 - 2011
- [j1]Jiuyun Xu, Kun Chen, Stephan Reiff-Marganiec:
Using Markov Decision Process Model with Logic Scoring of Preference Model to Optimize HTN Web Services Composition. Int. J. Web Serv. Res. 8(2): 53-73 (2011) - [c9]Jiuyun Xu, Kun Chen, Youxiang Duan, Stephan Reiff-Marganiec:
Modeling Business Process of Web Services with an Extended STRIPS Operations to Detection Feature Interaction Problems Runtime. ICWS 2011: 516-523 - [c8]Huayu Li, Jiuyun Xu:
A Method of Building Domain Knowledge Base from XML Based on Semantic Views. SKG 2011: 207-210 - 2010
- [c7]Jiuyun Xu, Wengong Yu, Kun Chen, Stephan Reiff-Marganiec:
Web Services Feature Interaction Detection Based on Situation Calculus. SERVICES 2010: 213-220
2000 – 2009
- 2009
- [c6]Lixiang Wang, Jiuyun Xu, Stephan Reiff-Marganiec:
Online Detection of Feature Interactions of CPL Services. ICFI 2009: 19-33 - [c5]Huili Xuan, Jiuyun Xu:
Web Services Feature Interaction Detection Based on Graph Transformation - A New Interaction Detection Method (work-in-progress paper). ICFI 2009: 242-249 - [c4]Kun Chen, Jiuyun Xu, Stephan Reiff-Marganiec:
Markov-HTN Planning Approach to Enhance Flexibility of Automatic Web Service Composition. ICWS 2009: 9-16 - 2008
- [c3]Jiuyun Xu, Stephan Reiff-Marganiec:
Towards Heuristic Web Services Composition Using Immune Algorithm. ICWS 2008: 238-245 - [c2]Pingli Gu, Jiuyun Xu, Changbao Li, Youxiang Duan:
Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction. NPC Workshops 2008: 407-411 - 2007
- [c1]Jiuyun Xu, Changbao Li, Youxiang Duan:
A Web Services Composition With Well Structured. ICNC (5) 2007: 310-316
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint