Xiaohui Li

ORCID: 0000-0003-0776-265X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Visual Attention and Saliency Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Orbital Angular Momentum in Optics
  • Adversarial Robustness in Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Random lasers and scattering media
  • Radio Astronomy Observations and Technology
  • Software Engineering Research
  • Image Enhancement Techniques
  • Electromagnetic Scattering and Analysis
  • Cloud Computing and Resource Management
  • Recycling and Waste Management Techniques
  • Video Surveillance and Tracking Methods
  • IoT and Edge/Fog Computing
  • Electric Vehicles and Infrastructure
  • Cloud Computing and Remote Desktop Technologies
  • Generative Adversarial Networks and Image Synthesis

Sichuan University
2022-2025

State Grid Corporation of China (China)
2024

Real-time and accurate prediction of charging pile energy demands in electric vehicle (EV) networks contributes significantly to load shedding conservation. However, existing methods usually suffer from either data privacy leakage problems or heavy communication overheads. In this article, we propose a novel blockchain-based personalized federated deep learning scheme, coined <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math...

10.1109/tii.2022.3182972 article EN IEEE Transactions on Industrial Informatics 2022-06-14

Rising cyber threats have created an immediate demand for Deep Learning (DL) in cybersecurity. Nevertheless, the opaque nature of DL models poses challenges deploying, collaborating, and assessing their effectiveness less reliable cybersecurity environments. Despite eXplainable Artificial Intelligence (XAI) playing a role enhancing analytics, limited task scope, propensity data overfitting, stochastic explanations hinder its broader application. To fill gap, this paper introduces generic...

10.1109/tifs.2024.3372808 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Vortex electromagnetic (EM) waves, with different orbital angular momentum (OAM) modes, have the ability to distinguish azimuth of radar targets, and then two-dimensional reconstruction targets can be achieved. However, vortex EM wave imaging methods in published research no obtain elevation thus, three-dimensional spatial structure richer feature information target cannot obtained. Therefore, a method waves integer- fractional-order OAM modes is proposed this paper, which realize based on...

10.3390/rs15112903 article EN cc-by Remote Sensing 2023-06-02

Topology inference driven by non-collaborative or incomplete prior knowledge is widely used in pivotal target network sieving and completion. However, perceivable topology also allows attackers to identify the fragile bottlenecks perform efficacious attacks that are difficult defend against injecting indistinguishable low-volume attacks. Most existing countermeasures proposed obfuscate data set up honeypots with adversarial examples. there two challenges when adding perturbations live links...

10.2139/ssrn.4758548 preprint EN 2024-01-01

Cloud desktop represents an outstanding product in the domain of cloud computing, which refers to cloud, virtualization and virtual desktop. explores technology concentrate computing resources, delivers traditional computer desktops (operating system interfaces) or applications deployed pooled resources polymorphic terminals through Internet. As a distinctive has been hot topic since its inception. Today, virtualized resource pool achieves elastic dynamic expansion brings from independent...

10.3390/electronics12071572 article EN Electronics 2023-03-27
Coming Soon ...