近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
H. Gu, X. Zhang, J. Li, H. Wei, B. Li, and X. Huang*, “Federated Learning Vulnerabilities: Privacy Attacks with Denoising Diffusion Probabilistic Models,” accepted, to appear in Proceedings of the 33th Web Conference (WWW’2024), Singapore, May 13~17, 2024.
B. Li, Z. Chen, Y. Liu, Y. Ma, H. Gu, and X. Huang*, “Federated Learning on Distributed Graphs considering Multiple Heterogeneities,” accepted, to appear in Proceedings of the 49th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’2024), Seoul, Korea, 14~19 April 2024.
C. Yan, X. Huang*, H. Gu and S. Meng, “SimulE: A novel convolution-based model for knowledge graph embedding,” In Proceedings of the 26th Interna-tional Conference on Computer Supported Cooperative Work in Design (CSCWD’2023), Rio de Janeiro, Brazil, May 24~26, 2023.
Y. Wen, F. Lu, Y. Liu, and X. Huang*, Attacks and Countermeasures on Blockchains: A Survey from Layering Perspective, Computer Networks, Volume 191, 22 May 2021, 107978. DOI: 10.1016/j.comnet.2021.107978
X. Huang, P. Shi, Y. Liu, and F. Xu, Towards Trusted and Efficient SDN Topology Discovery: A Lightweight Topology Verification Scheme, Computer Networks, Volume 170, 7 April 2020, 107119. DOI: 10.1016/j.comnet.2020.107119
F. Lu, P. Cong, and X. Huang*, Utilizing Textual Information in Knowledge Graph Embedding: A Survey of Methods and Applications, IEEE Access, vol. 8, pp. 92072-92088, 2020
X. Huang, F. Li, K. Cao, T. Wei and S. Hu, Queueing Theoretic Approach for Performance-Aware Modeling of Sustainable SDN Control Planes, IEEE Transactions on Sustainable Computing, vol.5, no. 1, pp. 121-133, 2020. DOI: 10.1109/TSUSC.2018.2889561
X. Huang, S. Cheng, K. Cao, P. Cong, T. Wei and S. Hu, A Survey of Deployment Solutions and Optimization Strategies for Hybrid SDN Networks, IEEE Communications Surveys and Tutorials, vol. 21, no. 2, pp. 1483-1507, 2019. DOI: 10.1109/COMST.2018.2871061, (2021 Journal Impact Factor: 33.84, ranking Top#1 for impact and citations in all IEEE publications according to the Thomson Reuters Journal Citation Reports)
Y. Liu, S. Cheng, and X. Huang*, Towards Web-scale and Energy-efficient Hybrid SDNs: Deployment Optimization and Fine-grained Link State Management, in Proceedings of the 21st International Conference on Web Information Systems Engineering (WISE), Amsterdam and Leiden, Netherlands, Oct. 20-24, 2020.
Y. Yang, X. Huang*, S. Cheng, S. Chen, and P. Cong, SHSA: A Method of Network Verification with Stateful Header Space Analysis, in Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS), IEEE Computer Society Press, pp. 232-238, Wuhan, China, Dec. 13-16, 2016.
H. Li, X. Huang*, and Z. Zheng, Detection Method of DDoS Attack Based on Software Defined Network and Its Application, Computer Engineering, vol. 42, no. 2, pp. 118-123, 2016. (in Chinese)
T. Ren, and X. Huang*, A Modified Max-min Ant Colony Optimization Algorithm for Virtual Machines Replacement in Cloud Datacenter, in Proceedings of the 33rd IEEE International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, Dec. 5-7, 2014.
Y. Zhou, and X. Huang*, Scheduling Workflow in Cloud Computing Based on Ant Colony Optimization Algorithm, in Proceedings of the 6th IEEE International Conference on Business Intelligence and Financial Engineering (BIFE), IEEE Computer Society Press, pp. 57-61, Hangzhou, China, Nov. 14-16, 2013.
H. Qian, X. Li, and X. Huang, Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model, Informatica, vol. 23, no. 3, pp. 443-460, 2012.
L. Yu, X. Huang, and F. You, MSTG: A Multi-Service Traffic Generator for Testing Next Generation Wireless Broadband Communication Systems, in Proceedings of the 1st IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), IEEE Computer Society Press, pp. 580-583, Wuhan, China, Apr. 25-26, 2009.
X. Huang, F. Zou, and F. Ma, On Targeted Local Immunization in Scale-free Peer-to-Peer Networks, Journal of Computer Science and Technology, vol. 22, no. 3, pp. 457-468, 2007.
X. Huang, and F. Ma, DEAON: Dynamically-Evolving Active Overlay Networks for Scalable Information Retrieval, High Technology Letters (English Language Edition), vol. 13, no. 4, pp. 413-417, 2007.
X. Huang, Y. Li, and F. Ma, GToS: Examining the Role of Overlay Topology on System Performance Improvement, in Proceedings of the 7th International Workshop on Distributed Computing (IWDC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3741, pp. 213-225, Kharagpur, India, Dec. 27-30, 2005.
X. Huang, F. Ma, and Y. Li, Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization, in Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications (ISPA), Lecture Notes in Computer Science, Springer-Verlag, vol. 3759, pp. 45-53, Nanjing, China, Nov. 2-5, 2005.
Y. Li, X. Huang, F. Ma, and F. Zou, Building Efficient Super-Peer Overlay Network for DHT Systems, in Proceedings of the 4th International Conference on Grid and Cooperative Computing (GCC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3795, pp. 787-798, Beijing, China, Nov. 30 - Dec. 3, 2005.
X. Huang, F. Ma, and W. Zhang, A Unique Design for High-Performance Decentralized Resources Locating: A Topological Perspective, in Proceedings of the 6th International Conference on Web Information Systems Engineering (WISE), Lecture Notes in Computer Science, Springer-Verlag, vol. 3806, pp. 609-610, New York, NY, USA, Nov. 20-22, 2005.
X. Huang, F. Ma, W. Zhang, and Y. Li, On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications, in Proceedings of the 1st International Workshop on Internet and Network Economics (WINE), Lecture Notes in Computer Science, Springer-Verlag, vol. 3828, pp. 936-946, Hong Kong, China, Dec. 15-17, 2005.
X. Huang, W. Zhang, F. Ma, and F. Li, Exploring Small-World-Like Topologies via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays, in Proceedings of the 2nd IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3823, pp. 724-733, Nagasaki, Japan, Dec. 6-9, 2005.
Y. Li, X. Huang, F. Zou, and F. Ma, eDSR: A Decentralized Service Registry for e-Commerce, in Proceedings of the 1st IEEE International Conference on e-Business Engineering (ICEBE), IEEE Computer Society Press, pp. 615-618, Beijing, China, Oct. 18-21, 2005.
X. Huang, Y. Li, R. Yang, and F. Ma, Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme, in Proceedings of the 6th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE Computer Society Press, pp. 503-506, Dalian, China, Dec. 5-8, 2005.
R. Yang, Q. Xia, W. Wang, Q. Pan, X. Huang, and M. Li, Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks, in Proceedings of the 6th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE Computer Society Press, pp. 201-204, Dalian, China, Dec. 5-8, 2005.
X. Huang, Y. Li, F. Liu, and F. Ma, ToA3: Beyond the Limit of Unstructured P2P Networks, in Proceedings of the 1st Joint International Conference on Autonomic and Autonomous Systems & International Conference on Networking and Services (ICAS&ICNS), IEEE Computer Society Press, pp. 40-45, Papeete, Tahiti, France, Oct. 23-28, 2005