Xiaolin (Andy) Li
Xiaolin (Andy) Li
Chief AI Scientist, Hangzhou Institute of Medicine, Chinese Academy of Sciences
Verified email at - Homepage
Cited by
Cited by
Adversarial examples: Attacks and defenses for deep learning
X Yuan, P He, Q Zhu, X Li
IEEE transactions on neural networks and learning systems 30 (9), 2805-2824, 2019
DeepDefense: identifying DDoS attack via deep learning
X Yuan, C Li, X Li
2017 IEEE International Conference on Smart Computing (SMARTCOMP), 1-8, 2017
Predicting the clinical impact of human mutation with deep neural networks
L Sundaram, H Gao, SR Padigepati, JF McRae, Y Li, JA Kosmicki, ...
Nature genetics 50 (8), 1161-1170, 2018
Single shot text detector with regional attention
P He, W Huang, T He, Q Zhu, Y Qiao, X Li
Proceedings of the IEEE International Conference on Computer Vision, 3047-3055, 2017
S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme
H Zhao, X Li
21st International Conference on Advanced Information Networking and …, 2007
Guoguo: Enabling Fine-grained Indoor Localization via Smartphone
K Liu, X Liu, X Li
the 11th ACM MobiSys 2013, 2013
MySurgeryRisk: development and validation of a machine-learning risk algorithm for major complications and death after surgery
A Bihorac, T Ozrazgat-Baslanti, A Ebadi, A Motaei, M Madkour, ...
Annals of surgery 269 (4), 652-662, 2019
Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN
C Li, Y Wu, X Yuan, Z Sun, W Wang, X Li, L Gong
International Journal of Communication Systems 31 (5), e3497, 2018
Traffic-aware multiple mix zone placement for protecting location privacy
X Liu, H Zhao, M Pan, H Yue, X Li, Y Fang
2012 Proceedings IEEE INFOCOM, 972-980, 2012
GRAM-CNN: a deep learning approach with local context for named entity recognition in biomedical text
Q Zhu, X Li, A Conesa, C Pereira
Bioinformatics 34 (9), 1547-1554, 2018
A game-theoretic approach for achieving k-anonymity in location based services
X Liu, K Liu, L Guo, X Li, Y Fang
2013 Proceedings IEEE INFOCOM, 2985-2993, 2013
Rethinking the bottom-up framework for query-based video localization
L Chen, C Lu, S Tang, J Xiao, D Zhang, C Tan, X Li
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 10551 …, 2020
On the influence of start-up costs in scheduling divisible loads on bus networks
B Veeravalli, X Li, CC Ko
IEEE transactions on parallel and distributed systems 11 (12), 1288-1305, 2000
Distilled One-Shot Federated Learning
Y Zhou, G Pu, X Ma, X Li, D Wu
arXiv preprint arXiv:2009.07999, 2020
Guoguo: Enabling fine-grained smartphone localization via acoustic anchors
K Liu, X Liu, X Li
IEEE transactions on mobile computing 15 (5), 1144-1156, 2015
SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
X Liu, H Zhao, X Yang, X Li
IEEE Transactions on Computers 62 (1), 151-162, 2013
Identifying nontechnical power loss via spatial and temporal deep learning
RR Bhat, RD Trevizan, R Sengupta, X Li, A Bretas
2016 15th IEEE International Conference on Machine Learning and Applications …, 2016
My privacy my decision: Control of photo sharing on online social networks
K Xu, Y Guo, L Guo, Y Fang, X Li
IEEE Transactions on Dependable and Secure Computing 14 (2), 199-210, 2015
Distributed image processing on a network of workstations
XL Li, B Veeravalli, CC Ko
International Journal of Computers and Applications 25 (2), 136-145, 2003
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
H Zhao, X Li
The Journal of Supercomputing 64 (3), 805-829, 2013
The system can't perform the operation now. Try again later.
Articles 1–20