default search action
Li-e Wang 0001
Person information
- affiliation: Guangxi Normal University, Guangxi Key Laboratory of Multi-source Information Mining and Security, College of Computer Science and Information Engineering Guilin, China
- affiliation: Hunan University, School of Software, Changsha, China
Other persons with the same name
- Lie Wang (aka: Li-e Wang, Li-E Wang) — disambiguation page
- Lie Wang 0002 — Massachusetts Institute of Technology, Department of Mathematics, Cambridge, MA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li:
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation. Comput. J. 67(5): 1607-1618 (2024) - [j17]Li-e Wang, Yuelan Qi, Zhigang Sun, Xianxian Li:
MKNBL: Joint multi-channel knowledge-aware network and broad learning for sparse knowledge graph-based recommendation. Neurocomputing 575: 127277 (2024) - [j16]Peng Liu, Youquan Xian, Chuanjian Yao, Peng Wang, Li-e Wang, Xianxian Li:
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(5): 5135-5148 (2024) - [c20]Li-e Wang, Hengtong Chang, Rongwen Wei, Xianxian Li, Zhigang Sun, Yongdong Li, Yi Wei, Linghui Meng:
Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential Recommendations. CSCWD 2024: 1388-1393 - [c19]Li-e Wang, Rongwen Wei, Hengtong Chang, Xianxian Li, Zhigang Sun, Tianran Liu:
Multi-perspective Information and Multi-task Contrastive Learning for Sequential Recommendations. CSCWD 2024: 2448-2453 - [c18]Hao Wu, Xianxian Li, Peng Liu, Li-e Wang, Danping Yang, Aoxiang Zhou:
SpanMRC: Query with Entity Length for MRC-Based Named Entity Recognition. ICIC (LNAI 4) 2024: 281-293 - 2023
- [j15]Yanxia Gong, Xianxian Li, Li-e Wang:
FedMBC: Personalized federated learning via mutually beneficial collaboration. Comput. Commun. 205: 108-117 (2023) - [j14]Zhigang Sun, Li-e Wang, Jinyong Sun:
A multi-scale graph embedding method via multiple corpora. Neurocomputing 540: 126192 (2023) - [j13]Li-e Wang, Yuelan Qi, Yan Bai, Zhigang Sun, Dongcheng Li, Xianxian Li:
MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain. Inf. Sci. 638: 118915 (2023) - [c17]Li-e Wang, Yi Wei, Peng Liu, Xianxian Li:
Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains. ICPADS 2023: 617-622 - [c16]Li-E Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu, Zhigang Sun, Tianran Liu:
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S). SEKE 2023: 323-328 - [i2]Youquan Xian, Xueying Zeng, Lianghaojie Zhou, Boyi Wang, Li-e Wang, Peng Liu:
A Data Middleware for Obtaining Trusted Price Data for Blockchain. CoRR abs/2309.04689 (2023) - [i1]Peng Liu, Youquan Xian, Chuanjian Yao, Peng Wang, Li-e Wang, Xianxian Li:
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things. CoRR abs/2310.04975 (2023) - 2022
- [j12]Bin Qu, Yan Bai, Yul Chu, Li-e Wang, Feng Yu, Xianxian Li:
Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach. Comput. Networks 215: 109181 (2022) - [j11]Xianxian Li, Bing Cai, Li-e Wang, Lei Lei:
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication. Frontiers Comput. Sci. 16(4): 164816 (2022) - [c15]Xianxian Li, Tianran Liu, Li-e Wang, Zhigang Sun, Huachang Zeng:
Next POI Recommendation with Neighbor and Location Popularity. ICONIP (2) 2022: 367-378 - 2021
- [j10]Li-e Wang, Yan Bai, Quan Jiang, Victor C. M. Leung, Wei Cai, Xianxian Li:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1154-1166 (2021) - [c14]Li-e Wang, Yihui Wang, Yan Bai, Peng Liu, Xianxian Li:
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation. INFOCOM Workshops 2021: 1-6 - 2020
- [j9]Bin Qu, Li-e Wang, Peng Liu, Zhenkui Shi, Xianxian Li:
GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System. IEEE Access 8: 48325-48336 (2020) - [j8]Peng Liu, Yuanxin Xu, Quan Jiang, Yuwei Tang, Yameng Guo, Li-e Wang, Xianxian Li:
Local differential privacy for social network publishing. Neurocomputing 391: 273-279 (2020) - [c13]Feng Yu, Xixian Li, Huimin Zhang, Li-e Wang:
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy. CBD 2020: 253-258 - [c12]Feng Yu, Xixian Li, Huimin Zhang, Li-e Wang:
A Control Task Assignment Algorithm based on sub-graph isomorphism. CBD 2020: 265-271 - [c11]Chunpei Li, Li-e Wang, Qingting Xu, Dongchen Li, Peng Liu, Xianxian Li:
Groupchain: A Blockchain Model with Privacy-preservation and Supervision. HP3C 2020: 42-49 - [c10]Li-e Wang, Shan Lin, Yan Bai, Sang-Yoon Chang, Xianxian Li, Peng Liu:
A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network. ICC 2020: 1-7
2010 – 2019
- 2019
- [c9]Xianxian Li, Chunfeng Luo, Peng Liu, Li-e Wang:
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory. DASC/PiCom/DataCom/CyberSciTech 2019: 918-923 - 2018
- [j7]Li-e Wang, Xianxian Li:
A graph-based multifold model for anonymizing data with attributes of multiple types. Comput. Secur. 72: 122-135 (2018) - [j6]Xianxian Li, Peipei Sui, Yan Bai, Li-E Wang:
M-generalization for multipurpose transactional data publication. Frontiers Comput. Sci. 12(6): 1241-1254 (2018) - [c8]Dongran Yu, Huaxing Zhao, Li-e Wang, Peng Liu, Xianxian Li:
A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing. MSPN 2018: 224-239 - 2017
- [j5]Peng Liu, Yan Bai, Lie Wang, Xianxian Li:
Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing. Int. J. Softw. Eng. Knowl. Eng. 27(1): 71-90 (2017) - [j4]Lie Wang, Yuanxin Xu, Xianxian Li, Peng Liu:
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System). 计算机科学 44(9): 178-183 (2017) - [c7]Li-e Wang, Yameng Guo, Xianxian Li:
Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model. BigDataService 2017: 204-209 - [c6]Xiaoyi Hu, Li-e Wang, Jiaqi Tang, Cong Lei, Peng Liu, Xianxian Li:
Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks. Healthcom 2017: 1-6 - [c5]Peng Liu, Li-e Wang, Xianxian Li:
Randomized Perturbation for Privacy-Preserving Social Network Data Publishing. ICBK 2017: 208-213 - 2016
- [c4]Liuhua Chen, Shenghai Zhong, Li-e Wang, Xianxian Li:
A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data. Financial Cryptography 2016: 460-473 - 2015
- [j3]Peng Liu, Xianxian Li, Li-e Wang:
社会网络分析软件研究 (Study of Social Network Analysis Software). 计算机科学 42(12): 171-174 (2015) - [c3]Li-e Wang, Xianxian Li:
A Hybrid Optimization Approach for Anonymizing Transactional Data. ICA3PP (Workshops and Symposiums) 2015: 120-132 - 2014
- [j2]Li-e Wang, Xianxian Li:
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data. Int. J. Softw. Eng. Knowl. Eng. 24(7): 1091- (2014) - [c2]Li-e Wang, Xianxian Li:
Personalized Privacy Protection for Transactional Data. ADMA 2014: 253-266
2000 – 2009
- 2009
- [c1]Kun Huang, Dafang Zhang, Li-e Wang:
An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness. GPC 2009: 376-387 - 2008
- [j1]Kun Huang, Li-e Wang, Dafang Zhang, Yongwei Liu:
Optimizing the BitTorrent performance using an adaptive peer selection strategy. Future Gener. Comput. Syst. 24(7): 621-630 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint