default search action
Lixin Tao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Runhuang Yang, Weiming Li, Siqi Yu, Zhiyuan Wu, Haiping Zhang, Xiangtong Liu, Lixin Tao, Xia Li, Jian Huang, Xiuhua Guo:
Enhanced NSCLC subtyping and staging through attention-augmented multi-task deep learning: A novel diagnostic tool. Int. J. Medical Informatics 193: 105694 (2025) - 2024
- [c56]Zongming Fei, Yu Huang, Lixin Tao:
Message from the Program Chairs; IDS 2024. IDS 2024: viii
2010 – 2019
- 2019
- [c55]Hao Zhang, Zhuolin Li, Hossain Shahriar, Lixin Tao, Prabir Bhattacharya, Ying Qian:
Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets. COMPSAC (1) 2019: 918-919 - 2018
- [j15]Meikang Qiu, Keke Gai, Bhavani Thuraisingham, Lixin Tao, Hui Zhao:
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80: 421-429 (2018) - [c54]Reza M. Parizi, Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao:
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools. COMPSAC (1) 2018: 825-826 - [c53]Ning Jiang, Lixin Tao:
A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and Integration. CSCloud/EdgeCom 2018: 89-94 - [c52]Mohammad Harun Rashid, Lixin Tao:
Parallelize Simulated Annealing Heuristics with GPUs. SNPD 2018: 76-81 - 2017
- [j14]Li Ma, Lixin Tao, Keke Gai, Yong Zhong:
A novel social network access control model using logical authorization language in cloud computing. Concurr. Comput. Pract. Exp. 29(14) (2017) - [c51]Boyu Hou, Yong Shi, Kai Qian, Lixin Tao:
Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution. BigDataSecurity/HPSC/IDS 2017: 90-95 - [c50]Maria Sette, Lixin Tao, Ning Jiang:
A Knowledge-Driven Web Tutoring System Framework for Adaptive and Assessment-Driven Open-Source Learning. COMPSAC (2) 2017: 712-717 - [c49]Kai Qian, Yong Shi, Lixin Tao, Ying Qian:
Hands-On Learning for Computer Network Security with Mobile Devices. ICCCN 2017: 1-6 - [c48]Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao, Prabir Bhattacharya:
Labware for Secure Mobile Software Development (SMSD) Education. ITiCSE 2017: 375 - [c47]Lixin Tao:
Extending OWL with Custom Relations for Knowledge-Driven Intelligent Agents. MATES 2017: 156-166 - 2016
- [j13]Keke Gai, Meikang Qiu, Hui Zhao, Lixin Tao, Ziliang Zong:
Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59: 46-54 (2016) - [j12]Keke Gai, Meikang Qiu, Lixin Tao, Yongxin Zhu:
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Networks 9(16): 3049-3058 (2016) - [c46]A. Aziz Altowayan, Lixin Tao:
Word embeddings for Arabic sentiment analysis. IEEE BigData 2016: 3820-3825 - [c45]Tianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao:
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining. BigDataSecurity/HPSC/IDS 2016: 129-133 - [c44]Li Ma, Lixin Tao, Yong Zhong, Keke Gai:
RuleSN: Research and Application of Social Network Access Control Model. BigDataSecurity/HPSC/IDS 2016: 418-423 - [c43]Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu:
MongoDB NoSQL Injection Analysis and Detection. CSCloud 2016: 75-78 - [c42]Claude Asamoah, Lixin Tao, Keke Gai, Ning Jiang:
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph. CSCloud 2016: 240-246 - [c41]Maria Sette, Lixin Tao, Keke Gai, Ning Jiang:
A Semantic Approach to Intelligent and Personal Tutoring System. CSCloud 2016: 261-266 - [c40]Gilbert Alipui, Lixin Tao, Keke Gai, Ning Jiang:
Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques. CSCloud 2016: 267-272 - [c39]R. J. DeStefano, Lixin Tao, Keke Gai:
Improving Data Governance in Large Organizations through Ontology and Linked Data. CSCloud 2016: 279-284 - [c38]Saravanan Jayaraman, Lixin Tao, Keke Gai, Ning Jiang:
Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth. CSCloud 2016: 289-294 - [c37]Tianda Yang, Kai Qian, Lei Li, Dan Chia-Tien Lo, Lixin Tao:
Static Mining and Dynamic Taint for Mobile Security Threats Analysis. SmartCloud 2016: 234-240 - [c36]Kutub Thakur, Md Liakat Ali, Sandra Kopecky, Abu Kamruzzaman, Lixin Tao:
Connectivity, Traffic Flow and Applied Statistics in Cyber Security. SmartCloud 2016: 295-300 - [e1]Meikang Qiu, Lixin Tao, Jianwei Niu:
3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0946-6 [contents] - 2015
- [j11]Hongjun Dai, Shulin Zhao, Jiutian Zhang, Meikang Qiu, Lixin Tao:
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure. Future Gener. Comput. Syst. 52: 147-155 (2015) - [c35]Keke Gai, Meikang Qiu, Saravanan Jayaraman, Lixin Tao:
Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems. CSCloud 2015: 98-103 - [c34]Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao:
Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry. CSCloud 2015: 272-277 - [c33]Hevel Jean-Baptiste, Lixin Tao, Meikang Qiu, Keke Gai:
Understanding Model Risk Management - Model Rationalization in Financial Industry. CSCloud 2015: 301-306 - [c32]Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao:
Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics. CSCloud 2015: 312-316 - [c31]Khagesh Patel, Ishaan Dube, Lixin Tao, Ning Jiang:
Extending OWL to Support Custom Relations. CSCloud 2015: 494-499 - [c30]Keke Gai, Meikang Qiu, Bhavani Thuraisingham, Lixin Tao:
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry. HPCC/CSS/ICESS 2015: 1332-1337 - [c29]Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, Lixin Tao:
Automated Detection and Analysis for Android Ransomware. HPCC/CSS/ICESS 2015: 1338-1343 - [c28]A. Aziz Altowayan, Lixin Tao:
Simplified Approach for Representing Part-Whole Relations in OWL-DL Ontologies. HPCC/CSS/ICESS 2015: 1399-1405 - [c27]Charles Tang, Andrew Tang, Edward Lee, Lixin Tao:
Mitigating HTTP Flooding Attacks with Meta-data Analysis. HPCC/CSS/ICESS 2015: 1406-1411 - [c26]Mohammad Vahidalizadehdizaj, Lixin Tao:
A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC). ISI 2015: 169-172 - [c25]Lixin Tao, Steven Golikov, Keke Gai, Meikang Qiu:
A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing. SOSE 2015: 127-132 - [c24]Wanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao:
A hybrid approach for mobile security threat analysis. WISEC 2015: 28:1-28:2 - 2013
- [c23]Lixin Tao, Steven Golikov:
Integrated Syntax and Semantic Validation for Services Computing. IEEE SCC 2013: 769-770 - [c22]Kai Qian, Ming Yang, Minzhe Guo, Prabir Bhattacharya, Lixin Tao:
Mobile device based authentic learning for computer network and security. ITiCSE 2013: 335 - 2012
- [j10]Li-Chiou Chen, Lixin Tao:
Teaching Web Security using Portable Virtual Labs. J. Educ. Technol. Soc. 15(4): 39-46 (2012) - 2011
- [j9]Lixin Tao, Yingfan Guo, Weiwei Du:
Criteria for omnibearing imbalance of macroeconomic system structures and their strategic optimization. Kybernetes 40(5/6): 848-853 (2011) - [c21]Kai Qian, Lixin Tao, Wanjun Hu, Richard Kline:
Work in progress - Live programming learning objects repository. FIE 2011: 3 - [c20]Lixin Tao, Constantine Coutras, Narayan Murthy, Richard Kline:
Work in progress - An innovative design of a Master in Computer Science program. FIE 2011: 3 - [c19]Prabir Bhattacharya, Minzhe Guo, Lixin Tao, Bin Wu, Kai Qian, E. Kent Palmer:
A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education. ICALT 2011: 12-13 - [c18]Prabir Bhattacharya, Minzhe Guo, Lixin Tao, Yujian Fu, Kai Qian:
A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning. ICALT 2011: 14-16 - [c17]Li-Chiou Chen, Lixin Tao:
Teaching Web Security Using Portable Virtual Labs. ICALT 2011: 491-495
2000 – 2009
- 2009
- [c16]Kai Qian, Jigang Liu, Lixin Tao:
Teach real-time embedded system online with real hands-on labs. ITiCSE 2009: 367 - 2008
- [c15]Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, Jigang Liu:
APOGEE: automated project grading and instant feedback system for web based computing. SIGCSE 2008: 77-81 - 2007
- [c14]Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, Kai Qian, Lixin Tao:
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities. COMPSAC (1) 2007: 87-96 - 2006
- [c13]Jingkun Hu, Lixin Tao:
Visual Modeling of XML Constraints Based on a New Extensible Constraint Markup Language. IMECS 2006: 169-174 - [c12]Kai Qian, Jigang Liu, Lixin Tao:
Asynchronous Callback in Web Services. SNPD 2006: 375-380 - 2002
- [c11]Weilan Jiang, Lixin Tao:
Parallel Programming through Application Service Providers. IMSA 2002: 180-184 - 2001
- [j8]Lixin Tao:
Shifting Paradigms with the Application Service Provider Model. Computer 34(10): 32-39 (2001)
1990 – 1999
- 1999
- [c10]Lixin Tao:
Delayed Program Mapping in Concordia Parallel Programming Environment. PDPTA 1999: 1709-1715 - 1996
- [c9]Thien T. Bui, Hassan Hosseini, Lixin Tao:
A Visual Performance Debugger for Virtual Architecture Programs. PDPTA 1996: 1573-1584 - [c8]Hassan Hosseini, Lixin Tao, Thien T. Bui:
Coarse Grain Automatic Data Redistribution in Multiphase Parallel Programs. PDPTA 1996: 1585-1592 - 1995
- [j7]Tao Li, Lixin Tao:
Topological Feature Maps on Parallel Computers. Int. J. High Speed Comput. 7(4): 531-546 (1995) - [c7]U. H. Nguyen, Hassan Hosseini, Lixin Tao, Thien T. Bui:
Contention Minimization in Wormhole-Routed Networks. PDPTA 1995: 501-510 - [c6]U. H. Nguyen, Hassan Hosseini, Lixin Tao:
A Performance Debugger for Parallel Programs Running on Wormhole-Routed Multicomputers. PDPTA 1995: 698-707 - [c5]Hassan Hosseini, U. H. Nguyen, Lixin Tao, Thien T. Bui:
Contracting Processes in Virtual Architecture Programs. PDPTA 1995: 708-717 - 1993
- [j6]Lixin Tao, Yongchang Zhao:
Multi-way graph partition by stochastic probe. Comput. Oper. Res. 20(3): 321-347 (1993) - [j5]Eva Ma, Lixin Tao:
Embeddings among Meshes and Tori. J. Parallel Distributed Comput. 18(1): 44-55 (1993) - [j4]Yuan Yan Tang, X. Cheng, Lixin Tao, Ching Y. Suen:
Parallel regional projection transformation (RPT) and VLSI implementation. Pattern Recognit. 26(4): 627-641 (1993) - 1992
- [j3]Eva Ma, Bhagirath Narahari, Lixin Tao:
Optimal Embedding of 2-D Torus Into Ring. Inf. Process. Lett. 41(4): 227-231 (1992) - [j2]Lixin Tao, Yongchang Zhao, Krishnaiyan Thulasiraman, M. N. S. Swamy:
Simulated Annealing and Tabu Search Algorithms for Multiway Graph Partition. J. Circuits Syst. Comput. 2(2): 159-186 (1992) - [c4]Yuan Yan Tang, X. Cheng, Lixin Tao, Ching Y. Suen, M. Talaat, R. Inglese:
VLSI architecture for parallel concentration-contour approach. ICPR (4) 1992: 151-154 - 1991
- [j1]Lixin Tao, Eva Ma:
Simulating parallel neighboring communications among square meshes and square toruses. J. Supercomput. 5(1): 57-71 (1991) - [c3]Lixin Tao, Yongchang Zhao, Krishnaiyan Thulasiraman, M. N. Shanmukha Swamy:
An efficient tabu search algorithm for graph bisectioning. Great Lakes Symposium on VLSI 1991: 92-95 - 1990
- [c2]Lixin Tao, Eva Ma:
Simulating parallel neighbouring communications among square meshes and square toruses. SPDP 1990: 850-857
1980 – 1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint