学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 吕锡香的留言板
学术论文

1. Yige Li, Xixiang Lyu*, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma*NEURAL ATTENTION DISTILLATION: ERASING BACKDOOR TRIGGERS FROM DEEP NEURAL NETWORKS, Published as a conference paper at ICLR 2021.

2. Renpeng Zou, Xixiang Lv*, Baocang Wang, Blockchain-based photo forensics with permissible transformations. Comput. Secur. 87 (2019).

3. Xixiang Lv, Yi Mu, Hui Li, Loss-Tolerant Bundle Fragment Authentication for Space-based DTNs, IEEE Transactions on Dependable and Secure Computing, Accepted (8 Dec. 2014). 

4. Xixiang Lv, Yi Mu, Hui Li, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2013.2289993, Volume 9 Issue 1, 2014.

5.邹宇聪,张煜,吕锡香*,李一戈,基于生成对抗网络的文本序列数据集脱敏,《网络与信息安全学报》Vol.8  No.4 ,2020年8月。

6. Wei Rong, Bowen Zhang, Xixiang Lv*, Malicious Web Request Detection Using Character-level CNN, ML4CS 20196-162019.

7. Xixiang Lv, Yi Mu, Hui Li, Loss-Tolerant Authentication with Digital Signatures, Security and Communication Networks,  9 (11): 366-383, 2014.

8. Xixiang Lv, Yi Mu, Hui Li, Key Distribution for Heterogeneous Public-key Cryptosystems, Journal of Communications and Networks, VOL. 15, NO. 5, OCTOBER 2013.

9. Xixiang Lv, Hui Li, Baocang Wang, Authenticated Asymmetric Group Key Agreement based on Certificateless Cryptosystem, International Journal of Computer Mathematics, 91 (3):447-460, 2014.
10. Xixiang Lv, Hui Li, Secure Group Communication with both Confidentiality and Non-repudiation for Mobile Ad-hoc Networks, IET Information Security, 7(2), 2013.

11. Xixiang Lv, Hui Li, Baocang Wang: Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Security and Communication Networks, 6(1): 49-57 (2013).

12. Xixiang Lv, Hui Li: Group Key Agreement From Signcryption. TIIS 6(12): 3338-3351 (2012).

13. Xixiang Lv, Hui Li, Baocang Wang: Group key agreement for secure group communication in dynamic peer systems. J. Parallel Distrib. Comput. 72(10): 1195-1200 (2012).

14. Xixiang Lv, Hui Li, Baocang Wang: Identity-based key distribution for mobile Ad Hoc networks. Frontiers of Computer Science in China 5(4): 442-447 (2011).

15. Xixiang Lv, Hui Li: ID-based authenticated group key agreement from bilinear maps. Frontiers of Computer Science in China 4(2): 302-307 (2010).
16. Lv Xixiang , YANG Bo,“Traitor Tracing Using Identity Based Public-key Cryptography”。Chinese Journal of Electronics, Vol.15 No.4, 2006年10月。
17. Lv Xixiang , YANG Bo, “Broadcast Encryption Using Identity-based Cryptosystem”。Chinese Journal of Electronics,Vol.16 No.4, 2007年10月。
18. Lv Xixiang , YANG Bo, “Broadcast Encryption Using Identity-based Public-key Cryptosystem”。发表在2005 International Conference on Computational Intelligence and Security (CIS'05)。.
19. Lv Xixiang , YANG Bo, “Efficient Traitor Tracing Scheme Based On NTRU”。发表在the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05)。(该论文还荣获该会议的杰出论文奖)。
20. 吕锡香,杨波,“基于双线性映射的公钥叛逆者追踪”,《西安电子科技大学学报》,Vol.33 No.6, 2006年12月.
21. 吕锡香,杨波,“基于数据挖掘的入侵检测系统检测引擎的设计”,《西安电子科技大学学报》Vol.31 No.4, 2004年8月。