BibTeX records: Xiaopu Ma

download as .bib file

@article{DBLP:journals/access/MaWL24,
  author       = {Xiaopu Ma and
                  Zhan Wang and
                  He Li},
  title        = {Application of an Improved Graph Neural Network for Drug Property
                  Prediction},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {46812--46820},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3382299},
  doi          = {10.1109/ACCESS.2024.3382299},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangCXMZ23,
  author       = {Bingrui Wang and
                  Haoyu Chen and
                  Zhaopeng Xie and
                  Xiaopu Ma and
                  Ziqiang Zhu},
  title        = {Design of Permutation Index {DCSK} With Noise Reduction for Short-Range
                  IoT Communications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {102332--102339},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3317180},
  doi          = {10.1109/ACCESS.2023.3317180},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangCXMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiLGLYM15,
  author       = {Ruixuan Li and
                  Huaqing Li and
                  Xiwu Gu and
                  Yuhua Li and
                  Wei Ye and
                  Xiaopu Ma},
  title        = {Role mining based on cardinality constraints},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {12},
  pages        = {3126--3144},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3456},
  doi          = {10.1002/CPE.3456},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiLGLYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ShenLLSM15,
  author       = {Kunxiao Shen and
                  Yihua Lan and
                  Yuling Lu and
                  Naili Shang and
                  Xiaopu Ma},
  title        = {{\unicode{20083}}{\unicode{33146}}{\unicode{36741}}{\unicode{21161}}{\unicode{35786}}{\unicode{26029}}{\unicode{31995}}{\unicode{32479}}{\unicode{20013}}{\unicode{21487}}{\unicode{30097}}{\unicode{32959}}{\unicode{22359}}{\unicode{20998}}{\unicode{21106}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Segmentation Methods in Breast Computer-aided Detection)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {{Z11}},
  pages        = {195--198},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/IZ11/195},
  doi          = {Y2015/V42/IZ11/195},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ShenLLSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaLWL15,
  author       = {Xiaopu Ma and
                  Ruixuan Li and
                  Hongwei Wang and
                  Huaqing Li},
  title        = {Role mining based on permission cardinality constraint and user cardinality
                  constraint},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2317--2328},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1177},
  doi          = {10.1002/SEC.1177},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LiLWMG13,
  author       = {Ruixuan Li and
                  Huaqing Li and
                  Wei Wang and
                  Xiaopu Ma and
                  Xiwu Gu},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {RMiner: a tool set for role mining},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {193--196},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462431},
  doi          = {10.1145/2462410.2462431},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/LiLWMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/MaLLW12,
  author       = {Xiaopu Ma and
                  Ruixuan Li and
                  Zhengding Lu and
                  Wei Wang},
  title        = {Mining constraints in role-based access control},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {87--96},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.01.053},
  doi          = {10.1016/J.MCM.2011.01.053},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/MaLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/MaLLLD11,
  author       = {Xiaopu Ma and
                  Ruixuan Li and
                  Zhengding Lu and
                  Jianfeng Lu and
                  Meng Dong},
  title        = {Specifying and enforcing the principle of least privilege in role-based
                  access control},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {23},
  number       = {12},
  pages        = {1313--1331},
  year         = {2011},
  url          = {https://doi.org/10.1002/cpe.1731},
  doi          = {10.1002/CPE.1731},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/MaLLLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuLLLM11,
  author       = {Jinwei Hu and
                  Ruixuan Li and
                  Zhengding Lu and
                  Jianfeng Lu and
                  Xiaopu Ma},
  title        = {{RAR:} {A} role-and-risk based flexible framework for secure collaboration},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {5},
  pages        = {574--586},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.future.2010.09.008},
  doi          = {10.1016/J.FUTURE.2010.09.008},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuLLLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiNMDW11,
  author       = {Ruixuan Li and
                  Li Nie and
                  Xiaopu Ma and
                  Meng Dong and
                  Wei Wang},
  title        = {{SMEF:} An Entropy-Based Security Framework for Cloud-Oriented Service
                  Mashup},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {304--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.41},
  doi          = {10.1109/TRUSTCOM.2011.41},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiNMDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiLLM10,
  author       = {Ruixuan Li and
                  Jianfeng Lu and
                  Zhengding Lu and
                  Xiaopu Ma},
  title        = {Consistency Checking of Safety and Availability in Access Control},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {3},
  pages        = {491--502},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.491},
  doi          = {10.1587/TRANSINF.E93.D.491},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiLLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiDLLML10,
  author       = {Ruixuan Li and
                  Meng Dong and
                  Bin Liu and
                  Jianfeng Lu and
                  Xiaopu Ma and
                  Kai Li},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {SecTag: a multi-policy supported secure web tag framework},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {633--635},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866379},
  doi          = {10.1145/1866307.1866379},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiDLLML10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MaLL10,
  author       = {Xiaopu Ma and
                  Ruixuan Li and
                  Zhengding Lu},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Role mining based on weights},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809854},
  doi          = {10.1145/1809842.1809854},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MaLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuLVLM09,
  author       = {Jianfeng Lu and
                  Ruixuan Li and
                  Vijay Varadharajan and
                  Zhengding Lu and
                  Xiaopu Ma},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Secure Interoperation in Multidomain Environments Employing {UCON}
                  Policies},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {395--402},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_31},
  doi          = {10.1007/978-3-642-04474-8\_31},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LuLVLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuLLHM09,
  author       = {Jianfeng Lu and
                  Ruixuan Li and
                  Zhengding Lu and
                  Jinwei Hu and
                  Xiaopu Ma},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Specification and Enforcement of Static Separation-of-Duty Policies
                  in Usage Control},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {403--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_32},
  doi          = {10.1007/978-3-642-04474-8\_32},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LuLLHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics