Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaopu Ma
@article{DBLP:journals/access/MaWL24, author = {Xiaopu Ma and Zhan Wang and He Li}, title = {Application of an Improved Graph Neural Network for Drug Property Prediction}, journal = {{IEEE} Access}, volume = {12}, pages = {46812--46820}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3382299}, doi = {10.1109/ACCESS.2024.3382299}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangCXMZ23, author = {Bingrui Wang and Haoyu Chen and Zhaopeng Xie and Xiaopu Ma and Ziqiang Zhu}, title = {Design of Permutation Index {DCSK} With Noise Reduction for Short-Range IoT Communications}, journal = {{IEEE} Access}, volume = {11}, pages = {102332--102339}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3317180}, doi = {10.1109/ACCESS.2023.3317180}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangCXMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiLGLYM15, author = {Ruixuan Li and Huaqing Li and Xiwu Gu and Yuhua Li and Wei Ye and Xiaopu Ma}, title = {Role mining based on cardinality constraints}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {12}, pages = {3126--3144}, year = {2015}, url = {https://doi.org/10.1002/cpe.3456}, doi = {10.1002/CPE.3456}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiLGLYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ShenLLSM15, author = {Kunxiao Shen and Yihua Lan and Yuling Lu and Naili Shang and Xiaopu Ma}, title = {{\unicode{20083}}{\unicode{33146}}{\unicode{36741}}{\unicode{21161}}{\unicode{35786}}{\unicode{26029}}{\unicode{31995}}{\unicode{32479}}{\unicode{20013}}{\unicode{21487}}{\unicode{30097}}{\unicode{32959}}{\unicode{22359}}{\unicode{20998}}{\unicode{21106}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}} (Research on Segmentation Methods in Breast Computer-aided Detection)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {{Z11}}, pages = {195--198}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/IZ11/195}, doi = {Y2015/V42/IZ11/195}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/ShenLLSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaLWL15, author = {Xiaopu Ma and Ruixuan Li and Hongwei Wang and Huaqing Li}, title = {Role mining based on permission cardinality constraint and user cardinality constraint}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2317--2328}, year = {2015}, url = {https://doi.org/10.1002/sec.1177}, doi = {10.1002/SEC.1177}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LiLWMG13, author = {Ruixuan Li and Huaqing Li and Wei Wang and Xiaopu Ma and Xiwu Gu}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {RMiner: a tool set for role mining}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {193--196}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462431}, doi = {10.1145/2462410.2462431}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LiLWMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/MaLLW12, author = {Xiaopu Ma and Ruixuan Li and Zhengding Lu and Wei Wang}, title = {Mining constraints in role-based access control}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {87--96}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.01.053}, doi = {10.1016/J.MCM.2011.01.053}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/MaLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/MaLLLD11, author = {Xiaopu Ma and Ruixuan Li and Zhengding Lu and Jianfeng Lu and Meng Dong}, title = {Specifying and enforcing the principle of least privilege in role-based access control}, journal = {Concurr. Comput. Pract. Exp.}, volume = {23}, number = {12}, pages = {1313--1331}, year = {2011}, url = {https://doi.org/10.1002/cpe.1731}, doi = {10.1002/CPE.1731}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/MaLLLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuLLLM11, author = {Jinwei Hu and Ruixuan Li and Zhengding Lu and Jianfeng Lu and Xiaopu Ma}, title = {{RAR:} {A} role-and-risk based flexible framework for secure collaboration}, journal = {Future Gener. Comput. Syst.}, volume = {27}, number = {5}, pages = {574--586}, year = {2011}, url = {https://doi.org/10.1016/j.future.2010.09.008}, doi = {10.1016/J.FUTURE.2010.09.008}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuLLLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiNMDW11, author = {Ruixuan Li and Li Nie and Xiaopu Ma and Meng Dong and Wei Wang}, title = {{SMEF:} An Entropy-Based Security Framework for Cloud-Oriented Service Mashup}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {304--311}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.41}, doi = {10.1109/TRUSTCOM.2011.41}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiNMDW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiLLM10, author = {Ruixuan Li and Jianfeng Lu and Zhengding Lu and Xiaopu Ma}, title = {Consistency Checking of Safety and Availability in Access Control}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {491--502}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.491}, doi = {10.1587/TRANSINF.E93.D.491}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiLLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiDLLML10, author = {Ruixuan Li and Meng Dong and Bin Liu and Jianfeng Lu and Xiaopu Ma and Kai Li}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {SecTag: a multi-policy supported secure web tag framework}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {633--635}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866379}, doi = {10.1145/1866307.1866379}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiDLLML10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MaLL10, author = {Xiaopu Ma and Ruixuan Li and Zhengding Lu}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Role mining based on weights}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {65--74}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809854}, doi = {10.1145/1809842.1809854}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MaLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuLVLM09, author = {Jianfeng Lu and Ruixuan Li and Vijay Varadharajan and Zhengding Lu and Xiaopu Ma}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Secure Interoperation in Multidomain Environments Employing {UCON} Policies}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {395--402}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_31}, doi = {10.1007/978-3-642-04474-8\_31}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LuLVLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuLLHM09, author = {Jianfeng Lu and Ruixuan Li and Zhengding Lu and Jinwei Hu and Xiaopu Ma}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {403--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_32}, doi = {10.1007/978-3-642-04474-8\_32}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LuLLHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.