


default search action
Xinjian Zhao
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]Guoquan Yuan, Xinjian Zhao, Shuaiqi Zhang
, Shi Chen, Shanming Wei:
A Robust Watermarking for Camera-Captured Images Using Few-Shot Learning and Simulated Noise Layer. Concurr. Comput. Pract. Exp. 37(4-5) (2025)
[j7]Xiangru Jian, Xinjian Zhao, Wei Pang, Chaolong Ying, Yimu Wang, Yaoyao Xu, Tianshu Yu:
Rethinking Spectral Augmentation for Contrast-based Graph Self-Supervised Learning. Trans. Mach. Learn. Res. 2025 (2025)
[c10]Xinjian Zhao
, Chaolong Ying
, Yaoyao Xu
, Tianshu Yu
:
Graph Learning with Distributional Edge Layouts. KDD (1) 2025: 2055-2066
[i9]Hao Xu, Xiangru Jian, Xinjian Zhao, Wei Pang, Chao Zhang, Suyuchen Wang, Qixin Zhang, Joao Monteiro, Qiuzhuang Sun, Tianshu Yu:
GraphOmni: A Comprehensive and Extendable Benchmark Framework for Large Language Models on Graph-theoretic Tasks. CoRR abs/2504.12764 (2025)
[i8]Xiaozhuang Song, Xuanhao Pan, Xinjian Zhao, Hangting Ye, Shufei Zhang, Jian Tang, Tianshu Yu:
AOT*: Efficient Synthesis Planning via LLM-Empowered AND-OR Tree Search. CoRR abs/2509.20988 (2025)
[i7]Xinjian Zhao, Wei Pang, Zhongkai Xue, Xiangru Jian, Lei Zhang, Yaoyao Xu, Xiaozhuang Song, Shu Wu, Tianshu Yu:
The Underappreciated Power of Vision Models for Graph Structural Understanding. CoRR abs/2510.24788 (2025)- 2024
[j6]Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang, Shunmei Meng:
A secure data interaction method based on edge computing. J. Cloud Comput. 13(1): 61 (2024)
[j5]Xinjian Zhao, Guoquan Yuan, Shuhan Qiu, Chenwei Xu, Shanming Wei:
A mobile edge computing-focused transferable sensitive data identification method based on product quantization. J. Cloud Comput. 13(1): 96 (2024)
[j4]Weiwei Miao, Xinjian Zhao, Yinzhao Zhang, Shi Chen, Xiaochao Li, Qianmu Li
:
A Deep Learning-Based Method for Preventing Data Leakage in Electric Power Industrial Internet of Things Business Data Interactions. Sensors 24(13): 4069 (2024)
[j3]Weiwei Miao, Xinjian Zhao, Ce Wang, Shi Chen, Peng Gao, Qianmu Li
:
A Gnn-Enhanced Ant Colony Optimization for Security Strategy Orchestration. Symmetry 16(9): 1183 (2024)
[c9]Chaolong Ying, Xinjian Zhao, Tianshu Yu:
Boosting Graph Pooling with Persistent Homology. NeurIPS 2024
[c8]Yaoyao Xu, Xinjian Zhao, Xiaozhuang Song, Benyou Wang, Tianshu Yu:
Boosting Protein Language Models with Negative Sample Mining. ECML/PKDD (10) 2024: 199-214
[i6]Xinjian Zhao, Liang Zhang, Yang Liu, Ruocheng Guo, Xiangyu Zhao:
Adversarial Curriculum Graph Contrastive Learning with Pair-wise Augmentation. CoRR abs/2402.10468 (2024)
[i5]Chaolong Ying, Xinjian Zhao, Tianshu Yu:
Boosting Graph Pooling with Persistent Homology. CoRR abs/2402.16346 (2024)
[i4]Xinjian Zhao, Chaolong Ying, Tianshu Yu:
Graph Learning with Distributional Edge Layouts. CoRR abs/2402.16402 (2024)
[i3]Yaoyao Xu, Xinjian Zhao, Xiaozhuang Song, Benyou Wang, Tianshu Yu:
Boosting Protein Language Models with Negative Sample Mining. CoRR abs/2405.17902 (2024)
[i2]Xiangru Jian, Xinjian Zhao, Wei Pang, Chaolong Ying, Yimu Wang, Yaoyao Xu, Tianshu Yu:
Do spectral cues matter in contrast-based graph self-supervised learning? CoRR abs/2405.19600 (2024)- 2023
[j2]Xinjian Zhao, Fei Xia, Guoquan Yuan, Sen Zhang
, Shi Chen, Weiwei Ni:
Differentially Private Social Graph Publishing With Nearest Neighbor Structure Preservation. IEEE Access 11: 75859-75874 (2023)
[j1]Mu Chen, Lu Chen, Zhipeng Shao, Zaojian Dai, Nige Li, Xingjie Huang, Qian Dang, Xinjian Zhao:
A Source Code Cross-site Scripting Vulnerability Detection Method. KSII Trans. Internet Inf. Syst. 17(6): 1689-1705 (2023)
[c7]Shi Chen, Qianmu Li, Qi Wang, Xinjian Zhao, Hao Ge, Nianzhe Li:
A Multi-Channel Composite Recommendation Method in Federated Learning. DASC/PiCom/CBDCom/CyberSciTech 2023: 698-705
[c6]Xinjian Zhao, Qianmu Li, Qi Wang, Shi Chen, Tengfei Li, Nianzhe Li:
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing. GPC (1) 2023: 14-29
[i1]Xiangyu Zhao, Maolin Wang, Xinjian Zhao, Jiansheng Li, Shucheng Zhou, Dawei Yin, Qing Li, Jiliang Tang, Ruocheng Guo:
Embedding in Recommender Systems: A Survey. CoRR abs/2310.18608 (2023)- 2022
[c5]Zaojian Dai, Nige Li, Yong Li, Guoquan Yuan, Xinjian Zhao, Ran Zhao, Fan Wu:
Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust. ICAIS (3) 2022: 507-519
[c4]Lu Chen, Xinjian Zhao, Ran Zhao, Guoquan Yuan, Song Zhang, Shi Chen, Fan Wu:
Mobile Internet Access Control Strategy Based on Trust Perception. ICAIS (3) 2022: 598-611- 2021
[c3]Wei Hu, Jianyi Liu, Han Guo, Jing Li, Xinjian Zhao, Mingyang Zhang:
Network Security Situation Prediction Model Based on Security Situation Factors. DSC 2021: 23-31
2010 – 2019
- 2013
[c2]Weidang Lu, Jing Wang, Feng Li, Jingyu Hua, Limin Meng, Xinjian Zhao:
An anti-interference cooperative spectrum sharing strategy with full-duplex. ICON 2013: 1-4- 2010
[c1]Rongyou Huang, Xinjian Zhao:
A Chinese Web Page Automatic Classification System. WISM 2010: 61-66
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-22 05:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







