


default search action
He Xu 0002
Person information
- affiliation: Nanjing University of Posts and Telecommunications, College of Computer, China
Other persons with the same name
- He Xu — disambiguation page
- He Xu 0001
— Ningbo University of Technology, School of Cyber Science and Engineering, China (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j46]Shuyan Cheng, Peng Li
, Keji Han, Yangjun Xiong, He Xu, Ruchuan Wang:
Enhancing adversarial transferability through frequency-domain boundary samples tuning. Expert Syst. Appl. 298: 129565 (2026)
[j45]Wenlong Zheng
, Heng Zhang
, Yuhao Zhang
, Peng Li
, He Xu
:
PaDe: Towards robust adversarial patch defense via trigger-space feature decoupling and orthogonal representation learning. Expert Syst. Appl. 313: 131509 (2026)
[j44]Yihan Shi
, Wenlong Zheng
, He Xu
, Xu An Wang
, Ruchuan Wang:
A unified optimization framework for backdoor attacks in large language models. Inf. Fusion 132: 104221 (2026)- 2025
[j43]Yunyun Sun, Peng Li
, Hang Sun
, He Xu
, Ruchuan Wang:
Feature selection through adaptive sparse learning for scene recognition. Appl. Soft Comput. 169: 112439 (2025)
[j42]Haitao Cheng
, Qunli Zheng, Peng Li, He Xu
:
Enhancing diabetes complications prediction through knowledge graphs and convolutional networks. Eng. Appl. Artif. Intell. 153: 110863 (2025)
[j41]Shuyan Cheng, Peng Li, Keji Han, Yumiao Zheng, He Xu
, Yudong Yao:
DMFP: Dynamic multiscale feature perturbations for transferable adversarial attacks. Knowl. Based Syst. 330: 114469 (2025)
[j40]Di Zhang, He Xu
, Peng Li
, Yunyun Sun, Weiwei Jiang
, Xu An Wang
, Mingyu Zhou
:
Privacy Parameter Setting and Usability Optimization Algorithm for Medical Data. IEEE Trans. Consumer Electron. 71(2): 4883-4891 (2025)
[j39]Manman Zhang
, Peng Li
, Shanjun Bao, He Xu
, Feng Zhu
:
A Secondary Nondestructive Detection Method of Liquid Concentration for RFID Tag Array With Mutual Coupling. IEEE Trans. Mob. Comput. 24(9): 9202-9221 (2025)- 2024
[j38]Shuyan Cheng, Peng Li
, Jianguo Liu, He Xu, Yudong Yao:
Improving the transferability of adversarial attacks via self-ensemble. Appl. Intell. 54(21): 10608-10626 (2024)
[j37]Shuyan Cheng
, Peng Li
, Keji Han, He Xu
:
Feature-aware transferable adversarial attacks against image classification. Appl. Soft Comput. 161: 111729 (2024)
[j36]Shuyan Cheng
, Peng Li
, Ruchuan Wang, He Xu:
Differentially private federated learning with non-IID data. Computing 106(7): 2459-2488 (2024)
[j35]Feng Zhu
, Zidong Cheng
, Peng Li
, He Xu
:
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence. IEEE Internet Things J. 11(11): 20867-20878 (2024)
[j34]Wenlong Zheng
, He Xu
, Peng Li
, Ruchuan Wang, Xing Shao
:
SAC-RSM: A High-Performance UAV-Side Road Surveillance Model Based on Super-Resolution Assisted Learning. IEEE Internet Things J. 11(22): 36066-36083 (2024)
[j33]Yunyun Sun, Peng Li
, He Xu
, Ruchuan Wang:
Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification. Neural Networks 179: 106511 (2024)- 2023
[j32]Haitao Cheng
, Jingshu Zhu
, Peng Li
, He Xu
:
Combining knowledge extension with convolution neural network for diabetes prediction. Eng. Appl. Artif. Intell. 125: 106658 (2023)
[j31]Chuanxin Zhao
, Long Wang, Fei Xiong, Siguang Chen
, Jian Su
, He Xu
:
RFID-Based Human Action Recognition Through Spatiotemporal Graph Convolutional Neural Network. IEEE Internet Things J. 10(22): 19898-19912 (2023)
[j30]He Xu
, Wenlong Zheng, Fengxuan Liu, Peng Li
, Ruchuan Wang:
Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5. Remote. Sens. 15(14): 3583 (2023)
[j29]He Xu
, Xianzhen Yin
, Feng Zhu
, Peng Li
:
RF-Ray: Sensing Objects in the Package via RFID Systems. IEEE Syst. J. 17(1): 558-568 (2023)
[c44]Hang Sun
, Yunyun Sun, Peng Li
, He Xu
:
Multi-attention Integration Mechanism for Region Destruction Detection of Remote Sensing Images. CGI (3) 2023: 198-210- 2022
[j28]Manman Zhang, Peng Li, He Xu
, Ruchuan Wang:
RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm. J. Sensors 2022: 1-19 (2022)
[j27]He Xu
, Mingtao Guo
, Nadia Nedjah
, Jindan Zhang
, Peng Li
:
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration. IEEE Trans. Intell. Transp. Syst. 23(10): 19760-19771 (2022)- 2021
[j26]Haitao Cheng
, Peng Li, Ruchuan Wang, He Xu:
Dynamic spatio-temporal logic based on RCC-8. Concurr. Comput. Pract. Exp. 33(22) (2021)
[j25]Peng Li, Chao Xu, He Xu:
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks. Int. J. Inf. Secur. Priv. 15(1): 1-23 (2021)
[j24]He Xu
, Xin Chen
, Feng Zhu
, Peng Li
:
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems. Wirel. Commun. Mob. Comput. 2021: 8844178:1-8844178:14 (2021)
[c43]Dingyang Lv
, Xinyu Cheng, Jinghui Zhang, Wei Zhang, Wei Zhao, He Xu:
DDoS Attack Detection Based on CNN and Federated Learning. CBD 2021: 236-241
[c42]Jinhai Fang, Zuoling Xie, Haitao Cheng, Bin Fan, He Xu, Peng Li:
Anomaly detection of diabetes data based on hierarchical clustering and CNN. ITQM 2021: 71-78
[c41]Chen-Yun Luo, Shuyan Cheng, He Xu, Peng Li:
Human behavior recognition model based on improved EfficientNet. ITQM 2021: 369-376
[c40]Jing Chen, Peng Li, Weiqing Fang, Ning Zhou, Yue Yin, He Xu, Hui Zheng:
Fuzzy Association Rules Mining based on Type-2 Fuzzy Sets over Data Stream. ITQM 2021: 456-462
[c39]Yi Lu, Peng Li, He Xu:
A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things. ITQM 2021: 629-636- 2020
[j23]Mingtao Guo, Donghui Xue, Peng Li
, He Xu
:
Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism. Inf. 11(12): 583 (2020)
[j22]Peng Li
, Baozhou Luo, Wenjun Zhu, He Xu:
Cluster-based distributed dynamic cuckoo filter system for Redis. Int. J. Parallel Emergent Distributed Syst. 35(3): 340-353 (2020)
[j21]Liang Xiao, He Xu
, Feng Zhu
, Ruchuan Wang, Peng Li
:
SKINNY-Based RFID Lightweight Authentication Protocol. Sensors 20(5): 1366 (2020)
[j20]Shuyan Cheng
, Shujun Wang, Wenbai Guan, He Xu
, Peng Li
:
3DLRA: An RFID 3D Indoor Localization Method Based on Deep Learning. Sensors 20(9): 2731 (2020)
[j19]Feng Zhu
, Peng Li
, He Xu
, Ruchuan Wang:
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems. Sensors 20(17): 4846 (2020)
[j18]Zhiyu Chen, Qiong Lin
, Jing Sun, Yujian Feng
, Shangdong Liu
, Qiang Liu, Yimu Ji, He Xu
:
Cascaded Cross-Modality Fusion Network for 3D Object Detection. Sensors 20(24): 7243 (2020)
[c38]Zhuang Xu, Yue Yin, Haitao Chen, He Xu, Peng Li:
Algorithm for Determining Number of Clusters based on Dichotomy. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 180-185
[c37]Zhengcai Li, Mingtao Guo, He Xu, Peng Li:
Prediction of diabetes using Multi-type data. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 204-210
[c36]Yang Li, He Xu, Peng Li:
RFID-Based WIMEC-LANDMARC Indoor Location Algorithm. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 448-455
[c35]Hanxiao Zhi, He Xu, Peng Li:
Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 456-461
2010 – 2019
- 2019
[j17]Leixian Shen, Qingyun Zhang
, Jiayi Pang, He Xu
, Peng Li:
PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning. IEEE Access 7: 20249-20261 (2019)
[j16]Haitao Cheng
, Ruchuan Wang, Peng Li, He Xu:
Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey. Intell. Data Anal. 23(S1): 113-132 (2019)
[j15]He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:
Novel implementation of defence strategy of relay attack based on cloud in RFID systems. Int. J. Inf. Comput. Secur. 11(2): 120-144 (2019)
[j14]Leixian Shen, Qingyun Zhang
, Jiayi Pang, He Xu
, Peng Li
, Donghui Xue:
ANTspin: Efficient Absolute Localization Method of RFID Tags via Spinning Antenna. Sensors 19(9): 2194 (2019)
[j13]Feng Zhu
, Peng Li
, He Xu
, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors 19(13): 2957 (2019)
[c34]Donghui Xue, He Xu, Peng Li:
An Indoor 3D Positioning Technology Based on NB-IoT. AINA Workshops 2019: 35-43
[c33]Jiayi Pang, Leixian Shen, Qingyun Zhang
, He Xu, Peng Li:
Design of Modern Logistics Management System Based on RFID and NB-IoT. AINA Workshops 2019: 561-569
[c32]Hao Wu, He Xu, Peng Li:
Design and Implementation of Cloud Service System Based on Face Recognition. CISIS 2019: 629-636
[c31]Ke Zang, He Xu, Feng Zhu, Peng Li:
Analysis and Design of Group RFID Tag Security Authentication Protocol. CISIS 2019: 637-645
[c30]Yuan Shen, Yunxiao Wang, Fangxin Wang, He Xu, Peng Li:
A Novel Heat-Proof Clothing Design Algorithm Based on Heat Conduction Theory. ICDS 2019: 266-274- 2018
[j12]He Xu, Jie Ding, Peng Li, Daniele Sgandurra, Ruchuan Wang:
An improved SMURF scheme for cleaning RFID data. Int. J. Grid Util. Comput. 9(2): 170-178 (2018)
[j11]Peng Li, Jinquan Song, He Xu, Lu Dong, Yang Zhou:
Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing. Int. J. High Perform. Syst. Archit. 8(1/2): 51-58 (2018)
[j10]He Xu, Jie Ding, Peng Li, Ruchuan Wang:
Edge computing-based security authentication algorithm for multiple RFID tags. Int. J. Intell. Inf. Database Syst. 11(2/3): 132-152 (2018)
[j9]Peng Li, Lu Dong, He Xu, Ting Fung Lau:
Spark's operation time predictive in cloud computing environment based on SRC-WSVR. J. High Speed Networks 24(1): 49-62 (2018)
[j8]He Xu
, Jie Ding, Peng Li
, Feng Zhu, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function. Sensors 18(3): 760 (2018)
[j7]He Xu
, Manxing Wu, Peng Li
, Feng Zhu, Ruchuan Wang:
An RFID Indoor Positioning Algorithm Based on Support Vector Regression. Sensors 18(5): 1504 (2018)
[c29]Hanxiao Zhi, Peng Li, He Xu, Feng Zhu:
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks. CISIS 2018: 196-205
[c28]Wenkang Xie, Peng Li, He Xu:
Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data. CISIS 2018: 497-505
[c27]Lu Dong, Peng Li, He Xu, Cheng Yang:
Analysis of Localization Algorithms in Wireless Sensor Networks. CISIS 2018: 573-582
[c26]Fangzhou Chen, Peng Li, He Xu, Wenkang Xie:
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark. CISIS 2018: 1047-1057
[c25]Feng Zhu, Youngtae Yun, Jinpeng Wei, Brent ByungHoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, Ruchuan Wang:
A Reflective Covert Channel Attack Anchored on Trusted Web Services. ICWS 2018: 84-99
[c24]Haowen Sun, Peng Li, He Xu, Feng Zhu:
An Improvement RFID Security Authentication Protocol Based on Hash Function. IMIS 2018: 375-384
[c23]Hongyu Gan, Chenghao Wu, Jie Xu, Peng Li, He Xu:
Design and Implementation of Cognitive System of Children's Education Based on RFID. IMIS 2018: 448-455
[c22]Jie Ding, He Xu, Peng Li, Feng Zhu:
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code. IMIS 2018: 517-526
[c21]Wenjun Zhu, Peng Li, Baozhou Luo, He Xu, Yujie Zhang:
Research and Implementation of High Performance Traffic Processing Based on Intel DPDK. PAAP 2018: 62-68
[c20]Xuanxuan Wang, Peng Li, He Xu, Zhuang Xu, Yujie Zhang:
Analysis and Research Based on Differential Privacy Protection Related Algorithms. PAAP 2018: 126-133
[c19]Yang Zhou, Peng Li, He Xu:
Research on Container Load Strategy Based on Microservices. PAAP 2018: 134-139- 2017
[j6]Peng Li, Huqing Nie, He Xu, Lu Dong:
A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment. Int. J. Bus. Data Commun. Netw. 13(2): 15-27 (2017)
[j5]He Xu, Ye Ding, Peng Li, Ruchuan Wang:
Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags. Int. J. Bus. Data Commun. Netw. 13(2): 69-82 (2017)
[j4]He Xu
, Weiwei Shen
, Peng Li
, Daniele Sgandurra, Ruchuan Wang:
VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks. J. Sensors 2017: 3186482:1-3186482:11 (2017)
[j3]Peng Li
, Xiaotian Yu
, He Xu
, Jiewei Qian, Lu Dong
, Huqing Nie
:
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. Secur. Commun. Networks 2017: 6102780:1-6102780:12 (2017)
[j2]He Xu
, Ye Ding, Peng Li
, Ruchuan Wang, Yizhu Li:
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and K-Nearest Neighbor. Sensors 17(8): 1806 (2017)
[c18]Liangde Li, Peng Li, He Xu, Fangzhou Chen:
A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform. CISIS 2017: 537-546
[c17]Wanyuan Jiang, Peng Li, He Xu, Huqing Nie:
Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network. CISIS 2017: 589-598
[c16]Cong Qian, He Xu, Peng Li, Yizhuo Wang:
Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS. CISIS 2017: 599-608
[c15]Jie Ding, He Xu, Peng Li, Runyu Xie:
Design and Implementation of Food Safety Traceability System Based on RFID Technology. CISIS 2017: 657-666
[c14]Weiwei Shen, Han Wu, He Xu, Peng Li:
A New Middleware Architecture for RFID Data Management. EIDWT 2017: 212-221
[c13]He Xu, Chengcheng Yuan, Peng Li, Yizhuo Wang:
Design and implementation of action recognition system based on RFID sensor. ICNC-FSKD 2017: 3021-3025
[c12]Peng Li, Cheng Yang, He Xu, Ting Fung Lau, Ruchuan Wang:
User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment. PAAP 2017: 59-69
[c11]Lu Dong, Peng Li, He Xu, Baozhou Luo, Yu Mi:
Performance Prediction of Spark Based on the Multiple Linear Regression Analysis. PAAP 2017: 70-81
[c10]Huqing Nie, Peng Li, He Xu, Lu Dong, Jinquan Song, Ruchuan Wang:
Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment. PAAP 2017: 554-565
[c9]He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang:
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks. SpaCCS Workshops 2017: 291-301- 2016
[c8]He Xu, Jie Ding, Peng Li, Wei Li:
A Review on Data Cleaning Technology for RFID Network. 3PGCIC 2016: 373-382
[c7]He Xu, Weiwei Shen, Peng Li, Cong Qian:
An Efficient RFID Reader Network Planning Strategy Based on P2P Computing. 3PGCIC 2016: 383-390
[c6]Peng Li, Wanyuan Jiang, He Xu, Wei Liu:
Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B. 3PGCIC 2016: 391-404
[c5]He Xu, Ye Ding, Peng Li, Ruchuan Wang:
A Novel Cloud Computing Architecture Oriented Internet of Vehicles. 3PGCIC 2016: 447-458
[c4]Ye Ding, He Xu, Peng Li, Jie Ding:
Review of Virtual Memory Optimization in Cloud Environment. INCoS 2016: 53-58
[c3]Haiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu An Wang
:
Design and Implementation of Library Books Search and Management System Using RFID Technology. INCoS 2016: 392-397
[c2]Jiewei Qian, He Xu, Peng Li:
A Novel Secure Architecture for the Internet of Things. INCoS 2016: 398-401- 2013
[j1]He Xu
, Han-Chen Huang, Ruchuan Wang, Jun Dong:
Peer Selection Strategy Using Mobile Agent and Trust in Peer-to-Peer Streaming Media System. Int. J. Distributed Sens. Networks 9 (2013)- 2010
[c1]He Xu, Suoping Wang, Ruchuan Wang, Dan Zhao:
Research of P2P traffic identification based on naive Bayes and decision tables combination algorithm. FSKD 2010: 2875-2879
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-20 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







