


default search action
Xiaohua Li 0003
Person information
- affiliation: State University of New York at Binghamton, Department of Electrical and Computer Engineering, Vestal, NY, USA
- affiliation (PhD): University of Cincinnati, Cincinnati, OH, USA
Other persons with the same name
- Xiaohua Li (aka: XiaoHua Li, Xiao-hua Li, Xiao-Hua Li) — disambiguation page
- Xiaohua Li 0001
— Xi'an University of Technology, School of Computer Science and Engineering, Xi'an, China (and 2 more) - Xiaohua Li 0002
— University of Science and Technology Liaoning, School of Electronic and Information Engineering, Anshan, China (and 3 more) - Xiaohua Li 0004
— Northeastern University, School of Computer Science and Engineering, Shenyang, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[c64]Lhamo Dorje, Nihal Poredi, Jordan Madden, Soamar Homsi, Yu Chen, Xiaohua Li:
MilliSARImageNet: A 2D High-Resolution Millimeter-Wave SAR Image Dataset. CCNC 2026: 1-6
[c63]Mohsen Hatami, Lhamo Dorje, Xiaohua Li, Yu Chen:
Is ENF a Good Physical Fingerprint? CCNC 2026: 1-4
[c62]Han Sun, Qian Qu, Lhamo Dorje, Yu Chen, Xiaohua Li:
Senior Safety Monitoring in Microverse using Fuzzy Neural Network Enhanced Action Recognition. CCNC 2026: 1-2- 2025
[j25]Mohsen Hatami
, Lhamo Dorje, Xiaohua Li, Yu Chen
:
Electric Network Frequency as Environmental Fingerprint for Metaverse Security: A Comprehensive Survey. Comput. 14(8): 321 (2025)- 2024
[j24]Qian Qu, Mohsen Hatami
, Ronghua Xu
, Deeraj Nagothu
, Yu Chen
, Xiaohua Li, Erik Blasch
, Erika Ardiles-Cruz, Genshe Chen
:
The Microverse: A Task-Oriented Edge-Scale Metaverse. Future Internet 16(2): 60 (2024)
[c61]Lhamo Dorje, Qian Qu, Xiaohua Li, Yu Chen, Erika Ardiles-Cruz:
Security of RF Sensing and Imaging Systems in the Age of Digital Twins. DDDAS/Infosymbiotics 2024: 162-170
[c60]Lhamo Dorje, Xiaohua Li, Yu Chen, Nihal Poredi:
High-Resolution Imaging Capability of Large-Scale LEO Satellite Constellations. ICC 2024: 1594-1599- 2023
[c59]Nihal Poredi, Yu Chen, Xiaohua Li, Erik Blasch:
Enhance Public Safety Surveillance in Smart Cities by Fusing Optical and Thermal Cameras. FUSION 2023: 1-7- 2022
[j23]Manjushree B. Aithal
, Xiaohua Li
:
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation. IEEE Access 10: 12395-12411 (2022)
[c58]Xiaohua Li, Lhamo Dorje, Yezhan Wang, Yu Chen, Erika Ardiles-Cruz:
High-Resolution Imaging Satellite Constellation. DDDAS 2022: 95-102
[c57]Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:
A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. ICCCN 2022: 1-7
[c56]Manjushree B. Aithal, Xiaohua Li:
Boundary Defense Against Black-box Adversarial Attacks. ICPR 2022: 2349-2356
[c55]Nihal Poredi, Deeraj Nagothu, Yu Chen, Xiaohua Li, Alexander J. Aved, Erika Ardiles-Cruz, Erik Blasch:
Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication. MMSP 2022: 1-6
[i12]Manjushree B. Aithal, Xiaohua Li:
Boundary Defense Against Black-box Adversarial Attacks. CoRR abs/2201.13444 (2022)
[i11]Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:
A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. CoRR abs/2208.01466 (2022)- 2021
[j22]Xiaohua Li
, Yu Chen
:
Lightweight 2D Imaging for Integrated Imaging and Communication Applications. IEEE Signal Process. Lett. 28: 528-532 (2021)
[c54]Shibo Zhou, Xiaohua Li, Ying Chen
, Sanjeev Tannirkulam Chandrasekaran, Arindam Sanyal:
Temporal-Coded Deep Spiking Neural Network with Easy Training and Robust Performance. AAAI 2021: 11143-11151
[i10]Shibo Zhou, Wei Wang, Xiaohua Li, Zhanpeng Jin:
A Spike Learning System for Event-driven Object Recognition. CoRR abs/2101.08850 (2021)
[i9]Manjushree B. Aithal, Xiaohua Li:
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation. CoRR abs/2109.15160 (2021)- 2020
[j21]Shibo Zhou, Ying Chen
, Xiaohua Li, Arindam Sanyal
:
Deep SCNN-Based Real-Time Object Detection for Self-Driving Vehicles Using LiDAR Temporal Data. IEEE Access 8: 76903-76912 (2020)
[c53]Wei Wang, Shibo Zhou, Jingxi Li, Xiaohua Li, Junsong Yuan
, Zhanpeng Jin:
Temporal Pulses Driven Spiking Neural Network for Time and Power Efficient Object Recognition in Autonomous Driving. ICPR 2020: 6359-6366
[c52]Shibo Zhou, Xiaohua Li:
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection. ICPR 2020: 8148-8155
[i8]Wei Wang, Shibo Zhou, Jingxi Li, Xiaohua Li, Junsong Yuan, Zhanpeng Jin:
Temporal Pulses Driven Spiking Neural Network for Fast Object Recognition in Autonomous Driving. CoRR abs/2001.09220 (2020)
[i7]Joseph St. Cyr, Joshua Vanderpool, Yu Chen, Xiaohua Li:
HODET: Hybrid Object DEtection and Tracking using mmWave Radar and Visual Sensors. CoRR abs/2004.06861 (2020)
[i6]Shibo Zhou, Xiaohua Li:
Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection. CoRR abs/2010.07803 (2020)
2010 – 2019
- 2019
[j20]Mohammadreza Ghorbaniparvar, Ning Zhou
, Xiaohua Li, Daniel J. Trudnowski
, Ruichao Xie:
A Forecasting-Residual Spectrum Analysis Method for Distinguishing Forced and Natural Oscillations. IEEE Trans. Smart Grid 10(1): 493-502 (2019)
[c51]Robert J. Thompson, Xiaohua Li:
Integrating Volterra Series Model and Deep Neural Networks to Equalize Nonlinear Power Amplifiers. CISS 2019: 1-6
[i5]Jian Zheng, Sudha Krishnamurthy, Ruxin Chen, Min-Hung Chen
, Zhenhao Ge, Xiaohua Li:
Image Captioning with Integrated Bottom-Up and Multi-level Residual Top-Down Attention for Game Scene Understanding. CoRR abs/1906.06632 (2019)- 2018
[j19]Xiaohua Li
, Yun Zhang, Wednel Cadeau:
Hybrid Massive MIMO for Secure Transmissions Against Stealthy Eavesdroppers. IEEE Commun. Lett. 22(1): 81-84 (2018)
[j18]Mingjian Zhang
, Xiaohua Li
, Jun Peng
:
Using Joint Generalized Eigenvectors of a Set of Covariance Matrix Pencils for Deflationary Blind Source Extraction. IEEE Trans. Signal Process. 66(11): 2892-2904 (2018)
[c50]Jian Zheng, Yifan Wang, Xiaonan Zhang
, Xiaohua Li:
Classification of Severely Occluded Image Sequences via Convolutional Recurrent Neural Networks. GlobalSIP 2018: 395-399
[c49]Jianbo Zheng, Teng-Yok Lee
, Chen Feng
, Xiaohua Li, Ziming Zhang:
Robust Attentional Pooling via Feature Selection. ICPR 2018: 2038-2043
[c48]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models. ISC2 2018: 1-9
[c47]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios. ISC2 2018: 1-8
[c46]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Roger Zimmermann:
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. SecureComm (1) 2018: 297-317
[i4]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. CoRR abs/1804.09266 (2018)
[i3]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models. CoRR abs/1805.00428 (2018)
[i2]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study. CoRR abs/1808.09858 (2018)- 2017
[j17]Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. EAI Endorsed Trans. Security Safety 4(12): e3 (2017)
[c45]Mingjian Zhang, Xiaohua Li, Jun Peng:
Blind source separation using joint canonical decomposition of two higher order tensors. CISS 2017: 1-6
[c44]Jian Zheng, Cencen Xu, Ziang Zhang
, Xiaohua Li:
Electric load forecasting in smart grids using Long-Short-Term-Memory based Recurrent Neural Network. CISS 2017: 1-6
[c43]Jian Zheng, Wei Yang, Xiaohua Li:
Training data reduction in deep neural networks with partial mutual information based feature selection and correlation matching based active learning. ICASSP 2017: 2362-2366
[c42]Xiaohua Li, Jian Zheng, Mingjian Zhang:
Compressive sensing based spectrum sharing and coexistence for machine-to-machine communications. ICASSP 2017: 3604-3608
[c41]Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. MMM-ACNS 2017: 247-259
[i1]Monireh Dabaghchian, Amir Alipour-Fanid, Songsong Liu, Kai Zeng, Xiaohua Li, Yu Chen:
Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios. CoRR abs/1712.09315 (2017)- 2016
[j16]Xiaohua Li
, Jian Zheng:
Active Learning for Regression With Correlation Matching and Labeling Error Suppression. IEEE Signal Process. Lett. 23(8): 1081-1085 (2016)
[c40]Xiaohua Li, Jian Zheng:
Joint machine learning and human learning design with sequential active learning and outlier detection for linear regression problems. CISS 2016: 407-411
[c39]Mingjian Zhang, Xiaohua Li:
Deflationary blind source extraction using an exact solution subspace searching scheme. GlobalSIP 2016: 65-69
[c38]Jian Zheng, Xiaohua Li:
Active regression with compressive-sensing based outlier mitigation for both small and large outliers. GlobalSIP 2016: 172-176
[c37]Mohammadreza Ghorbaniparvar, Ning Zhou, Xiaohua Li:
Coherence function estimation with a derivative constraint for power grid oscillation detection. GlobalSIP 2016: 791-795
[c36]Monireh Dabaghchian
, Songsong Liu, Amir Alipour-Fanid, Kai Zeng, Xiaohua Li, Yu Chen:
Intelligence Measure of Cognitive Radios with Learning Capabilities. GLOBECOM 2016: 1-6
[c35]Xiaohua Li, Yu Chen, Kai Zeng:
Integration of machine learning and human learning for training optimization in robust linear regression. ICASSP 2016: 2613-2617- 2015
[c34]Xiaohua Li, Jeong Kyun Lee:
Multi-hop relaying with optimal decode-and-forward transmission rate and self-immunity to mutual interference among wireless nodes. CISS 2015: 1-6
[c33]Mohammadreza Ghorbaniparvar, Xiaohua Li, Ning Zhou:
Demand side management with a human behavior model for energy cost optimization in smart grids. GlobalSIP 2015: 503-507
[c32]Xiaohua Li, Jeong Kyun Lee:
Joint re-encoding and successive interference cancellation for multi-hop relay networks. GlobalSIP 2015: 1091-1095
[c31]Xiaohua Li, Thomas Yang:
Signal Processing Oriented Approach for Big Data Privacy. HASE 2015: 275-276
[c30]Jeong Kyun Lee, Xiaohua Li:
Interference immune multi-hop relaying and efficient relay selection algorithm for arbitrarily large half-duplex Gaussian wireless networks. WCSP 2015: 1-5- 2014
[c29]Xiaohua Li, Zifan Zhang:
Exploit the scale of big data for data privacy: An efficient scheme based on distance-preserving artificial noise and secret matrix transform. ChinaSIP 2014: 500-504
[c28]Chengyu Xiong, Xiaohua Li:
Competitive performance of multiple spectrum access strategies coexisting in heterogeneous cognitive radio networks. ChinaSIP 2014: 668-672
[c27]Xiaohua Li, Chengyu Xiong, Wednel Cadeau:
A polynomial rooting approach for analysis of competition among secondary users in cognitive radio networks. DySPAN 2014: 161-169
[c26]Xiaohua Li, Chengyu Xiong:
Markov Model Bank for heterogenous cognitive radio networks with multiple dissimilar users and channels. ICNC 2014: 93-97- 2013
[c25]Xiaohua Li, Chengyu Xiong:
Performance analysis of coexisting secondary users in heterogeneous cognitive radio network. Allerton 2013: 1422-1426
[c24]Wednel Cadeau, Xiaohua Li:
Jamming probabilities and throughput of cognitive radio communications against a wideband jammer. CISS 2013: 1-6
[c23]Chengyu Xiong, Xiaohua Li:
Optimal relay selections in two-way amplify-and-forward networks. CISS 2013: 1-5
[c22]Xiaohua Li, Chengyu Xiong, Jared Feldman:
OFDM Transmission scheme for asynchronous two-way multi-relay cooperative networks with analog network coding. GLOBECOM Workshops 2013: 19-24
[c21]Xiaohua Li:
Methods to evaluate the performance of multiple uncooperative users for green cognitive radio networks. OnlineGreenComm 2013: 38-42- 2012
[c20]Wednel Cadeau, Xiaohua Li:
Anti-jamming performance of cognitive radio networks under multiple uncoordinated jammers in fading environment. CISS 2012: 1-6
[c19]Xiaohua Li, Jared Feldman, Wednel Cadeau:
An OFDM-based distributed transmission scheme for uncoordinated transmitters without carrier frequency and timing synchronization. MILCOM 2012: 1-6- 2011
[c18]Xiaohua Li, Wednel Cadeau:
Anti-jamming performance of cognitive radio networks. CISS 2011: 1-6- 2010
[c17]Chengyu Xiong, Xiaohua Li:
Minimum cost optimization of multicast wireless networks with network coding. CISS 2010: 1-5
2000 – 2009
- 2009
[c16]Xiaohua Li, Juite Hwu:
A frequency hopping spread spectrum transmission scheme for uncoordinated cognitive radios. ICASSP 2009: 2345-2348- 2008
[j15]Xiaohua Li, Fan Ng, Taewoo Han:
Carrier Frequency Offset Mitigation in Asynchronous Cooperative OFDM Transmissions. IEEE Trans. Signal Process. 56(2): 675-685 (2008)
[c15]Juite Hwu, Jinying Chen, Xiaohua Li:
Sum transmission power of multiple cooperative secondary transmitters in dynamic spectrum access networks. CISS 2008: 209-212
[c14]Xiaohua Li, Jinying Chen, Fan Ng:
Secure transmission power of cognitive radios for dynamic spectrum access applications. CISS 2008: 213-218
[c13]Xiaohua Li:
Hop Optimization and Relay Node Selection in Multi-hop Wireless Ad-Hoc Networks. GridNets 2008: 161-174- 2007
[j14]N. Eva Wu, Sudha Thavamani, Xiaohua Li:
Reliability and feedback of multiple hop wireless networks. Int. J. Autom. Comput. 4(2): 125-134 (2007)
[j13]Xiaohua Li, Juite Hwu, E. Paul Ratazzi
:
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions. J. Commun. 2(3): 24-32 (2007)
[c12]Fan Ng, Xiaohua Li:
CFO-Resistant Receiver for Asynchronous MC-DS-CDMA Systems. ICASSP (3) 2007: 253-256- 2006
[c11]Xiaohua Li, Juite Hwu, E. Paul Ratazzi
:
Array Redundancy and Diversity for Wireless Transmissions with Low Probability of Interception. ICASSP (4) 2006: 525-528- 2005
[j12]Xiaohua Li, Mo Chen, Wenyu Liu:
Application of STBC-encoded cooperative transmissions in wireless sensor networks. IEEE Signal Process. Lett. 12(2): 134-137 (2005)
[j11]Xiaohua Li:
Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors. IEEE Trans. Signal Process. 53(4): 1511-1519 (2005)
[c10]Wenyu Liu, Xiaohua Li, Mo Chen:
Energy efficiency of MIMO transmissions in wireless sensor networks with diversity and multiplexing gains. ICASSP (4) 2005: 897-900- 2004
[j10]Xiaohua Li:
Space-time coded multi-transmission among distributed transmitters without perfect synchronization. IEEE Signal Process. Lett. 11(12): 948-951 (2004)
[j9]Xiaohua Li:
Contention resolution in random-access wireless networks based on orthogonal complementary codes. IEEE Trans. Commun. 52(1): 82-89 (2004)
[c9]Xiaohua Li:
Blind channel identification and equalization in dense wireless sensor networks with distributed transmissions. ICASSP (2) 2004: 41-44- 2003
[c8]Taewoo Han, Xiaohua Li:
Minimum-output-energy method for blind equalization of OFDM and systems with sufficient or insufficient cyclic prefix. ICASSP (4) 2003: 225-228
[c7]Xiaohua Li, Wenyu Liu:
Smart contention resolution in random access wireless networks with unknown multiple users: a joint layer design approach. ICC 2003: 1243-1247
[c6]Xiaohua Li:
Make random access contentions transparent by orthogonal complementary codes in wireless communications. ICC 2003: 2159-2163- 2002
[j8]Xiaohua Li:
Blind sequence detection without channel estimation. IEEE Trans. Signal Process. 50(7): 1735-1746 (2002)
[c5]Xiaohua Li:
Utilizing channel coding information in CIVA-based blind sequence detectors. ICASSP 2002: 2461-2464
[c4]Xiaohua Li, Taewoo Han:
Blind channel identification and equalization for precoded communication systems. ICC 2002: 124-128- 2001
[j7]Xiaohua Li, H. Howard Fan:
Direct blind multiuser detection for CDMA in multipath without channel estimation. IEEE Trans. Signal Process. 49(1): 63-73 (2001)
[j6]Xiaohua Li, H. Howard Fan:
Direct blind equalization with best delay by channel output whitening. IEEE Trans. Signal Process. 49(7): 1556-1563 (2001)
[j5]Xiaohua Li, H. Howard Fan:
Blind channel identification: subspace tracking method without rank estimation. IEEE Trans. Signal Process. 49(10): 2372-2382 (2001)
[c3]Xiaohua Li, H. Howard Fan:
Blind channel identification by subspace tracking and successive cancellation. ICASSP 2001: 2121-2124- 2000
[j4]Xiaohua Li, Howard Fan:
QR factorization based blind channel identification with second-order statistics. IEEE Trans. Signal Process. 48(1): 60-69 (2000)
[j3]Xiaohua Li, Howard Fan:
Linear prediction methods for blind fractionally spaced equalization. IEEE Trans. Signal Process. 48(6): 1667-1675 (2000)
[j2]Xiaohua Li, Howard Fan:
Direct estimation of blind zero-forcing equalizers based on second-order statistics. IEEE Trans. Signal Process. 48(8): 2211-2218 (2000)
[j1]H. Howard Fan, Xiaohua Li:
Linear prediction approach for joint blind equalization and blind multiuser detection in CDMA systems. IEEE Trans. Signal Process. 48(11): 3134-3145 (2000)
[c2]Xiaohua Li, H. Howard Fan:
Blind multiuser detection for CDMA with multipath: a direct method. ICASSP 2000: 2901-2904
1990 – 1999
- 1999
[c1]Xiaohua Li, H. Howard Fan:
Recursive blind channel identification and equalization by ULV decomposition. ICASSP 1999: 2639-2642
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-06 00:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







