Pu, Yue; Yao, Wenbin; Li, Xiaoyong EM-IFCM: fuzzy c-means clustering algorithm based on edge modification for imbalanced data. (English) Zbl 07806102 Inf. Sci. 659, Article ID 120029, 25 p. (2024). MSC: 68-XX 90-XX PDFBibTeX XMLCite \textit{Y. Pu} et al., Inf. Sci. 659, Article ID 120029, 25 p. (2024; Zbl 07806102) Full Text: DOI
Yao, Yukun; Liu, Jiangbing; Ren, Zhi; Li, Xiaoyong; Li, Juan High-efficient RPL routing protocol for centralized network congestion control. (Chinese. English summary) Zbl 1399.68022 Syst. Eng. Electron. 39, No. 12, 2810-2816 (2017). MSC: 68M12 PDFBibTeX XMLCite \textit{Y. Yao} et al., Syst. Eng. Electron. 39, No. 12, 2810--2816 (2017; Zbl 1399.68022)
Li, Xiaoyong; Zhou, Feng; Yang, Xudong A multi-dimensional trust evaluation model for large-scale P2P computing. (English) Zbl 1219.68050 J. Parallel Distrib. Comput. 71, No. 6, 837-847 (2011). MSC: 68M14 PDFBibTeX XMLCite \textit{X. Li} et al., J. Parallel Distrib. Comput. 71, No. 6, 837--847 (2011; Zbl 1219.68050) Full Text: DOI
Jiang, L. Y.; Li, H. P.; Zheng, G. G.; Li, X. Y.; Zhu, R. H. Genetic optimization of two-dimensional photonic crystals for large absolute band gaps under light line. (English) Zbl 1170.78401 J. Mod. Opt. 56, No. 10, 1220-1226 (2009). MSC: 78A60 68T05 PDFBibTeX XMLCite \textit{L. Y. Jiang} et al., J. Mod. Opt. 56, No. 10, 1220--1226 (2009; Zbl 1170.78401) Full Text: DOI
Jiang, Xue; Li, Xiao-yong Study on virtual machine’s live migration. (Chinese. English summary) Zbl 1180.68108 J. Comput. Appl. 28, No. 9, 2375-2377 (2008). MSC: 68N25 PDFBibTeX XMLCite \textit{X. Jiang} and \textit{X.-y. Li}, J. Comput. Appl. 28, No. 9, 2375--2377 (2008; Zbl 1180.68108) Full Text: DOI
Li, Xiao-Yong; Zhang, Shao-Gang Research on multi-attributes quantization model of dynamic trust relationship. (Chinese. English summary) Zbl 1173.68387 J. Comput. Appl. 28, No. 4, 884-887 (2008). MSC: 68M14 PDFBibTeX XMLCite \textit{X.-Y. Li} and \textit{S.-G. Zhang}, J. Comput. Appl. 28, No. 4, 884--887 (2008; Zbl 1173.68387) Full Text: DOI
Li, Xiaoyong; Gui, Xiaolin; Zhao, Juan; Feng, Dapeng A novel scalable aggregation algorithm of feedback trust information. (Chinese. English summary) Zbl 1164.68347 J. Xi’an Jiaotong Univ. 41, No. 8, 879-883 (2007). MSC: 68P20 PDFBibTeX XMLCite \textit{X. Li} et al., J. Xi'an Jiaotong Univ. 41, No. 8, 879--883 (2007; Zbl 1164.68347)
Liu, Dongxi; Li, Xiaoyong; Bai, Yingcai An attack-finding algorithm for security protocols. (English) Zbl 1057.68006 J. Comput. Sci. Technol. 17, No. 4, 450-463 (2002). MSC: 68M10 PDFBibTeX XMLCite \textit{D. Liu} et al., J. Comput. Sci. Technol. 17, No. 4, 450--463 (2002; Zbl 1057.68006) Full Text: DOI
Liu, Dongxi; Li, Xiaoyong; Bai, Yingcai An intelligent intruder model for security protocol analysis. (English) Zbl 1050.94528 Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 13-22 (2001). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Liu} et al., Lect. Notes Comput. Sci. 2229, 13--22 (2001; Zbl 1050.94528) Full Text: Link