代表论文

 

2018年发表论文情况:SCI期刊    篇,EI期刊  篇

 

【1】 Lin, Qinying; Song, Houbing; Gui, Xiaolin*; etc,A shortest path routing algorithm for unmanned aerial systems based on grid position,JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,  103: 215-224,   FEB 1 2018,  ISSN: 1084-8045, SCI入藏号: WOS:000424726600016

【2】 Ren, DW ; Gui, XL*; Lu, W; etc. GHCC: Grouping-Based and Hierarchical Collaborative Caching for Mobile Edge Computing, 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 会议日期: MAY 07-11, 2018 会议地点: Shanghai, PEOPLES R CHINA, ISBN: 978-3-9031-7600-3, ISTP入藏号: WOS:000434872700056
【3】Zhao, JQ (Zhao Jianqiang); Gui, XL (Gui Xiaolin)*; Zhang, XJ (Zhang Xuejun), Deep Convolution Neural Networks for Twitter Sentiment Analysis, IEEE ACCESS, 6: 23253-23260, 2018, ISSN: 2169-3536, SCI入藏号: WOS:000433448900001
【4】Yao, J (Yao, Jing); Zheng, YF (Zheng, Yifeng); Wang, C (Wang, Cong); Gui, XL (Gui, Xiaolin)*, Enabling Search Over Encrypted Cloud Data With Concealed Search,Pattern, IEEE ACCESS,  6: 11112-11122, 2018, ISSN: 2169-3536, 入藏号: WOS:000427990000001
【5】 Mao, YH (Mao, Yonghua); Shen, JJ (Shen, Junjie); Gui, XL (Gui, Xiaolin)*, A Study on Deep Belief Net for Branch, IEEE ACCESS, 6: 10779-10786, 2018, ISSN: 2169-3536, SCI入藏号: WOS:000428148600001
 

2017年发表论文情况:SCI期刊 5 篇,EI期刊  篇

[1] Yifeng Zheng; Xingliang Yuan; Xinyu Wang; Jinghua Jiang; Cong Wang; Xiaolin Gui,Toward Encrypted Cloud Media Center With Secure Deduplication
IEEE Transactions on Multimedia, Year: 2017, Volume: 19, Issue: 2, Pages: 251 - 265, DOI: 10.1109/TMM.2016.2612760 (SCI期刊)

  入藏号: WOS:000395795800003;ISSN: 1520-9210    eISSN: 1941-0077;IDS 号: EN1UN

[2] Zhao Jianqiang, Gui Xiaolin*, Tian Feng. A New Method of Identifying Influential Users in the Micro-blog Networks, IEEE Access, 2017,5: 3008-3015, SCI期刊

  入藏号: WOS:000397809900025,ISSN: 2169-3536,IDS 号: EQ1DP
[3] Zhao Jianqiang, Gui Xiaolin*.Comparison Research on Text Pre-processing Methods on Twitter Sentiment Analysis, IEEE Access,2017,5:2870-2879, SCI期刊

  入藏号: WOS:000397809900014,ISSN: 2169-3536,IDS 号: EQ1DP

[4] 梁鑫,桂小林*,戴慧珺,张晨,云环境中跨虚拟机的Cache侧信道攻击技术研究,计算机学报,40(2):317-336,2017 (EI检索期刊)

[5] Yang P, Gui XL*, An J, et al. An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service [J]. Security and Communication Networks. vol. 2017, Article ID 7695751, 11 pages, 2017. doi:10.1155/2017/7695751.    (SCI期刊) (IDS 号: EX1XB)(WOS:000403019000001)

[6]Jiang Jinghua, Zheng Yifeng, Shi Zhenkui, Yuan Xingliang, Gui Xiaolin*, and Wang Cong. A Practical System for Privacy-Aware Targeted Mobile Advertising Services[J]. IEEE Transactions on Services Computing (TSC), Accepted. Online (SCI期刊, 西安交大认定国际知名学术刊物)

[7]冀亚丽,桂小林*,戴慧珺,彭振龙. 支持轨迹隐私保护的两阶段用户兴趣区构建方法[J/OL]. 计算机学报,2017,:1-13(2017-07-28).

http://kns.cnki.net/kcms/detail/11.1826.TP.20170728.1303.042.html.

[8]崔舒宁,桂小林,张小彬. 分层培养的贯通计算机实践体系[J]. 计算机教育,2017,(08):169-172.

[9]张文东,小林*,蔡宁超,安健. 群智感知中采用节点社会属性的亲密度量化方法[J]. 西安交通大学学报,2017,51(06):73-78.

[10]蒋精华,桂小林*,郑宜峰,张学军,袁星亮,王聪. 支持加密搜索的定向息票安全投放框架[J]. 西安交通大学学报,2017,51(02):13-19.

[11] Dai, HJ; Gui, XL; Dai, ZS; tec.A Bi-Target Based Mobile Relay Selection Algorithm for MCNs,KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,卷: 11  期: 11  页: 5282-5300.DOI: 10.3837/tiis.2017.11.006.(SCI检索)WOS:000417653700006; IDS号: FP5IR

[12] An, Jian; Qi, Ling; Gui, Xiaolin; Peng, Zhenlong.Joint design of hierarchical topology control and routing design for heterogeneous wireless sensor networks. COMPUTER STANDARDS & INTERFACES,卷: 51  页: 63-70,DOI: 10.1016/j.csi.2016.11.002,出版年: MAR 2017
  入藏号: WOS:000393241000007,ISSN: 0920-5489,eISSN: 1872-7018,IDS 号: EJ5ES

 

 2016年发表论文情况:SCI收录4 篇,EI收录  篇

 

[1] Jiang, Jinghua; Zheng, Yifeng; Yuan, Xingliang; Gui, Xiaolin. Towards Secure and Accurate Targeted Mobile Coupon Delivery, IEEE ACCESS, : 4, : 8116-8126, 出版年: 2016 (SCI检索,IDS : EF8GR,入藏号: WOS:000390567700037)

[2] An, Jian; Qi, Ling; Gui, Xiaolin; Peng, Zhenlong. Joint design of hierarchical topology control and routing design for heterogeneous wireless sensor networks, Computer Standards and Interfaces, v 51, p 63-70, March 1, 2017 (SCI检索,IDS : BG5NU,入藏号: WOS:000389587600014)
[3] Zhu, Xuan; An, Jian; Yang, Maishun; Xiang, Lele; Yang, Qiangwei; Gui, Xiaolin. A Fair Incentive Mechanism for Crowdsourcing in Crowd Sensing. IEEE Internet of Things Journal, v 3, n 6, p 1364-1372, December 2016  (SCI检索期刊)
[4] Zhang, Xuejun; Gui, Xiaolin; Jiang, Jinghua. A user-centric location privacy-preserving method with differential perturbation for location-based services. Journal of Xi'an Jiaotong University, v 50, n 12, p 79-86, 2016
[5] An, Jian; Wu, Ruobiao; Xiang, Lele; Gui, Xiaolin; Peng, Zhenlong. FCM: A fine-grained crowdsourcing model based on ontology in crowd-sensing. Source: Lecture Notes in Computer Science, v 9966, LNCS, p 172-179, 2016, Network and Parallel Computing - 13th IFIP WG 10.3 International Conference, NPC 2016, Proceedings
[6] Jalil, Khurrum; Hussain, Khurrum; Ahmad, Asad; Gui Xiaolin. QoS Evaluation Based on Fuzzy Neural Networks. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016) 丛书: ACSR-Advances in Comptuer Science Research,卷: 56,页: 299-305,出版年: 2016ISTP检索)
[7]毛勇华; 桂小林; 李前; . 深度学习应用技术研究, 计算机应用研究, 33(11): 3201-3205, 2016
[8] 桂小林,云计算环境下虚拟机安全管理模型研究,中国科技论文,2016(20):2351-2356

 

2015年发表论文情况:SCI收录5篇,EI收录  篇

 

[1] An Jian;   Gui Xiaolin;   Yang Jianwei;   Sun Yu;   He Xin. Mobile Crowd Sensing for Internet of Things: A Credible Crowdsourcing Model in Mobile-Sense Service, Multimedia Big Data (BigMM), 2015 IEEE International Conference on, Year: 2015, Pages: 92 - 99, IEEE Conference Publications 

[2] Li, X.;   Ma, H.;   Yao, W.;   Gui, X. Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services. IEEE Transactions on Services Computing, Year: 2015, Volume: PP, Issue: 99 Pages: 1 – 1, IEEE Early Access Articles [CCF B类]【JCR 2区】
[3] Xiaoyong Li;   Huadong Ma;   Feng Zhou;   Xiaolin Gui. Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds.  IEEE Transactions on Parallel and Distributed Systems, Year: 2015, Volume: 26, Issue: 5, Pages: 1419-1429, IEEE Journals & Magazines [CCF A类]【JCR 2区]
[4] Jinghua Jiang;   Zhenkui Shi;   Xingliang Yuan;   Cong Wang;   Xiaolin Gui, Towards secure and practical targeted mobile advertising, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Year: 2015 Pages: 79-80, IEEE Conference Publications [CCF A类]
[5] Jian An;   Xiaolin Gui;   Zhehao Wang;   Jianwei Yang;   Xin He. A Crowdsourcing Assignment Model Based on Mobile Crowd Sensing in the Internet of Things, IEEE Internet of Things Journal, Year: 2015, Volume: 2, Issue: 5  Pages: 358-369,  IEEE Journals & Magazines  【SCI检索,WOS:000373098700002】
[6] Pan Yang;   Xiaolin Gui;   Jian An;   Feng Tian;   Jiachen Wang. An encrypted image editing scheme based on homomorphic encryption, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Year: 2015  Pages: 109-110, IEEE Conference Publications [CCF A类]
[7] Yifeng Zhengy, Xingliang Yuany, Xinyu Wangy, Jinghua Jiangyz, Cong Wangy, Xiaolin Gui.Enabling Encrypted Cloud Media Center with Secure Deduplication.10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS'2015), April 14–17, 2015, Singapore, Singapore.[CCF C类]
[8] Zhang XJ, Gui XL, Tian F, et al. A Framework for Measuring User Query Privacy in Location-based Service [J]. KSII Transactions on Internet and Information Systems,  v 9, n 5, p 1717-1732, May 1, 2015. (EI:20152400934395) (SCI IDS Number: CO2OA Accession Number: WOS:000358994900009)【JCR 4区】

[9] Tian F, Gui XL, An J, et al. A DCT-based Privacy-preserving Approach for Efficient Data Mining [J]. Security and Communication Networks, Volume 8, Issue 18, pages 3641–3652, December 2015  .[CCF C类] [SCI: WOS:000367922500027][IDS: DA6NT ]【JCR 4区】

[10] 杨攀,桂小林,姚婧等. 支持同态算术运算的数据加密方案算法研究[J]. 通信学报,2015, 36(1):171-182. (EI:20151100627540 )
[11] 杨攀,桂小林,安健等. 利用贝叶斯原理在隐私保护数据上进行分类的方法[J]. 西安交通大学学报,2015, 49(4): 46-52. (EI:20151900817739 )

[12] 李刘强; 桂小林; 安健; et al.采用模糊层次聚类的社会网络重叠社区检测算法.西安交通大学学报,2015, 49(2): 6-13. (EI:20151300678319)

[13] 黄汝维桂小林陈宁江姚婧. 云计算环境中支持关系运算的加密算法. 软件学报, 2015, 26(5): 1181-1195, May 1, 2015 (EI:20152200901132 )  [CCF推荐A类]

[14] 张学军; 桂小林; 伍忠东. 位置服务隐私保护研究综述,软件学报, 26(9): 2373-2395, 2015 (EI)  [CCF推荐A类]

[15] Yang P, Gui XL, An J, et al. An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service [J]. Security and Communication Networks. Under review. (SCI)

[16] Tian F, Gui XL, An J, et al. A Privacy-preserving and Query Integrity Verification Scheme for Outsourced Spatial Data [J]. IEEE Transactions on Emerging Topics in Computing, 2015, Under Review.
[17] Yang P, Gui XL, An J, et al. An Efficient Symmetric Homomorphic Cryptosystem Based on Ideal Lattice [J]. Transactions on Services Computing. Under review.(SCI)

 

2014年发表论文情况:SCI收录 5 篇,EI收录  篇

 

[1] 田丰,桂小林,张学军,等. 基于兴趣点分布的外包空间数据隐私保护方法 [J]. 计算机学报, 2014, 37(1):123-138. (EI, 20140717331180)  [CCF推荐A类]

[2] Tian F, Gui XL, An J, et al. Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage [J]. Scientific World Journal, 2014, (6): 1-11. (SCI, IDS: AR2RO)【JCR 3区】1537-744X

[3]Tian F, Gui XL, An J, et al. A Density-based Space Filling Curve for Location Privacy-preserving [C]// Proc. of 11th IEEE International Conference on Services Computing (SCC 2014), Alaska, USA, 131-138, 2014. (EI, 20145200371027, CCF推荐C类会议)

[4] Si Yu, Xiaolin Gui, Feng Tian, Jianqiang Zhao, Jiancai Lin and Min Dai,A Securityawareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing. Scientific World Journal, 2014, (2):1-12  (SCI IDS : AA7VE, IF=1.730)【JCR 3区】1537-744X
[5] Yu Si, Gui Xiaolin, Zhang Xuejun, Lin Jiancai, Dai Min. Detecting Cache‐based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode.Journal of Internet Technology. Vol. 15 No. 6, PP. 903-916, 11 2014.(SCI IDS:  AU9AZ )【JCR 4区】1607-9264

[6] Yang Pan, Gui XIaolin, An jiang etc. A Retrivalble Data Perturbation Method Used in Privacy-Preserving in Cloud Computing. China Communications, 11(8):73-82. (SCI IDS:  AN4RP).【JCR 4区】1673-5447

[7] Zhang, Xuejun;   Gui, Xiaolin;   Tian, Feng;   Yu, Si;   An, Jian.Privacy quantification model based on the Bayes conditional risk in Location-Based Services.Tsinghua Science and Technology. Year: 2014, Volume: 19, Issue: 5. Pages: 452 - 462, [SCI IDS Number: CV7XF]

[8] Jianwei Yang;   Xiaolin Gui;   Jian An;   Feng Tian .Detecting community structure in trust relationship networks. Communications Security Conference (CSC 2014), 2014  Year: 2014  Pages: 1 - 5
[9] 黄传河,桂小林,王东,朱敏. 物联网工程专业的建设与规范研究. 中国计算机学会通讯,第10卷,第2期,pp.55-57. 2014年2月

[10] 杨建伟; 桂小林; 安健; 田丰. 一种信任关系网络中的社团结构检测算法. 西安交通大学学报,Volume:48, Issue:12, Pages:80-86  EI


 ,
2013年发表论文情况:SCI收录6篇,EI收录 篇
 
[1] An, Jian; Gui, Xiaolin; Yang, Jianwei;等.SEMI-SUPERVISED LEARNING OF K-NEAREST NEIGHBORS USING A NEAREST-NEIGHBOR SELF-CONTAINED CRITERION IN FOR MOBILE-AWARE SERVICE. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE. 2013, 27(5):   [SCI IDS 号: 229OX] [IF=0.562] 【CCF C类】【JCR 4区】0218-0014
[2] An Jian; Gui Xiao-lin; Yang Jian-wei; 等. Research on a Mobile-aware Service Model in the Internet of Things[J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS. 2013,7(5): 1146-1165.  [SCI IDS 号: 158XM]
[3] An, Jian; Gui, Xiaolin; Zhang, Wendong; 等. Research on social relations cognitive model of mobile nodes in Internet of Things, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,DOI: 10.1016/j.jnca. 2013, 36(2): 799-810. [SCI IDS 号: 105SD] 【CCF C类】【JCR 2区】1084-8045
[4] Yu Si; Gui Xiaolin; Lin Jiancai; 等. Detecting VMs Co-residency in the Cloud: Using Cache-based Side Channel Attacks[J], ELEKTRONIKA IR ELEKTROTECHNIKA,  2013,19(5): 73-78.  [SCI IDS 号: 165PW] 【JCR 4区】1392-1215
[5] Wang, Gang; Gui, Xiaolin. Dynamic Recommendation Trust Model Based on Information Entropy and Heuristic Rules in E-Commerce Environment[J].ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19(4): 71-76.  [SCI IDS 号: 165PU]【JCR 4区】1392-1215
[6] An, Jian; Gui, Xiaolin; Zhang, Wendong; 等. Social Relation Predictive Model of Mobile Nodes in Internet of Things, ELEKTRONIKA IR ELEKTROTECHNIKA出版年: 2013,19(4): 81-86.  [SCI IDS 号: 165PU].
[7] Yu, Si; Gui, Xiaolin; Lin, Jiancai. An Approach with Two-Stage Mode to Detect Cache-based Side Channel Attacks[C], 27th International Conference on Information Networking (ICOIN) 会议地点: Bangkok, THAILAND 会议日期: JAN 27-30, 2013, IEEE Comp Soc; IEICE Commun Soc; Korean Inst Informat Scientists & Engineers (KIISE) [ISTP检索]
[8] 王刚,桂小林,社会网络中交易节点的选取及其信任关系计算方法[J],计算机学报,2013年2期 p 368-383。[国内权威期刊][EI:20131216135851]  [CCF推荐A类]
[9] 余 思, 桂小林, 张学军, 林建财, 王君飞. 云环境中基于cache共享的虚拟机同驻检测方法[J], 计算机研究与发展, 2013年第12期,2651-2660页 [国内权威期刊][EI]
[10] 庄威,桂小林,林建材,王刚,代敏,云环境下基于多属性层次分析的虚拟机部署与调度策略[J],西安交通大学学报,2013年2期  p 28-32+130,EI: 20131016090392
[11] 王海晟,桂小林,基于不满意度的网络安全模型【J】,计算机应用研究,2013年2期
[12] Pan Yang, Xiaolin Gui, Feng Tian, Jing Yao, Jiancai Lin. A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining[C]. 15th IEEE International Conference on High Performance Computing and Communications(HPCC2013). Zhangjiajie, China, 2013, pp.881-887.[CCF C类会议][EI:20142917937949]
[13] F. Tian, X. L. Gui, P. Yang, X. J. Zhang, and J. W. Yang. Security Analysis for Hilbert Curve based Spatial Data Privacy-Preserving Method, Proceedings of the 15th IEEE International Conference on High Performance Computing and Communications(HPCC2013). Zhangjiajie, China, 2013, pp. 929–934.[CCF C类会议][EI:20142917937955]
[14] Yu S, Gui XL, Tian F, et al. A Security-awareness Virtual Machine Placement Scheme in the Cloud[C]// Proc. of 15th IEEE International Conference on High Performance Computing and Communications-HPCC2013. 1078-1083, Zhangjiajie, China, 2013. [CCF C类会议][EI:20142917937975]
[15] 桂小林. 浅谈如何提高学生的“系统思维”能力. 中国计算机学会通讯,第9卷, 第2期, pp.71-73. 2013年2月

[16] Guo, Wei; Lin, Peng; Gui, Xiaolin; Zhang, Bo. Research on Dynamic Quality Assessment Model of Spaceflight TT&C Software. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2013). Pages: 351-356. Chengdu, PEOPLES R CHINA, NOV 16-17, 2013 (ISTP/SCI IDS Number: BJS65)

[17] Pan Yang, Xiaolin Gui, Jing Yao1,tec. ICDM: An Encryption that Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data, 2013 IEEE 16th International Conference on Computational Science and Engineering, 1220-1225, 2013, DEC. Sydney, Australia.

  
2012年发表论文情况:SCI收录3篇,EI收录9篇
 
1. Wang Hai-Sheng; Gui Xiao-Lin. A New Security Model In P2P Network Based On Rough Set And Bayesian Learner[J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6(9): 2370-2387.【SCI IDS: 035WE,IF=0.372, ISSN: 1976-7277】
2. Zhang, Wendong; Gui, Xiaolin; An, Jian; 等. Geographic Community-based Mobility Model[J]. ELEKTRONIKA IR ELEKTROTECHNIKA.2012, 18(9): 87-90.【SCI IDS: 044DW, IF=0.913 , ISSN: 1392-1215】.
3. He, Lu; Gui, Xiaolin; Wu, Reifeng; 等. A Hybrid Natural Language Information Hiding System[J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 18(9): 95-100.【SCI IDS: 044DW, IF=0.913 , ISSN: 1392-1215】
4. Wang, Hai-Sheng; Wang, Hai-Chen; Gui, Xiao-Lin. A new security model based on SVM classifier[J]. ICIC Express Letters, Part B: Applications.  v 3, n 1, p 141-146, February 2012.   [EI检索,Accession number: 20121014833528]
5. He, Lu; Gui, Xiaolin; Jin, Yanping. Summary attack on spread spectrum vector natural language watermarking. Source: Journal of Computational Information Systems, v 8, n 4, p 1663-1670, April 2012.【EI检索,Accession number: 20121614949727】
6. Wang, Gang; Gui, Xiao-lin. DRTEMBB: Dynamic recommendation trust evaluation model based on bidding. Source: Journal of Multimedia, v 7, n 4, p 279-288, 2012. 【EI检索,Accession number: 20123715428465】
7. 杨攀; 桂小林; 田丰; 等. 一种高效的用于话题检测的关键词元聚类方法.Source:西安交通大学学报, v 46, n 10, p 24-28, October 2012,CSCD收录。【EI检索,Accession number: 20124815724233】
8. 安健; 桂小林; 张文东; 等. 物联网移动感知中的社会关系认知模型. Source:计算机学报, v 35, n 6, p 1164-1174, June 2012. CSCD收录. 【EI 检索,Accession number: 20123215308646】(CCF国内顶级期刊)  [CCF推荐A类]
9. 何路; 桂小林; 田丰; 等. 自然语言水印鲁棒性分析与评估. Source: 计算机学报, v 35, n 9, p 1971-1982, September 2012,CSCD收录。【EI检索,Accession number: 20124415630868】(CCF国内顶级期刊)  [CCF推荐A类]
10. 王海晟; 桂小林; 王海晨. 基于交易节点分类管理的网络安全模型, 计算机工程, 38(17): 152-156,16, 2012. CSCD收录
11. Zhang, Wendong; Gui, Xiaolin; An, Jian; Jiang, Jinghua. Location attraction mobility model for mobile ad hoc network. Source: Proceedings - 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, ICIS 2012, p 83-87, Shanghai, China, 30 May-1 June 2012. 【EI 检索,Accession number: 20123015276187】
12. Wang, Gang; Gui, Xiaolin. Dynamic recommendation trust evaluation model based on mobile e-commerce. Source: Proceedings of the 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012, p 1282-1287, Liverpool, UK, 25-27 June 2012 【 EI检索,Accession number: 20124915766743】
13. Zhuang Wei; Gui Xiaolin; Huang Ru Wei; Yu Si. TCP DDOS Attack Detection on the Host in the KVM Virtual Machine Environment, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS). Publication Year: 2012 , Page(s): 62 – 67 【EI检索,Accession number: 20123015276184】
 
2011年发表论文情况:SCI收录2篇,EI收录7篇
 
1. Han, Yiliang ; Gui, Xiaolin; Wu, Xuguang; Yang, Xiaoyuan. Proxy encryption based secure multicast in wireless mesh networks.Source: Journal of Network and Computer Applications, v 34, n 2, p 469-477, March 2011.(SCI IDS: 724JJ, IF=1.065)(CCF 国际顶级期刊C类【JCR 2区】1084-8045
2. RuWei Huang, XiaoLin Gui, Si Yu, Wei Zhuang. Study of Privacy-preserving Framework for Cloud Storage. Computer Science and Information Systems. 卷: 8 期: 3 页: 801-819 (SCI IDS: 823MX,IF=0.625) 【JCR 4区】0267-6192
3. 林秦颖,桂小林,史德琴等.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(z1):240-243.(CCF国内顶级期刊)
4. 黄汝维,桂小林,余思等.云环境中支持隐私保护的可计算加密方法[J].计算机报,2011,34(12):2391-2402.(CCF国内顶级期刊) [CCF推荐A类]
5. 安健,桂小林,张进等.面向物联网移动感知的服务节点发现算法[J].西安交通大学报,2011,45(12):6-9.
6. 黄汝维,桂小林,余思等.支持隐私保护的云存储框架设计[J].西安交通大学学报,2011,45(10):1-6,12.
7. 何欣,桂小林,安健等.基于延迟唤醒的无线传感器网络的分布式区域覆盖算法[J].计算机研究与发展, 2011, 48(5):786-792.(CCF国内顶级期刊)
8. 桂小林,何欣,尹柯等.基于目标覆盖的无线传感器网络的连通性优化部署方法[J].小型微型计算机系统,2011,32(9):1821-1826.
9. 何欣,宋亚林,安健等.移动感知物联网技术研究[J].计算机应用研究,2011,28(7):2407-2410,2417.DOI:10.3969/j.issn.1001-3695.2011.07.002.
10. 黄汝维,桂小林.云环境中支持隐私保护的可计算加密方法[C].//2011年中国计算机学会服务计算学术会议(CCF NCSC2011)论文集.2011:1-9.
11. 王刚,桂小林,魏广福等.DOCSRTrust:基于本体内容相似度的动态推荐信任模型[C].//2011年中国计算机学会服务计算学术会议(CCF NCSC2011)论集.2011:1-13.
12. 余思,桂小林,黄汝维等.一种提高云存储中小文件存储效率的方案[J].西安交通大学学报,2011,45(6):59-63.
 
2010年发表论文情况:SCI收录1篇,EI收录7篇
 
1. Han, Yiliang; Gui, Xiaolin; Wu, Xuguang, PARALLEL MULTI-RECIPIENT SIGNCRYPTION FOR IMBALANCED WIRELESS NETWORKS, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 卷: 6 期: 8 页: 3621-3630 出版年: AUG 2010 (SCI:,IF=2.922)
2. Li, Xiao-Yong; Gui, Xiao-Lin. Cognitive model of dynamic trust forecasting. Source: 软件学报/Journal of Software, v 21, n 1, p 163-176, January 2010. (Accession number: 20100512678373)
3. Han, Yiliang; Gui, Xiaolin; Yang, Xiaoyuan; Parallel multi-recipient signcryption for multicast networks. Source: 2nd International Workshop on Education Technology and Computer Science, ETCS 2010, v 3, p 128-131, 2010, 2nd International Workshop on Education Technology and Computer Science, ETCS 2010 (Accession number: 20102312986254)
4. He, Xin; Yang, Hua; Gui, Xiaolin. The maximum coverage set calculated algorithm for WSN area coverage. Journal of Networks, v 5, n 6, p 650-657, June 2010 (Accession number: 20101412827619)
5. 何欣桂小林安健. 面向目标覆盖的无线传感器网络确定性部署方法, 西安交通大学学报(JOURNAL OF XI’AN JIAOTONG UNIVERSITY),2010,44(6):6-9,15
6. 李小勇,桂小林. 动态信任预测的认知模型,软件学报(JOURNAL OF SOFTWARE), 2010, 21(1): 163-176 (EI: ) [CCF推荐A类]
7. Wang, Gang; Gui, XiaoLin; Wei, GuangFu; A Recommendation Trust Model Based on E-commerce Transactions Content-Similarity;2010 International Conference on Machine Vision and Human-Machine Interface (MVHI),2010, Page(s):105-108 ()
 
2009年发表论文情况:SCI收录4篇,EI收录12篇
 
1. Xiaoyong Li and Xiaolin Gui. Tree-trust: A novel and scalable P2P reputation model based on human cognitive psychology. International Journal of Innovative Computing, Information and Control.(ISSN 1349-4198), Volume 5, Number 11A, November 2009. pp. 3797-3807 (SCI收录: 521KA, EI: 20095012539257,IF=2.92)
2. Xiao-Yong Li (李小勇) and Xiao-Lin Gui (桂小林). A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks. Journal of Computer Science and Technology;EI:20094112369704,IF=0.564). 24(5): 868-882, Sept. 2009 (SCI IDS: 500FC) 【CCF B类】
3. Yiliang Han, Xiaolin Gui. Adaptive secure multicast in wireless networks. International Journal of Communication Systems, Volume 22 Issue 9, p 1213-1239,Sept. 2009 (SCI收录: IDS 号: 496AP,EI Accession number: 20093612291725,IF=0.406 )
4. He, X; Gui, XL;Wei, W. Improving WSN Base Station Survivability with Rejuvenation Technology, International Journal of Distributed Sensor Networks, Volume 5, Issue 1, January 2009 , page 77. (SCI收录: UT ISI:000265103800070)
5. Li, Xiaoyong; Gui, Xiaolin, Research on adaptive prediction model of dynamic trust relationsip in open distributed systems, Source: Journal of Computational Information Systems, v 4, n 6, p 2483-2489, December 2008, (EI Accession number: 20092212098636) Abstract - Detailed
6. Li, Xiaoyong ; Gui, Xiaolin. Novel adaptive dynamic trust quantization model in large-scale open distributed systems. Source: Journal of Information and Computational Science, v 5, n 6, p 2521-2528, December 2008,(EI Accession number: 20092712163333). Abstract - Detailed
7. Li, Xiaoyong; Gui, Xiaolin; Zhao, Juan; Zhao, Bo, Reinforcement learning application for dynamic trust modeling in large-scale open distributed systems, Source: Journal of Computational Information Systems, v 4, n 6, p2591-2597, December 2008, (EI Accession number: 20092212098648). Abstract - Detailed
8. Lu, He; DingYi, Fang; XiaoLin, Gui; et al. A new chinese text digital watermarking for copyright protecting word document, Source: Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, v 3, p 435-439, 2009, January 06-08, 2009,(EI Accession number: 20091712050461) Abstract - Detailed
9. Li, Xiao-Yong; Gui, Xiao-Lin. Trust quantitative model with multiple decision factors in trusted network, Source: Chinese Journal of Computers, v 32, n 3, p 405-416, March 2009.(李小勇, 桂小林. 可信网络中基于多维决策属性的信任量化模型, 计算机学报, 2009, 32(3) :405-416) (EI Accession number: 20091512029314)
10. Li, Xiao-Yong; Gui, Xiao-Lin; Mao, Qian; Leng, Dong-Qi,Adaptive dynamic trust measurement and prediction model based on behavior monitoring,Source: Chinese Journal of Computers, v 32, n 4, p 664-674, April 2009. (李小勇, 桂小林. 基于行为监控的动态信任度测模型, 计算机学报, 2009, 32(4):664-674)(EI Accession number: 20091912073566) [CCF推荐A类]
11. Xiaoyong Li and Xiaolin Gui. Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments. Int. J. Computer Applications in Technology, Vol. 36, Nos. 3/4,297-307, 2009 (EI Accession number: 20093912333034)
12. Yiliang Han; Xiaolin Gui. Multi-recipient signcryption for secure group communication. 4th IEEE Conference on Industrial Electronics and Applications, 2009,pp.161-165, Xi’an, China, 25-27 May 2009. (EI Accession number: 20094012351204 )
13. He, X; Gui, XL. The Localized Area Coverage Algorithm Based on Delayed Start Scheme For WSN,JOURNAL OF SOFTWARE, VOL. 4, NO. 3,pp.183-190, MAY, 2009 (EI:20094612450192)
14. He Xin; Yin Ke; Gui Xiaolin. The area coverage algorithm to maintain connectivity for WSN. Proceedings of the 2009 Ninth IEEE International Conference on Computer and Information Technology. CIT 2009.vol.2, pp.81-86, 2009. Xiamen, China, 11-14 October 2009.(ISTP: EI: )
15. He, X; Gui, XL. The Localized Area Coverage algorithm Based on Game-Theory for WSN. Journal of Networks (ISSN 1796-2056), Vol 4, No 10 , 1001-1008, Dec 2009 (EI: 20095312593427)
16. Yliang Han; Xiaolin Gui. BPGSC: bilinear paring based generalized signcryption scheme. 2009 Eighth International Conference on Grid and Cooperative Computing (GCC2009).Lanzhou, Gansu, China, 27-29 August 2009 (EI: 20095212580966)
 
2008年发表论文情况
 
1. Jin’An, Liu; Lu, He; DingYi, Fang; XiaoLin, Gui. A text digital watermarking for chinese word document, Source: Proceedings - International Symposium on Computer Science and Computational Technology, ISCSCT 2008, v 2, p 217-220, December 20,2008 - December 22,2008 (EI Accession number: 20091211972149)
2.何欣,桂小林. 基于自愈技术的无线传感器网络基站生存模型[J]. 西安交通大学学报,2008,42(8): 950-953+1000)(EI Accession number: 20083711541277)
3. He, Xin; Gui, Xiaolin; Wei, Wei. A heider-theory based reputation framework for WSN, Source: Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, p 635-640, 2008, HPCC 2008, September 25,2008 - September 27,2008 (EI Accession number: 20084811737772)
4. Xin, He; Wei, Wei; Xiaolin, Gui. The software rejuvenation model with pre-start technology, Source: Proceedings - International Symposium on Information Processing and International Pacific Workshop on Web Mining and Web-Based Application, p 723-727, 2008, ISIP 2008, WMWA 2008, May 23,2008 (EI Accession number: 20083811576275) 
 
2007年发表论文情况
 
1. 陈菲菲,桂小林. 基于机器学习的动态信誉评估模型研究,计算机研究与发展,2007,44(02) : 223-229 (Accession number: 071610557970)
2. Li Xiaoyong; Gui Xiaolin. Engineering trusted P2P system with fast reputation aggregating mechanism. IEEE International Conference on Robotics and Biomimetics (ROBIO 2007), Sanya, PEOPLES R CHINA, DEC 15-18, 2007, VOLS 1-5, 2007-2012, 2007
 
2006年发表论文情况:SCI收录1篇,EI收录2篇
 
1. Qingjiang, Wang; Xiaolin, Gui; Shouqi, Zheng; Yang, Liu. De-centralized job scheduling on computational Grids using distributed backfilling. Concurrency Computation Practice and Experience, v 18, n 14, Dec 15, 2006, p 1829-1838 (SCI: 000242113300009, EI:20064610238291)(CCF C类国际期刊)【JCR 4区】
2. Li Xiao-Yong; Gui Xiao-lin, Merging source and shared trees multicast in MPLS networks, 7th International Conference on Parallel and Distrubuted Computing, Applications and Technologies,Taipei, TAIWAN, DEC 04-07, 2006, IEEE Comp Soc, Proceedings, pp.23-28, 2006 (EI)
3. Xiaolin Gui; Quanxin Zhu. Management and Deployment of the Service-Oriented Sensors in Grid System. 2006 Fifth International Conference on Grid and Cooperative Computing (GCC'06). Year: 2006, Pages: 482 - 485, DOI: 10.1109/GCC.2006.56,   21–23 October 2006   Hunan, China
 
2005年之前发表论文情况:SCI收录5篇,EI收录10篇
 
1. Gui, XL; Wang, Q; Qian, DP. A grid middleware for aggregating scientific computing libraries and parallel programming environments. ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 3007:671-676 2004 (SCI:000189504900073)    LNCS,   Hangzhou, China, April 14-17, 2004
2. Gui, XL; Li, YN; Gong, WQ. Implementing the resource monitoring services in grid environment using sensors. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 3251: 907-910 2004(SCI: 000225161200128)    LNCS    Oct.2 1to 2 4,2 0 0 4   in Wuhan  
3. Xie, B; Gui, XL; Wang, QJ. Study on a secure access model for the grid catalogue. GRID AND COOPERATIVE COMPUTING, PT 1, 3032: 891-898 2003(SCI: 000221608900140)   LNCS   Shanghai, China, December 7-10, 2003
4. Xie, B; Gui, XL; Li, YN, et al. A new grid security framework with dynamic access control. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 3251:863-866, 2004(SCI: 000225161200117)  LNCS   Oct.2 1to 2 4,2 0 0 4  in Wuhan
5. Gui, XL; Xie, B; Li, YN, et al. A grid security infrastructure based on behaviors and trusts. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS,3252: 482-489 2004(SCI: 000225062800060)   LNCS   Oct.2 1to 2 4,2 0 0 4  in Wuhan
6. 桂小林, 钱德沛. WADE 系统的支持对象通信的绑定代理[J]. 计算机学报,2002,25(1):100-105. [CCF推荐A类]
7. 桂小林,钱德沛. 元计算环境下的支持依赖任务的OGS 算法研究[J]. 计算机学报,2002,25(6):582-586.(EI: 2002487244372) [CCF推荐A类]
8. 桂小林,钱德沛,何戈. 基于校园网络的元计算实验系统WADE 的设计与实现[J]. 计算机研究与发展, 2002, 39(7):888-894.
9. 桂小林,钱德沛,董小社,许大炜. WADE 系统的多级分布式对象命名体系的设计与实现[J]. 计算机研究与发展,2002,39(4):423-428.(EI: 2002397111124)
10. 桂小林,钱德沛. 元计算系统事件驱动的消息传输模型研究[J].计算机研究与发展, 2002,39(6):649-655. (EI: 02397117836 )
11. 陈亚玲,桂小林,王庆江,钱德沛. 基于代理的网格计算中间件[J]. 计算机研究与发展,2003, 40(12): 1806 -1810.
12. 桂小林,王庆江,龚文强,钱德沛. 面向网格计算的机器选择算法研究[J]. 计算机研究与发展,2004, (12): 2189-2194. (EI: 2005058815761)

 

荣誉称号

2005年,教育部新世纪优秀人才

2012年,陕西省三秦人才特聘教授

2014年,王宽诚育才奖

2018年,宝钢优秀教师奖

 

发明专利:

1. 桂小林, 李小勇,毛倩,何欣,一种自适应的动态信任权重评估方法,国家知识产权局,专利号:ZL200810232271.4。(20081114)【20101110
2. 桂小林, 韩益亮,一种并行化多接收方签密方法, 中华人民共和国国家知识产权局,专利号:ZL200910254533.1。       (20091225)【20120328
3. 桂小林, 何欣等,一种基于延迟启动的无线传感器网络局部区域覆盖算法,国家知识产权局,专利号:ZL200810236424.2。(20081223)【20110406
4. 桂小林, 李小勇,赵博,魏广福,一种基于反馈信任聚合的网络节点总体信任度评估方法,国家知识产权局,申请号:200810232272。
5. 桂小林, 李小勇,冷东起,黄汝维,一种基于历史证据窗口的总体信任度决策方法,国家知识产权局,申请号:200810232275。
6. 桂小林, 何欣,李小勇,张文东,一种基于不可靠信道的无线传感器网络信誉值计算方法,国家知识产权局, 申请号:200810236423。
7. 桂小林, 黄汝维等,一种基于向量和矩阵运算的支持计算的加密技术,国家知识产权局,申请号:201110276038.8。 
8. 桂小林,余思,黄汝维等,一种面向云计算环境侧通道攻击防御的虚拟机部署方法,国家知识产权局,授权号:ZL201110376037.0  (20111123)【20141105
9. 桂小林, 何路,鲁棒的自然语言哈希域扩频水印编码算法, 国家知识产权局,申请号:201110216489.2。
10. 桂小林,杨攀等,一种保持数据数字特征的隐私信息保护方法,国家知识产权局,授权号:ZL201210319909.4   (20120903) 【20141210
11. 桂小林,田丰等,一种基于随机区间划分的保序加密方法,国家知识产权局,授权号:ZL201210310901.1                                (20120828)【20141210
12. 桂小林,安健,蒋精华等,一种面向物联网移动感知的服务节点选择方法,国家知识产权局,授权号:ZL201310003545.3       (20130107)【20160531
13. 桂小林,林建材,余思等,一种基于循环矩阵变换的支持密文计算的加密方法,国家知识产权局,申请号:201310638878.3    (20131204)
14. 桂小林,代敏,郭跃龙,赵建强等,一种面向Android系统资源的访问控制方法,国家知识产权局,授权号:ZL201310675959.0    (20131213)【20160531
15. 桂小林,田丰,杨攀,等,用于外包空间数据库的范围查询完整性验证方法,国家知识产权局,授权号:ZL201410209505.9  (20140516)(20170201)
16. 桂小林,张学军,田丰,等. 一种高效的差分扰动位置隐私保护系统及方法,专利申请号:201410683174.2.

17. 桂小林,杨建伟,安健,等一种面向有向-加权网络的社区结构发现方法,专利申请号:CN201410631672.2
18. 桂小林,杨攀,田丰等. 一种针对图片的加密及密文处理方法专利授权号:ZL201410508376.3         (20140516)【20170407】 

19. 桂小林,赵建强,一种微博网络中用户影响力度量的方法,专 利申请号:201410594290.7

20. 桂小林,田丰,杨攀等. 一种基于Merkle树结构的空间查询完整性验证方法,专利申请号:201510101056.0.

21. 桂小林、冀亚丽、杨广知、张晨等,一种基于空间序列数据分析的用户轨迹隐私保护方法,201610028542.9,2016年1月18日

22. 桂小林,梁鑫,安健等,一种基于响应时间序列数据分析的虚拟机同驻检测方法,发明申请:2017100510012,申请日:2017/1/23

23. 桂小林,代兆胜,任德旺等,一种转塔式RTO废气处理设备的监控数据分析与预警方法,发明申请号:201710015912X,申请日:2017/1/10
24. 桂小林,冀亚丽,代兆胜等,一种维持统计特征不变的跨路网位置匿名方法,发明专利申请号:201710797476.6,2017.09.06