Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xuhong Li is active.

Publication


Featured researches published by Xuhong Li.


ieee international conference on computer science and automation engineering | 2012

Novel convertible authenticated encryption schemes without using hash functions

Xuhong Li; Wei Zhang; Xia Wang; Muhai Li

An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while keeping the message secret from the public, and a convertible authenticated encryption scheme enables the recipient to convert the signature to an ordinary one so that any third party can verify its validity. The paper shows a weaknesses in Chiens [3] convertible authenticated encryption scheme, then based on the public discrete logarithm hard problem solely, we propose a novel convertible authenticated encryption scheme without using hash functions, and extend it to a (t, n) threshold scheme. The proposed schemes have the following characteristics: Each scheme provides semantic security of the message, that is, after getting a valid signature, any adversary cannot determine whether his guessed message is the actual message signed by the sender by checking if it satisfies the verification equalities. If the signer repudiates her signature, the recipient can prove, without the cooperation with the signer, the dishonesty of the signer to any third party by revealing the message and its converted signature; If the recipient does not reveal the converted signature, any third party cannot check the validity of the message even though he gets the message and its corresponding signature; There are no hash functions in the proposed convertible authenticated encryption schemes.


11TH ASIAN CONFERENCE ON CHEMICAL SENSORS: (ACCS2015) | 2017

The application of mixed recommendation algorithm with user clustering in the microblog advertisements promotion

Lina Gong; Tao Xu; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

The traditional microblog recommendation algorithm has the problems of low efficiency and modest effect in the era of big data. In the aim of solving these issues, this paper proposed a mixed recommendation algorithm with user clustering. This paper first introduced the situation of microblog marketing industry. Then, this paper elaborates the user interest modeling process and detailed advertisement recommendation methods. Finally, this paper compared the mixed recommendation algorithm with the traditional classification algorithm and mixed recommendation algorithm without user clustering. The results show that the mixed recommendation algorithm with user clustering has good accuracy and recall rate in the microblog advertisements promotion.


AIP Conference Proceedings | 2018

Network congestion control algorithm based on Actor-Critic reinforcement learning model

Tao Xu; Lina Gong; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

Aiming at the network congestion control problem, a congestion control algorithm based on Actor-Critic reinforcement learning model is designed. Through the genetic algorithm in the congestion control strategy, the network congestion problems can be better found and prevented. According to Actor-Critic reinforcement learning, the simulation experiment of network congestion control algorithm is designed. The simulation experiments verify that the AQM controller can predict the dynamic characteristics of the network system. Moreover, the learning strategy is adopted to optimize the network performance, and the dropping probability of packets is adaptively adjusted so as to improve the network performance and avoid congestion. Based on the above finding, it is concluded that the network congestion control algorithm based on Actor-Critic reinforcement learning model can effectively avoid the occurrence of TCP network congestion.


international conference on computer aided design | 2017

The application of data encryption technology in computer network communication security

Lina Gong; Li Zhang; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is d...


international conference on computer aided design | 2017

Application of wireless sensor network technology in logistics information system

Tao Xu; Lina Gong; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.


11TH ASIAN CONFERENCE ON CHEMICAL SENSORS: (ACCS2015) | 2017

Research and realization of info-net security controlling system

Tao Xu; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.


international conference on wireless communication and sensor networks | 2017

DONM: Domain-based Opportunistic Networks Model in Emergency Scenarios

Xia Wang; Wenwen Pan; Xuhong Li; Xiaofei Sun; Wei Zhang; Tao Xu


international conference on communication technology | 2017

SRR: A lightweight routing protocol for opportunistic networks

Xia Wang; Xiaofei Sun; Wenwen Pan; Tao Xu; Xuhong Li


2016 4th International Conference on Advanced Materials and Information Technology Processing (AMITP 2016) | 2016

Salient Region Detection Based on SLIC and Graph-based Segmentation

Xiaofei Sun; Wenwen Pan; Xia Wang; Xuhong Li; Guan Wang


international conference on computer, mechatronics, control and electronic engineering | 2015

A Novel Intrusion Detection System Based on Data Mining

Tao Xu; Wei Zhang; Xuhong Li; Xia Wang; Wenwen Pan

Collaboration


Dive into the Xuhong Li's collaboration.

Researchain Logo
Decentralizing Knowledge