这是indexloc提供的服务,不要输入任何密码

BibTeX records: Xiaofeng Wang 0002

download as .bib file

@inproceedings{DBLP:conf/iccns/WuWX22,
  author       = {Xiaoyan Wu and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
  booktitle    = {{ICCNS}},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2022}
}
@article{DBLP:journals/scn/LiSWX21,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet
                  Accountability},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {1974493:1--1974493:17},
  year         = {2021}
}
@article{DBLP:journals/access/LiuWP20,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {Secure Remote Multi-Factor Authentication Scheme Based on Chaotic
                  Map Zero-Knowledge Proof for Crowdsourcing Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {8754--8767},
  year         = {2020}
}
@article{DBLP:journals/access/LiuWP20a,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {State of the Art: Secure Mobile Payment},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {13898--13914},
  year         = {2020}
}
@article{DBLP:journals/iotj/LiCSHW20,
  author       = {Jie Li and
                  Rongmao Chen and
                  Jinshu Su and
                  Xinyi Huang and
                  Xiaofeng Wang},
  title        = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {2},
  pages        = {1216--1229},
  year         = {2020}
}
@article{DBLP:journals/iotj/LiSW20,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal
                  Latency and Perfect Forward Secrecy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {6828--6841},
  year         = {2020}
}
@inproceedings{DBLP:conf/iscc/Liu0020,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {{NCZKP} Based Privacy-Preserving Authentication Scheme for the Untrusted
                  Gateway Node Smart Home Environment},
  booktitle    = {{ISCC}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020}
}
@article{DBLP:journals/access/LiuWPX19,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng and
                  Qianqian Xing},
  title        = {Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based
                  {ID-MAKA} Scheme for Mobile Cloud Computing Services},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {137770--137783},
  year         = {2019}
}
@article{DBLP:journals/concurrency/LiSCWC19,
  author       = {Jie Li and
                  Jinshu Su and
                  Rongmao Chen and
                  Xiaofeng Wang and
                  Shuhui Chen},
  title        = {Practical privacy-preserving deep packet inspection outsourcing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019}
}
@article{DBLP:journals/ijdsn/ZhaoLWY19,
  author       = {Baokang Zhao and
                  Puguang Liu and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {Toward efficient authentication for space-air-ground integrated Internet
                  of things},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {7},
  year         = {2019}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Kai Huang and
                  Robert H. Deng and
                  Xiaofeng Wang},
  title        = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
                  Outsourced Cloud Data},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9841--9852},
  year         = {2019}
}
@inproceedings{DBLP:conf/sigcomm/LiSW19,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through
                  Minimal Latency},
  booktitle    = {{SIGCOMM} Posters and Demos},
  pages        = {166--168},
  publisher    = {{ACM}},
  year         = {2019}
}
@article{DBLP:journals/symmetry/XingWW18,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {BGPcoin: Blockchain-Based Internet Number Resource Authority and {BGP}
                  Security Solution},
  journal      = {Symmetry},
  volume       = {10},
  number       = {9},
  pages        = {408},
  year         = {2018}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {{ACISP}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/ieicet/LuoWWZH17,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Bo{-}Feng Zhang and
                  Wei Hu},
  title        = {{RPAH:} {A} Moving Target Network Defense Mechanism Naturally Resists
                  Reconnaissances and Attacks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {3},
  pages        = {496--510},
  year         = {2017}
}
@article{DBLP:journals/jzusc/LuoWWZ17,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Bo{-}Feng Zhang},
  title        = {A keyed-hashing based self-synchronization mechanism for port address
                  hopping communication},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {18},
  number       = {5},
  pages        = {719--728},
  year         = {2017}
}
@article{DBLP:journals/spe/SunWBS17,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {CloudEyes: Cloud-based malware detection with reversible sketch for
                  resource-constrained internet of things (IoT) devices},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {3},
  pages        = {421--441},
  year         = {2017}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {{ACISP} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/ccs/XingWW17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management
                  Solution for {BGP} Security},
  booktitle    = {{CCS}},
  pages        = {2591--2593},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
  author       = {Jie Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Hao Sun and
                  Shuhui Chen},
  title        = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
                  Reversible Sketch},
  booktitle    = {{CSS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/globecom/XingWWTW17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Yong Tang and
                  Yi Wang},
  title        = {Deja {Q} Encore {RIBE:} Anonymous Revocable Identity-Based Encryption
                  with Short Parameters},
  booktitle    = {{GLOBECOM}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017}
}
@inproceedings{DBLP:conf/trustcom/XingWWTL17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Jing Tao and
                  Liu Liu},
  title        = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive
                  Key Agreement for Wireless Networks},
  booktitle    = {TrustCom/BigDataSE/ICESS},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2017}
}
@article{DBLP:journals/ieicet/ChenWSW16,
  author       = {Peixin Chen and
                  Yilun Wu and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {Comparing Performance of Hierarchical Identity-Based Signature Schemes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {12},
  pages        = {3181--3184},
  year         = {2016}
}
@article{DBLP:journals/scn/ChenSZWY16,
  author       = {Peixin Chen and
                  Jinshu Su and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {An escrow-free online/offline {HIBS} scheme for privacy protection
                  of people-centric sensing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2302--2312},
  year         = {2016}
}
@inproceedings{DBLP:conf/hpcc/XingWWCYTG16,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Peixin Chen and
                  Bo Yu and
                  Yong Tang and
                  Xianming Gao},
  title        = {Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID
                  Security},
  booktitle    = {HPCC/SmartCity/DSS},
  pages        = {430--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@article{DBLP:journals/kbs/WangSWWL15,
  author       = {Xiaofeng Wang and
                  Jinshu Su and
                  Baosheng Wang and
                  Guojun Wang and
                  Ho{-}fung Leung},
  title        = {Trust Description and Propagation System: Semantics and axiomatization},
  journal      = {Knowl. Based Syst.},
  volume       = {90},
  pages        = {81--91},
  year         = {2015}
}
@article{DBLP:journals/scn/SuWSR15,
  author       = {Jinshu Su and
                  Xiaofeng Wang and
                  Weisong Shi and
                  Indrakshi Ray},
  title        = {Security, trust, and resilience of distributed networks and systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1829--1830},
  year         = {2015}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Hao Sun and
                  Jinshu Su and
                  Ilsun You},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
                  Order Bilinear Groups},
  booktitle    = {{BWCCA}},
  pages        = {364--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@inproceedings{DBLP:conf/ccs/ChenWWSZ15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Yilun Wu and
                  Jinshu Su and
                  Huan Zhou},
  title        = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing
                  {BGP} Protocol},
  booktitle    = {{CCS}},
  pages        = {1632--1634},
  publisher    = {{ACM}},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A Hierarchical Identity-Based Signature from Composite Order Bilinear
                  Groups},
  booktitle    = {{ICA3PP} (Workshops and Symposiums)},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {46--56},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/XuCWS15,
  author       = {Chengcheng Xu and
                  Shuhui Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {An Efficient Pre-filter to Accelerate Regular Expression Matching},
  booktitle    = {{ICA3PP} (Workshops and Symposiums)},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {111--119},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Ilsun You},
  title        = {Removing Key Escrow from the {LW-HIBE} Scheme},
  booktitle    = {{ICA3PP} (Workshops and Symposiums)},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {593--605},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15a,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud
                  Storage},
  booktitle    = {{ICA3PP} (Workshops and Symposiums)},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {633--647},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Fen Xu and
                  Baokang Zhao and
                  Chunqing Wu},
  title        = {An Efficient Unsavory Data Detection Method for Internet Big Data},
  booktitle    = {ICT-EurAsia/CONFENIS},
  series       = {Lecture Notes in Computer Science},
  volume       = {9357},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/infocom/RenWZWS15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Chunqing Wu and
                  Hao Sun},
  title        = {OpenSRN: {A} software-defined semantic routing network architecture},
  booktitle    = {{INFOCOM} Workshops},
  pages        = {101--102},
  publisher    = {{IEEE}},
  year         = {2015}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Peixin Chen},
  title        = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
  booktitle    = {SecureComm},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/socialsec/Chen0S15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection},
  booktitle    = {SocialSec},
  pages        = {72--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Xiao{-}Feng Hu and
                  Gui{-}Lin Cai and
                  Hao Sun},
  title        = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and
                  External Adversaries},
  booktitle    = {TrustCom/BigDataSE/ISPA {(1)}},
  pages        = {263--270},
  publisher    = {{IEEE}},
  year         = {2015}
}
@article{DBLP:journals/fgcs/SuCZWY14,
  author       = {Jinshu Su and
                  Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {ePASS: An expressive attribute-based signature scheme with privacy
                  and an unforgeability guarantee for the Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {33},
  pages        = {11--18},
  year         = {2014}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
  author       = {Yanpeng Ma and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Chunqing Wu and
                  Wanrong Yu and
                  Baokang Zhao},
  title        = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
                  Satellite Constellation Networks},
  journal      = {J. Networks},
  volume       = {9},
  number       = {4},
  pages        = {896--907},
  year         = {2014}
}
@inproceedings{DBLP:conf/ccs/WangZSZY14,
  author       = {Xiaofeng Wang and
                  Huan Zhou and
                  Jinshu Su and
                  Bofeng Zhang and
                  Fan Yang},
  title        = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol
                  with Full Compliance to {TCP/IP}},
  booktitle    = {{CCS}},
  pages        = {1520--1522},
  publisher    = {{ACM}},
  year         = {2014}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Chunqing Wu and
                  Baokang Zhao and
                  Hao Sun},
  title        = {A Semantic-Based Malware Detection System Design Based on Channels},
  booktitle    = {ICT-EurAsia},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {653--662},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Baokang Zhao and
                  Chunqing Wu},
  title        = {An Efficient Semantic-Based Organization and Similarity Search Method
                  for Internet Data Resources},
  booktitle    = {ICT-EurAsia},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {663--673},
  publisher    = {Springer},
  year         = {2014}
}
@article{DBLP:journals/mcm/LuWZWS13,
  author       = {Huabiao Lu and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Fei Wang and
                  Jinshu Su},
  title        = {ENDMal: An anti-obfuscation and collaborative malware detection system
                  using syscall sequences},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1140--1154},
  year         = {2013}
}
@article{DBLP:journals/mcm/CaoZSWW13,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Jinshu Su and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {A privacy preserving authentication scheme with flexible identity
                  revocation in people-centric sensing},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1175--1188},
  year         = {2013}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
                  Signature Generation},
  booktitle    = {ICT-EurAsia},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWHWZ13,
  author       = {Dan Zhao and
                  Chunqing Wu and
                  Xiaofeng Hu and
                  Xiaofeng Wang and
                  Baokang Zhao},
  title        = {Characterization of {OSPF} Convergence with Correlated Failures},
  booktitle    = {TrustCom/ISPA/IUCC},
  pages        = {1351--1356},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@inproceedings{DBLP:conf/trustcom/MaPWZSW13,
  author       = {Yanpeng Ma and
                  Wei Peng and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Chunqing Wu},
  title        = {A Location Management Algorithm for {LEO} Satellite Networks},
  booktitle    = {TrustCom/ISPA/IUCC},
  pages        = {1362--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@proceedings{DBLP:conf/icoc/2013,
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  publisher    = {Springer},
  year         = {2013}
}
@article{DBLP:journals/mcm/WangWWS12,
  author       = {Fei Wang and
                  Hailong Wang and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A new multistage approach to detect subtle DDoS attacks},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {198--213},
  year         = {2012}
}
@article{DBLP:journals/mis/CaoZWS12,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {Flexible multi-authority attribute-based signature schemes for expressive
                  policy},
  journal      = {Mob. Inf. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {255--274},
  year         = {2012}
}
@article{DBLP:journals/tsc/WangLS12,
  author       = {Xiaofeng Wang and
                  Ling Liu and
                  Jinshu Su},
  title        = {{RLM:} {A} General Model for Trust Representation and Aggregation},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {5},
  number       = {1},
  pages        = {131--143},
  year         = {2012}
}
@inproceedings{DBLP:conf/imis/MaSWSWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  title        = {A Distribute and Geographic Information Based Routing Algorithm for
                  {LEO} Satellite Constellation Networks},
  booktitle    = {{IMIS}},
  pages        = {433--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/mass/HanWWW12,
  author       = {Zilong Han and
                  Xiaofeng Wang and
                  Fei Wang and
                  Yongjun Wang},
  title        = {Collaborative detection of DDoS attacks based on chord protocol},
  booktitle    = {{MASS} Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Xiaofeng Hu and
                  Jinshu Su},
  title        = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
                  anomaly detection},
  booktitle    = {{MASS} Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/music/MaSWWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  title        = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation
                  Networks},
  booktitle    = {{MUSIC}},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2012}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Bin Xiao},
  title        = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
                  Victim Identification},
  booktitle    = {TrustCom},
  pages        = {215--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2012}
}
@article{DBLP:journals/fgcs/WangYBS11,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {Optimizing the makespan and reliability for workflow applications
                  with reputation and a look-ahead genetic algorithm},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {8},
  pages        = {1124--1134},
  year         = {2011}
}
@inproceedings{DBLP:conf/incos/CaoZWSJ11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Guofei Ji},
  title        = {Multi-authority Attribute-Based Signature},
  booktitle    = {INCoS},
  pages        = {668--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/nbis/CaoZWSC11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Yijiao Chen},
  title        = {Authenticating with Attributes in Online Social Networks},
  booktitle    = {NBiS},
  pages        = {607--611},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/icpp/YuLLWS10,
  author       = {Jie Yu and
                  Liming Lu and
                  Zhoujun Li and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A Simple Effective Scheme to Enhance the Capability of Web Servers
                  Using {P2P} Networks},
  booktitle    = {{ICPP}},
  pages        = {680--689},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/aina/WangYBS09,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {Reliability-Driven Reputation Based Scheduling for Public-Resource
                  Computing Using {GA}},
  booktitle    = {{AINA}},
  pages        = {411--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/ccgrid/WangBS09,
  author       = {Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using
                  Max-Min Strategy},
  booktitle    = {{CCGRID}},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/fcst/OuWHW09,
  author       = {Wei Ou and
                  Xiaofeng Wang and
                  Wenbao Han and
                  Yongjun Wang},
  title        = {Research on Trust Evaluation Model Based on {TPM}},
  booktitle    = {{FCST}},
  pages        = {593--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}