default search action
BibTeX records: Xiaofeng Wang 0002
@inproceedings{DBLP:conf/iccns/WuWX22,
author = {Xiaoyan Wu and
Xiaofeng Wang and
Qianqian Xing},
title = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
booktitle = {{ICCNS}},
pages = {58--63},
publisher = {{ACM}},
year = {2022}
}
@article{DBLP:journals/scn/LiSWX21,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang and
Qianqian Xing},
title = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet
Accountability},
journal = {Secur. Commun. Networks},
volume = {2021},
pages = {1974493:1--1974493:17},
year = {2021}
}
@article{DBLP:journals/access/LiuWP20,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {Secure Remote Multi-Factor Authentication Scheme Based on Chaotic
Map Zero-Knowledge Proof for Crowdsourcing Internet of Things},
journal = {{IEEE} Access},
volume = {8},
pages = {8754--8767},
year = {2020}
}
@article{DBLP:journals/access/LiuWP20a,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {State of the Art: Secure Mobile Payment},
journal = {{IEEE} Access},
volume = {8},
pages = {13898--13914},
year = {2020}
}
@article{DBLP:journals/iotj/LiCSHW20,
author = {Jie Li and
Rongmao Chen and
Jinshu Su and
Xinyi Huang and
Xiaofeng Wang},
title = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {2},
pages = {1216--1229},
year = {2020}
}
@article{DBLP:journals/iotj/LiSW20,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang},
title = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal
Latency and Perfect Forward Secrecy},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {8},
pages = {6828--6841},
year = {2020}
}
@inproceedings{DBLP:conf/iscc/Liu0020,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {{NCZKP} Based Privacy-Preserving Authentication Scheme for the Untrusted
Gateway Node Smart Home Environment},
booktitle = {{ISCC}},
pages = {1--6},
publisher = {{IEEE}},
year = {2020}
}
@article{DBLP:journals/access/LiuWPX19,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng and
Qianqian Xing},
title = {Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based
{ID-MAKA} Scheme for Mobile Cloud Computing Services},
journal = {{IEEE} Access},
volume = {7},
pages = {137770--137783},
year = {2019}
}
@article{DBLP:journals/concurrency/LiSCWC19,
author = {Jie Li and
Jinshu Su and
Rongmao Chen and
Xiaofeng Wang and
Shuhui Chen},
title = {Practical privacy-preserving deep packet inspection outsourcing},
journal = {Concurr. Comput. Pract. Exp.},
volume = {31},
number = {22},
year = {2019}
}
@article{DBLP:journals/ijdsn/ZhaoLWY19,
author = {Baokang Zhao and
Puguang Liu and
Xiaofeng Wang and
Ilsun You},
title = {Toward efficient authentication for space-air-ground integrated Internet
of things},
journal = {Int. J. Distributed Sens. Networks},
volume = {15},
number = {7},
year = {2019}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
author = {Lin Liu and
Jinshu Su and
Ximeng Liu and
Rongmao Chen and
Kai Huang and
Robert H. Deng and
Xiaofeng Wang},
title = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
Outsourced Cloud Data},
journal = {{IEEE} Internet Things J.},
volume = {6},
number = {6},
pages = {9841--9852},
year = {2019}
}
@inproceedings{DBLP:conf/sigcomm/LiSW19,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang},
title = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through
Minimal Latency},
booktitle = {{SIGCOMM} Posters and Demos},
pages = {166--168},
publisher = {{ACM}},
year = {2019}
}
@article{DBLP:journals/symmetry/XingWW18,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang},
title = {BGPcoin: Blockchain-Based Internet Number Resource Authority and {BGP}
Security Solution},
journal = {Symmetry},
volume = {10},
number = {9},
pages = {408},
year = {2018}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
author = {Lin Liu and
Jinshu Su and
Rongmao Chen and
Ximeng Liu and
Xiaofeng Wang and
Shuhui Chen and
Ho{-}fung Leung},
title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
Data from Multiple Parties},
booktitle = {{ACISP}},
series = {Lecture Notes in Computer Science},
volume = {10946},
pages = {431--451},
publisher = {Springer},
year = {2018}
}
@article{DBLP:journals/ieicet/LuoWWZH17,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Bo{-}Feng Zhang and
Wei Hu},
title = {{RPAH:} {A} Moving Target Network Defense Mechanism Naturally Resists
Reconnaissances and Attacks},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {100-D},
number = {3},
pages = {496--510},
year = {2017}
}
@article{DBLP:journals/jzusc/LuoWWZ17,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Bo{-}Feng Zhang},
title = {A keyed-hashing based self-synchronization mechanism for port address
hopping communication},
journal = {Frontiers Inf. Technol. Electron. Eng.},
volume = {18},
number = {5},
pages = {719--728},
year = {2017}
}
@article{DBLP:journals/spe/SunWBS17,
author = {Hao Sun and
Xiaofeng Wang and
Rajkumar Buyya and
Jinshu Su},
title = {CloudEyes: Cloud-based malware detection with reversible sketch for
resource-constrained internet of things (IoT) devices},
journal = {Softw. Pract. Exp.},
volume = {47},
number = {3},
pages = {421--441},
year = {2017}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
author = {Hao Sun and
Jinshu Su and
Xiaofeng Wang and
Rongmao Chen and
Yujing Liu and
Qiaolin Hu},
title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
booktitle = {{ACISP} {(2)}},
series = {Lecture Notes in Computer Science},
volume = {10343},
pages = {153--172},
publisher = {Springer},
year = {2017}
}
@inproceedings{DBLP:conf/ccs/XingWW17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang},
title = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management
Solution for {BGP} Security},
booktitle = {{CCS}},
pages = {2591--2593},
publisher = {{ACM}},
year = {2017}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
author = {Jie Li and
Jinshu Su and
Xiaofeng Wang and
Hao Sun and
Shuhui Chen},
title = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
Reversible Sketch},
booktitle = {{CSS}},
series = {Lecture Notes in Computer Science},
volume = {10581},
pages = {119--134},
publisher = {Springer},
year = {2017}
}
@inproceedings{DBLP:conf/globecom/XingWWTW17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Yong Tang and
Yi Wang},
title = {Deja {Q} Encore {RIBE:} Anonymous Revocable Identity-Based Encryption
with Short Parameters},
booktitle = {{GLOBECOM}},
pages = {1--6},
publisher = {{IEEE}},
year = {2017}
}
@inproceedings{DBLP:conf/trustcom/XingWWTL17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Jing Tao and
Liu Liu},
title = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive
Key Agreement for Wireless Networks},
booktitle = {TrustCom/BigDataSE/ICESS},
pages = {89--95},
publisher = {{IEEE} Computer Society},
year = {2017}
}
@article{DBLP:journals/ieicet/ChenWSW16,
author = {Peixin Chen and
Yilun Wu and
Jinshu Su and
Xiaofeng Wang},
title = {Comparing Performance of Hierarchical Identity-Based Signature Schemes},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {99-D},
number = {12},
pages = {3181--3184},
year = {2016}
}
@article{DBLP:journals/scn/ChenSZWY16,
author = {Peixin Chen and
Jinshu Su and
Baokang Zhao and
Xiaofeng Wang and
Ilsun You},
title = {An escrow-free online/offline {HIBS} scheme for privacy protection
of people-centric sensing},
journal = {Secur. Commun. Networks},
volume = {9},
number = {14},
pages = {2302--2312},
year = {2016}
}
@inproceedings{DBLP:conf/hpcc/XingWWCYTG16,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Peixin Chen and
Bo Yu and
Yong Tang and
Xianming Gao},
title = {Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID
Security},
booktitle = {HPCC/SmartCity/DSS},
pages = {430--437},
publisher = {{IEEE} Computer Society},
year = {2016}
}
@article{DBLP:journals/kbs/WangSWWL15,
author = {Xiaofeng Wang and
Jinshu Su and
Baosheng Wang and
Guojun Wang and
Ho{-}fung Leung},
title = {Trust Description and Propagation System: Semantics and axiomatization},
journal = {Knowl. Based Syst.},
volume = {90},
pages = {81--91},
year = {2015}
}
@article{DBLP:journals/scn/SuWSR15,
author = {Jinshu Su and
Xiaofeng Wang and
Weisong Shi and
Indrakshi Ray},
title = {Security, trust, and resilience of distributed networks and systems},
journal = {Secur. Commun. Networks},
volume = {8},
number = {10},
pages = {1829--1830},
year = {2015}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
author = {Peixin Chen and
Xiaofeng Wang and
Baokang Zhao and
Hao Sun and
Jinshu Su and
Ilsun You},
title = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
Order Bilinear Groups},
booktitle = {{BWCCA}},
pages = {364--369},
publisher = {{IEEE} Computer Society},
year = {2015}
}
@inproceedings{DBLP:conf/ccs/ChenWWSZ15,
author = {Peixin Chen and
Xiaofeng Wang and
Yilun Wu and
Jinshu Su and
Huan Zhou},
title = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing
{BGP} Protocol},
booktitle = {{CCS}},
pages = {1632--1634},
publisher = {{ACM}},
year = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
title = {A Hierarchical Identity-Based Signature from Composite Order Bilinear
Groups},
booktitle = {{ICA3PP} (Workshops and Symposiums)},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {46--56},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/ica3pp/XuCWS15,
author = {Chengcheng Xu and
Shuhui Chen and
Xiaofeng Wang and
Jinshu Su},
title = {An Efficient Pre-filter to Accelerate Regular Expression Matching},
booktitle = {{ICA3PP} (Workshops and Symposiums)},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {111--119},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15,
author = {Peixin Chen and
Xiaofeng Wang and
Baokang Zhao and
Jinshu Su and
Ilsun You},
title = {Removing Key Escrow from the {LW-HIBE} Scheme},
booktitle = {{ICA3PP} (Workshops and Symposiums)},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {593--605},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15a,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
title = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud
Storage},
booktitle = {{ICA3PP} (Workshops and Symposiums)},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {633--647},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15,
author = {Peige Ren and
Xiaofeng Wang and
Hao Sun and
Fen Xu and
Baokang Zhao and
Chunqing Wu},
title = {An Efficient Unsavory Data Detection Method for Internet Big Data},
booktitle = {ICT-EurAsia/CONFENIS},
series = {Lecture Notes in Computer Science},
volume = {9357},
pages = {213--220},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/infocom/RenWZWS15,
author = {Peige Ren and
Xiaofeng Wang and
Baokang Zhao and
Chunqing Wu and
Hao Sun},
title = {OpenSRN: {A} software-defined semantic routing network architecture},
booktitle = {{INFOCOM} Workshops},
pages = {101--102},
publisher = {{IEEE}},
year = {2015}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
author = {Hao Sun and
Xiaofeng Wang and
Jinshu Su and
Peixin Chen},
title = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
booktitle = {SecureComm},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {164},
pages = {157--174},
publisher = {Springer},
year = {2015}
}
@inproceedings{DBLP:conf/socialsec/Chen0S15,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
title = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection},
booktitle = {SocialSec},
pages = {72--79},
publisher = {{IEEE} Computer Society},
year = {2015}
}
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Xiao{-}Feng Hu and
Gui{-}Lin Cai and
Hao Sun},
title = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and
External Adversaries},
booktitle = {TrustCom/BigDataSE/ISPA {(1)}},
pages = {263--270},
publisher = {{IEEE}},
year = {2015}
}
@article{DBLP:journals/fgcs/SuCZWY14,
author = {Jinshu Su and
Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Ilsun You},
title = {ePASS: An expressive attribute-based signature scheme with privacy
and an unforgeability guarantee for the Internet of Things},
journal = {Future Gener. Comput. Syst.},
volume = {33},
pages = {11--18},
year = {2014}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
author = {Yanpeng Ma and
Xiaofeng Wang and
Jinshu Su and
Chunqing Wu and
Wanrong Yu and
Baokang Zhao},
title = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
Satellite Constellation Networks},
journal = {J. Networks},
volume = {9},
number = {4},
pages = {896--907},
year = {2014}
}
@inproceedings{DBLP:conf/ccs/WangZSZY14,
author = {Xiaofeng Wang and
Huan Zhou and
Jinshu Su and
Bofeng Zhang and
Fan Yang},
title = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol
with Full Compliance to {TCP/IP}},
booktitle = {{CCS}},
pages = {1520--1522},
publisher = {{ACM}},
year = {2014}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14,
author = {Peige Ren and
Xiaofeng Wang and
Chunqing Wu and
Baokang Zhao and
Hao Sun},
title = {A Semantic-Based Malware Detection System Design Based on Channels},
booktitle = {ICT-EurAsia},
series = {Lecture Notes in Computer Science},
volume = {8407},
pages = {653--662},
publisher = {Springer},
year = {2014}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14,
author = {Peige Ren and
Xiaofeng Wang and
Hao Sun and
Baokang Zhao and
Chunqing Wu},
title = {An Efficient Semantic-Based Organization and Similarity Search Method
for Internet Data Resources},
booktitle = {ICT-EurAsia},
series = {Lecture Notes in Computer Science},
volume = {8407},
pages = {663--673},
publisher = {Springer},
year = {2014}
}
@article{DBLP:journals/mcm/LuWZWS13,
author = {Huabiao Lu and
Xiaofeng Wang and
Baokang Zhao and
Fei Wang and
Jinshu Su},
title = {ENDMal: An anti-obfuscation and collaborative malware detection system
using syscall sequences},
journal = {Math. Comput. Model.},
volume = {58},
number = {5-6},
pages = {1140--1154},
year = {2013}
}
@article{DBLP:journals/mcm/CaoZSWW13,
author = {Dan Cao and
Baokang Zhao and
Jinshu Su and
Baosheng Wang and
Xiaofeng Wang},
title = {A privacy preserving authentication scheme with flexible identity
revocation in people-centric sensing},
journal = {Math. Comput. Model.},
volume = {58},
number = {5-6},
pages = {1175--1188},
year = {2013}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
author = {Huabiao Lu and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su},
title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
Signature Generation},
booktitle = {ICT-EurAsia},
series = {Lecture Notes in Computer Science},
volume = {7804},
pages = {271--284},
publisher = {Springer},
year = {2013}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWHWZ13,
author = {Dan Zhao and
Chunqing Wu and
Xiaofeng Hu and
Xiaofeng Wang and
Baokang Zhao},
title = {Characterization of {OSPF} Convergence with Correlated Failures},
booktitle = {TrustCom/ISPA/IUCC},
pages = {1351--1356},
publisher = {{IEEE} Computer Society},
year = {2013}
}
@inproceedings{DBLP:conf/trustcom/MaPWZSW13,
author = {Yanpeng Ma and
Wei Peng and
Xiaofeng Wang and
Baokang Zhao and
Jinshu Su and
Chunqing Wu},
title = {A Location Management Algorithm for {LEO} Satellite Networks},
booktitle = {TrustCom/ISPA/IUCC},
pages = {1362--1366},
publisher = {{IEEE} Computer Society},
year = {2013}
}
@proceedings{DBLP:conf/icoc/2013,
editor = {Jinshu Su and
Baokang Zhao and
Zhigang Sun and
Xiaofeng Wang and
Fei Wang and
Ke Xu},
title = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
Papers},
series = {Communications in Computer and Information Science},
volume = {401},
publisher = {Springer},
year = {2013}
}
@article{DBLP:journals/mcm/WangWWS12,
author = {Fei Wang and
Hailong Wang and
Xiaofeng Wang and
Jinshu Su},
title = {A new multistage approach to detect subtle DDoS attacks},
journal = {Math. Comput. Model.},
volume = {55},
number = {1-2},
pages = {198--213},
year = {2012}
}
@article{DBLP:journals/mis/CaoZWS12,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su},
title = {Flexible multi-authority attribute-based signature schemes for expressive
policy},
journal = {Mob. Inf. Syst.},
volume = {8},
number = {3},
pages = {255--274},
year = {2012}
}
@article{DBLP:journals/tsc/WangLS12,
author = {Xiaofeng Wang and
Ling Liu and
Jinshu Su},
title = {{RLM:} {A} General Model for Trust Representation and Aggregation},
journal = {{IEEE} Trans. Serv. Comput.},
volume = {5},
number = {1},
pages = {131--143},
year = {2012}
}
@inproceedings{DBLP:conf/imis/MaSWSWYZH12,
author = {Yanpeng Ma and
Jinshu Su and
Chunqing Wu and
Xiaofeng Wang and
Wanrong Yu and
Baokang Zhao and
Xiaofeng Hu},
title = {A Distribute and Geographic Information Based Routing Algorithm for
{LEO} Satellite Constellation Networks},
booktitle = {{IMIS}},
pages = {433--438},
publisher = {{IEEE} Computer Society},
year = {2012}
}
@inproceedings{DBLP:conf/mass/HanWWW12,
author = {Zilong Han and
Xiaofeng Wang and
Fei Wang and
Yongjun Wang},
title = {Collaborative detection of DDoS attacks based on chord protocol},
booktitle = {{MASS} Workshops},
pages = {1--4},
publisher = {{IEEE} Computer Society},
year = {2012}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
author = {Fei Wang and
Xiaofeng Wang and
Xiaofeng Hu and
Jinshu Su},
title = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
anomaly detection},
booktitle = {{MASS} Workshops},
pages = {1--4},
publisher = {{IEEE} Computer Society},
year = {2012}
}
@inproceedings{DBLP:conf/music/MaSWWYZH12,
author = {Yanpeng Ma and
Jinshu Su and
Chunqing Wu and
Xiaofeng Wang and
Wanrong Yu and
Baokang Zhao and
Xiaofeng Hu},
title = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation
Networks},
booktitle = {{MUSIC}},
pages = {240--245},
publisher = {{IEEE}},
year = {2012}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
author = {Fei Wang and
Xiaofeng Wang and
Jinshu Su and
Bin Xiao},
title = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
Victim Identification},
booktitle = {TrustCom},
pages = {215--222},
publisher = {{IEEE} Computer Society},
year = {2012}
}
@article{DBLP:journals/fgcs/WangYBS11,
author = {Xiaofeng Wang and
Chee Shin Yeo and
Rajkumar Buyya and
Jinshu Su},
title = {Optimizing the makespan and reliability for workflow applications
with reputation and a look-ahead genetic algorithm},
journal = {Future Gener. Comput. Syst.},
volume = {27},
number = {8},
pages = {1124--1134},
year = {2011}
}
@inproceedings{DBLP:conf/incos/CaoZWSJ11,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su and
Guofei Ji},
title = {Multi-authority Attribute-Based Signature},
booktitle = {INCoS},
pages = {668--672},
publisher = {{IEEE} Computer Society},
year = {2011}
}
@inproceedings{DBLP:conf/nbis/CaoZWSC11,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su and
Yijiao Chen},
title = {Authenticating with Attributes in Online Social Networks},
booktitle = {NBiS},
pages = {607--611},
publisher = {{IEEE} Computer Society},
year = {2011}
}
@inproceedings{DBLP:conf/icpp/YuLLWS10,
author = {Jie Yu and
Liming Lu and
Zhoujun Li and
Xiaofeng Wang and
Jinshu Su},
title = {A Simple Effective Scheme to Enhance the Capability of Web Servers
Using {P2P} Networks},
booktitle = {{ICPP}},
pages = {680--689},
publisher = {{IEEE} Computer Society},
year = {2010}
}
@inproceedings{DBLP:conf/aina/WangYBS09,
author = {Xiaofeng Wang and
Chee Shin Yeo and
Rajkumar Buyya and
Jinshu Su},
title = {Reliability-Driven Reputation Based Scheduling for Public-Resource
Computing Using {GA}},
booktitle = {{AINA}},
pages = {411--418},
publisher = {{IEEE} Computer Society},
year = {2009}
}
@inproceedings{DBLP:conf/ccgrid/WangBS09,
author = {Xiaofeng Wang and
Rajkumar Buyya and
Jinshu Su},
title = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using
Max-Min Strategy},
booktitle = {{CCGRID}},
pages = {108--115},
publisher = {{IEEE} Computer Society},
year = {2009}
}
@inproceedings{DBLP:conf/fcst/OuWHW09,
author = {Wei Ou and
Xiaofeng Wang and
Wenbao Han and
Yongjun Wang},
title = {Research on Trust Evaluation Model Based on {TPM}},
booktitle = {{FCST}},
pages = {593--597},
publisher = {{IEEE} Computer Society},
year = {2009}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.