这是indexloc提供的服务,不要输入任何密码

BibTeX records: Xiaofeng Wang 0002

download as .bib file

@inproceedings{DBLP:conf/iccns/WuWX22,
  author       = {Xiaoyan Wu and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586111},
  doi          = {10.1145/3586102.3586111},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/WuWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiSWX21,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet
                  Accountability},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {1974493:1--1974493:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/1974493},
  doi          = {10.1155/2021/1974493},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiSWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWP20,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {Secure Remote Multi-Factor Authentication Scheme Based on Chaotic
                  Map Zero-Knowledge Proof for Crowdsourcing Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {8754--8767},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2962912},
  doi          = {10.1109/ACCESS.2019.2962912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWP20a,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {State of the Art: Secure Mobile Payment},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {13898--13914},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2963480},
  doi          = {10.1109/ACCESS.2019.2963480},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCSHW20,
  author       = {Jie Li and
                  Rongmao Chen and
                  Jinshu Su and
                  Xinyi Huang and
                  Xiaofeng Wang},
  title        = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {2},
  pages        = {1216--1229},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953715},
  doi          = {10.1109/JIOT.2019.2953715},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiSW20,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal
                  Latency and Perfect Forward Secrecy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {6828--6841},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2988126},
  doi          = {10.1109/JIOT.2020.2988126},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/Liu0020,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng},
  title        = {{NCZKP} Based Privacy-Preserving Authentication Scheme for the Untrusted
                  Gateway Node Smart Home Environment},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
                  France, July 7-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCC50000.2020.9219704},
  doi          = {10.1109/ISCC50000.2020.9219704},
  timestamp    = {Mon, 19 Oct 2020 11:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/Liu0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWPX19,
  author       = {Wenzheng Liu and
                  Xiaofeng Wang and
                  Wei Peng and
                  Qianqian Xing},
  title        = {Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based
                  {ID-MAKA} Scheme for Mobile Cloud Computing Services},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {137770--137783},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2942987},
  doi          = {10.1109/ACCESS.2019.2942987},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWPX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiSCWC19,
  author       = {Jie Li and
                  Jinshu Su and
                  Rongmao Chen and
                  Xiaofeng Wang and
                  Shuhui Chen},
  title        = {Practical privacy-preserving deep packet inspection outsourcing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4435},
  doi          = {10.1002/CPE.4435},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhaoLWY19,
  author       = {Baokang Zhao and
                  Puguang Liu and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {Toward efficient authentication for space-air-ground integrated Internet
                  of things},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {7},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719860390},
  doi          = {10.1177/1550147719860390},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhaoLWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Kai Huang and
                  Robert H. Deng and
                  Xiaofeng Wang},
  title        = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
                  Outsourced Cloud Data},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9841--9852},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2932444},
  doi          = {10.1109/JIOT.2019.2932444},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiSW19,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through
                  Minimal Latency},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
                  {SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
  pages        = {166--168},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342280.3342347},
  doi          = {10.1145/3342280.3342347},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/XingWW18,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {BGPcoin: Blockchain-Based Internet Number Resource Authority and {BGP}
                  Security Solution},
  journal      = {Symmetry},
  volume       = {10},
  number       = {9},
  pages        = {408},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10090408},
  doi          = {10.3390/SYM10090408},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/XingWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi          = {10.1007/978-3-319-93638-3\_25},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LuoWWZH17,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Bo{-}Feng Zhang and
                  Wei Hu},
  title        = {{RPAH:} {A} Moving Target Network Defense Mechanism Naturally Resists
                  Reconnaissances and Attacks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {3},
  pages        = {496--510},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016EDP7304},
  doi          = {10.1587/TRANSINF.2016EDP7304},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LuoWWZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/LuoWWZ17,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Bo{-}Feng Zhang},
  title        = {A keyed-hashing based self-synchronization mechanism for port address
                  hopping communication},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {18},
  number       = {5},
  pages        = {719--728},
  year         = {2017},
  url          = {https://doi.org/10.1631/FITEE.1601548},
  doi          = {10.1631/FITEE.1601548},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/LuoWWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/SunWBS17,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {CloudEyes: Cloud-based malware detection with reversible sketch for
                  resource-constrained internet of things (IoT) devices},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {3},
  pages        = {421--441},
  year         = {2017},
  url          = {https://doi.org/10.1002/spe.2420},
  doi          = {10.1002/SPE.2420},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/SunWBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XingWW17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management
                  Solution for {BGP} Security},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2591--2593},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138828},
  doi          = {10.1145/3133956.3138828},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XingWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
  author       = {Jie Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Hao Sun and
                  Shuhui Chen},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
                  Reversible Sketch},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_9},
  doi          = {10.1007/978-3-319-69471-9\_9},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/LiSWSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XingWWTW17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Yong Tang and
                  Yi Wang},
  title        = {Deja {Q} Encore {RIBE:} Anonymous Revocable Identity-Based Encryption
                  with Short Parameters},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8253992},
  doi          = {10.1109/GLOCOM.2017.8253992},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/XingWWTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingWWTL17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Jing Tao and
                  Liu Liu},
  title        = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive
                  Key Agreement for Wireless Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingWWTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenWSW16,
  author       = {Peixin Chen and
                  Yilun Wu and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {Comparing Performance of Hierarchical Identity-Based Signature Schemes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {12},
  pages        = {3181--3184},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8136},
  doi          = {10.1587/TRANSINF.2016EDL8136},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChenWSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenSZWY16,
  author       = {Peixin Chen and
                  Jinshu Su and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {An escrow-free online/offline {HIBS} scheme for privacy protection
                  of people-centric sensing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2302--2312},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1492},
  doi          = {10.1002/SEC.1492},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenSZWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XingWWCYTG16,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Peixin Chen and
                  Bo Yu and
                  Yong Tang and
                  Xianming Gao},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID
                  Security},
  booktitle    = {18th {IEEE} International Conference on High Performance Computing
                  and Communications; 14th {IEEE} International Conference on Smart
                  City; 2nd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages        = {430--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0068},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2016.0068},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/XingWWCYTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangSWWL15,
  author       = {Xiaofeng Wang and
                  Jinshu Su and
                  Baosheng Wang and
                  Guojun Wang and
                  Ho{-}fung Leung},
  title        = {Trust Description and Propagation System: Semantics and axiomatization},
  journal      = {Knowl. Based Syst.},
  volume       = {90},
  pages        = {81--91},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.knosys.2015.09.030},
  doi          = {10.1016/J.KNOSYS.2015.09.030},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/WangSWWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuWSR15,
  author       = {Jinshu Su and
                  Xiaofeng Wang and
                  Weisong Shi and
                  Indrakshi Ray},
  title        = {Security, trust, and resilience of distributed networks and systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1829--1830},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1276},
  doi          = {10.1002/SEC.1276},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuWSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Hao Sun and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
                  Order Bilinear Groups},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {364--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.9},
  doi          = {10.1109/BWCCA.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenWWSZ15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Yilun Wu and
                  Jinshu Su and
                  Huan Zhou},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing
                  {BGP} Protocol},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1632--1634},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810116},
  doi          = {10.1145/2810103.2810116},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenWWSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {A Hierarchical Identity-Based Signature from Composite Order Bilinear
                  Groups},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {46--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_5},
  doi          = {10.1007/978-3-319-27161-3\_5},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuCWS15,
  author       = {Chengcheng Xu and
                  Shuhui Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {An Efficient Pre-filter to Accelerate Regular Expression Matching},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {111--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_10},
  doi          = {10.1007/978-3-319-27161-3\_10},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XuCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Removing Key Escrow from the {LW-HIBE} Scheme},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {593--605},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_54},
  doi          = {10.1007/978-3-319-27161-3\_54},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWZSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15a,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud
                  Storage},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {633--647},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_58},
  doi          = {10.1007/978-3-319-27161-3\_58},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Fen Xu and
                  Baokang Zhao and
                  Chunqing Wu},
  editor       = {Ismail Khalil and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Li Da Xu and
                  Ilsun You},
  title        = {An Efficient Unsavory Data Detection Method for Internet Big Data},
  booktitle    = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International
                  Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference,
                  {CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October
                  4-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9357},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24315-3\_21},
  doi          = {10.1007/978-3-319-24315-3\_21},
  timestamp    = {Tue, 29 Dec 2020 18:35:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWSXZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RenWZWS15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Chunqing Wu and
                  Hao Sun},
  title        = {OpenSRN: {A} software-defined semantic routing network architecture},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {101--102},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179363},
  doi          = {10.1109/INFCOMW.2015.7179363},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RenWZWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Peixin Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_9},
  doi          = {10.1007/978-3-319-28865-9\_9},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/Chen0S15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection},
  booktitle    = {International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
  pages        = {72--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SocialSec2015.11},
  doi          = {10.1109/SOCIALSEC2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/Chen0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Xiao{-}Feng Hu and
                  Gui{-}Lin Cai and
                  Hao Sun},
  title        = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and
                  External Adversaries},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {263--270},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.383},
  doi          = {10.1109/TRUSTCOM.2015.383},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoWWHCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SuCZWY14,
  author       = {Jinshu Su and
                  Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {ePASS: An expressive attribute-based signature scheme with privacy
                  and an unforgeability guarantee for the Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {33},
  pages        = {11--18},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.10.016},
  doi          = {10.1016/J.FUTURE.2013.10.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/SuCZWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
  author       = {Yanpeng Ma and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Chunqing Wu and
                  Wanrong Yu and
                  Baokang Zhao},
  title        = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
                  Satellite Constellation Networks},
  journal      = {J. Networks},
  volume       = {9},
  number       = {4},
  pages        = {896--907},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.4.896-907},
  doi          = {10.4304/JNW.9.4.896-907},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaWSWYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangZSZY14,
  author       = {Xiaofeng Wang and
                  Huan Zhou and
                  Jinshu Su and
                  Bofeng Zhang and
                  Fan Yang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol
                  with Full Compliance to {TCP/IP}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1520--1522},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662371},
  doi          = {10.1145/2660267.2662371},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangZSZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Chunqing Wu and
                  Baokang Zhao and
                  Hao Sun},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {A Semantic-Based Malware Detection System Design Based on Channels},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {653--662},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_67},
  doi          = {10.1007/978-3-642-55032-4\_67},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWWZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Baokang Zhao and
                  Chunqing Wu},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {An Efficient Semantic-Based Organization and Similarity Search Method
                  for Internet Data Resources},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {663--673},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_68},
  doi          = {10.1007/978-3-642-55032-4\_68},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWSZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LuWZWS13,
  author       = {Huabiao Lu and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Fei Wang and
                  Jinshu Su},
  title        = {ENDMal: An anti-obfuscation and collaborative malware detection system
                  using syscall sequences},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1140--1154},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.03.008},
  doi          = {10.1016/J.MCM.2013.03.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LuWZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/CaoZSWW13,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Jinshu Su and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {A privacy preserving authentication scheme with flexible identity
                  revocation in people-centric sensing},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1175--1188},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.02.007},
  doi          = {10.1016/J.MCM.2013.02.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/CaoZSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
                  Signature Generation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_28},
  doi          = {10.1007/978-3-642-36818-9\_28},
  timestamp    = {Sun, 02 Nov 2025 21:27:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWHWZ13,
  author       = {Dan Zhao and
                  Chunqing Wu and
                  Xiaofeng Hu and
                  Xiaofeng Wang and
                  Baokang Zhao},
  title        = {Characterization of {OSPF} Convergence with Correlated Failures},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1351--1356},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.162},
  doi          = {10.1109/TRUSTCOM.2013.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoWHWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaPWZSW13,
  author       = {Yanpeng Ma and
                  Wei Peng and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Chunqing Wu},
  title        = {A Location Management Algorithm for {LEO} Satellite Networks},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1362--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.164},
  doi          = {10.1109/TRUSTCOM.2013.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaPWZSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icoc/2013,
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53959-6},
  doi          = {10.1007/978-3-642-53959-6},
  isbn         = {978-3-642-53958-9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/WangWWS12,
  author       = {Fei Wang and
                  Hailong Wang and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A new multistage approach to detect subtle DDoS attacks},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {198--213},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.02.025},
  doi          = {10.1016/J.MCM.2011.02.025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/WangWWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/CaoZWS12,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {Flexible multi-authority attribute-based signature schemes for expressive
                  policy},
  journal      = {Mob. Inf. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {255--274},
  year         = {2012},
  url          = {https://doi.org/10.3233/MIS-2012-0142},
  doi          = {10.3233/MIS-2012-0142},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/CaoZWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangLS12,
  author       = {Xiaofeng Wang and
                  Ling Liu and
                  Jinshu Su},
  title        = {{RLM:} {A} General Model for Trust Representation and Aggregation},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {5},
  number       = {1},
  pages        = {131--143},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSC.2010.56},
  doi          = {10.1109/TSC.2010.56},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MaSWSWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {A Distribute and Geographic Information Based Routing Algorithm for
                  {LEO} Satellite Constellation Networks},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {433--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.74},
  doi          = {10.1109/IMIS.2012.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/MaSWSWYZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HanWWW12,
  author       = {Zilong Han and
                  Xiaofeng Wang and
                  Fei Wang and
                  Yongjun Wang},
  title        = {Collaborative detection of DDoS attacks based on chord protocol},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708531},
  doi          = {10.1109/MASS.2012.6708531},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/HanWWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Xiaofeng Hu and
                  Jinshu Su},
  title        = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
                  anomaly detection},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708530},
  doi          = {10.1109/MASS.2012.6708530},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/WangWHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/music/MaSWWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  title        = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation
                  Networks},
  booktitle    = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent
                  Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MUSIC.2012.49},
  doi          = {10.1109/MUSIC.2012.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/music/MaSWWYZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Bin Xiao},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
                  Victim Identification},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {215--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.295},
  doi          = {10.1109/TRUSTCOM.2012.295},
  timestamp    = {Tue, 25 Feb 2025 09:21:51 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0007WSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangYBS11,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {Optimizing the makespan and reliability for workflow applications
                  with reputation and a look-ahead genetic algorithm},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {8},
  pages        = {1124--1134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.future.2011.03.008},
  doi          = {10.1016/J.FUTURE.2011.03.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangYBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/CaoZWSJ11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Guofei Ji},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Multi-authority Attribute-Based Signature},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {668--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.122},
  doi          = {10.1109/INCOS.2011.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/CaoZWSJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/CaoZWSC11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Yijiao Chen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Authenticating with Attributes in Online Social Networks},
  booktitle    = {The 14th International Conference on Network-Based Information Systems,
                  NBiS 2011, Tirana, Albania, September 7-9, 2011},
  pages        = {607--611},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/NBiS.2011.102},
  doi          = {10.1109/NBIS.2011.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/CaoZWSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/YuLLWS10,
  author       = {Jie Yu and
                  Liming Lu and
                  Zhoujun Li and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A Simple Effective Scheme to Enhance the Capability of Web Servers
                  Using {P2P} Networks},
  booktitle    = {39th International Conference on Parallel Processing, {ICPP} 2010,
                  San Diego, California, USA, 13-16 September 2010},
  pages        = {680--689},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPP.2010.76},
  doi          = {10.1109/ICPP.2010.76},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/YuLLWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/WangYBS09,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Takahiro Hara and
                  Arjan Durresi},
  title        = {Reliability-Driven Reputation Based Scheduling for Public-Resource
                  Computing Using {GA}},
  booktitle    = {The {IEEE} 23rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
                  2009},
  pages        = {411--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/AINA.2009.21},
  doi          = {10.1109/AINA.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/WangYBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/WangBS09,
  author       = {Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  editor       = {Franck Cappello and
                  Cho{-}Li Wang and
                  Rajkumar Buyya},
  title        = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using
                  Max-Min Strategy},
  booktitle    = {9th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCGRID.2009.14},
  doi          = {10.1109/CCGRID.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/WangBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/OuWHW09,
  author       = {Wei Ou and
                  Xiaofeng Wang and
                  Wenbao Han and
                  Yongjun Wang},
  title        = {Research on Trust Evaluation Model Based on {TPM}},
  booktitle    = {Fourth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
  pages        = {593--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FCST.2009.10},
  doi          = {10.1109/FCST.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/OuWHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}