default search action
BibTeX records: Xiaofeng Wang 0002
@inproceedings{DBLP:conf/iccns/WuWX22,
author = {Xiaoyan Wu and
Xiaofeng Wang and
Qianqian Xing},
title = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
booktitle = {Proceedings of the 12th International Conference on Communication
and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
2022},
pages = {58--63},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3586102.3586111},
doi = {10.1145/3586102.3586111},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iccns/WuWX22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiSWX21,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang and
Qianqian Xing},
title = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet
Accountability},
journal = {Secur. Commun. Networks},
volume = {2021},
pages = {1974493:1--1974493:17},
year = {2021},
url = {https://doi.org/10.1155/2021/1974493},
doi = {10.1155/2021/1974493},
timestamp = {Thu, 12 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scn/LiSWX21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWP20,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {Secure Remote Multi-Factor Authentication Scheme Based on Chaotic
Map Zero-Knowledge Proof for Crowdsourcing Internet of Things},
journal = {{IEEE} Access},
volume = {8},
pages = {8754--8767},
year = {2020},
url = {https://doi.org/10.1109/ACCESS.2019.2962912},
doi = {10.1109/ACCESS.2019.2962912},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/LiuWP20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWP20a,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {State of the Art: Secure Mobile Payment},
journal = {{IEEE} Access},
volume = {8},
pages = {13898--13914},
year = {2020},
url = {https://doi.org/10.1109/ACCESS.2019.2963480},
doi = {10.1109/ACCESS.2019.2963480},
timestamp = {Mon, 22 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/LiuWP20a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCSHW20,
author = {Jie Li and
Rongmao Chen and
Jinshu Su and
Xinyi Huang and
Xiaofeng Wang},
title = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {2},
pages = {1216--1229},
year = {2020},
url = {https://doi.org/10.1109/JIOT.2019.2953715},
doi = {10.1109/JIOT.2019.2953715},
timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiSW20,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang},
title = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal
Latency and Perfect Forward Secrecy},
journal = {{IEEE} Internet Things J.},
volume = {7},
number = {8},
pages = {6828--6841},
year = {2020},
url = {https://doi.org/10.1109/JIOT.2020.2988126},
doi = {10.1109/JIOT.2020.2988126},
timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/LiSW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/Liu0020,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng},
title = {{NCZKP} Based Privacy-Preserving Authentication Scheme for the Untrusted
Gateway Node Smart Home Environment},
booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
France, July 7-10, 2020},
pages = {1--6},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/ISCC50000.2020.9219704},
doi = {10.1109/ISCC50000.2020.9219704},
timestamp = {Mon, 19 Oct 2020 11:52:22 +0200},
biburl = {https://dblp.org/rec/conf/iscc/Liu0020.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWPX19,
author = {Wenzheng Liu and
Xiaofeng Wang and
Wei Peng and
Qianqian Xing},
title = {Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based
{ID-MAKA} Scheme for Mobile Cloud Computing Services},
journal = {{IEEE} Access},
volume = {7},
pages = {137770--137783},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2942987},
doi = {10.1109/ACCESS.2019.2942987},
timestamp = {Mon, 22 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/LiuWPX19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiSCWC19,
author = {Jie Li and
Jinshu Su and
Rongmao Chen and
Xiaofeng Wang and
Shuhui Chen},
title = {Practical privacy-preserving deep packet inspection outsourcing},
journal = {Concurr. Comput. Pract. Exp.},
volume = {31},
number = {22},
year = {2019},
url = {https://doi.org/10.1002/cpe.4435},
doi = {10.1002/CPE.4435},
timestamp = {Fri, 13 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhaoLWY19,
author = {Baokang Zhao and
Puguang Liu and
Xiaofeng Wang and
Ilsun You},
title = {Toward efficient authentication for space-air-ground integrated Internet
of things},
journal = {Int. J. Distributed Sens. Networks},
volume = {15},
number = {7},
year = {2019},
url = {https://doi.org/10.1177/1550147719860390},
doi = {10.1177/1550147719860390},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijdsn/ZhaoLWY19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
author = {Lin Liu and
Jinshu Su and
Ximeng Liu and
Rongmao Chen and
Kai Huang and
Robert H. Deng and
Xiaofeng Wang},
title = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
Outsourced Cloud Data},
journal = {{IEEE} Internet Things J.},
volume = {6},
number = {6},
pages = {9841--9852},
year = {2019},
url = {https://doi.org/10.1109/JIOT.2019.2932444},
doi = {10.1109/JIOT.2019.2932444},
timestamp = {Sun, 21 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiSW19,
author = {Pengkun Li and
Jinshu Su and
Xiaofeng Wang},
title = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through
Minimal Latency},
booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
{SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
pages = {166--168},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3342280.3342347},
doi = {10.1145/3342280.3342347},
timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sigcomm/LiSW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/XingWW18,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang},
title = {BGPcoin: Blockchain-Based Internet Number Resource Authority and {BGP}
Security Solution},
journal = {Symmetry},
volume = {10},
number = {9},
pages = {408},
year = {2018},
url = {https://doi.org/10.3390/sym10090408},
doi = {10.3390/SYM10090408},
timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/symmetry/XingWW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
author = {Lin Liu and
Jinshu Su and
Rongmao Chen and
Ximeng Liu and
Xiaofeng Wang and
Shuhui Chen and
Ho{-}fung Leung},
editor = {Willy Susilo and
Guomin Yang},
title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
Data from Multiple Parties},
booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10946},
pages = {431--451},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-93638-3\_25},
doi = {10.1007/978-3-319-93638-3\_25},
timestamp = {Sun, 21 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LuoWWZH17,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Bo{-}Feng Zhang and
Wei Hu},
title = {{RPAH:} {A} Moving Target Network Defense Mechanism Naturally Resists
Reconnaissances and Attacks},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {100-D},
number = {3},
pages = {496--510},
year = {2017},
url = {https://doi.org/10.1587/transinf.2016EDP7304},
doi = {10.1587/TRANSINF.2016EDP7304},
timestamp = {Sun, 21 May 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/LuoWWZH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/LuoWWZ17,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Bo{-}Feng Zhang},
title = {A keyed-hashing based self-synchronization mechanism for port address
hopping communication},
journal = {Frontiers Inf. Technol. Electron. Eng.},
volume = {18},
number = {5},
pages = {719--728},
year = {2017},
url = {https://doi.org/10.1631/FITEE.1601548},
doi = {10.1631/FITEE.1601548},
timestamp = {Thu, 05 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jzusc/LuoWWZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/SunWBS17,
author = {Hao Sun and
Xiaofeng Wang and
Rajkumar Buyya and
Jinshu Su},
title = {CloudEyes: Cloud-based malware detection with reversible sketch for
resource-constrained internet of things (IoT) devices},
journal = {Softw. Pract. Exp.},
volume = {47},
number = {3},
pages = {421--441},
year = {2017},
url = {https://doi.org/10.1002/spe.2420},
doi = {10.1002/SPE.2420},
timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/SunWBS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
author = {Hao Sun and
Jinshu Su and
Xiaofeng Wang and
Rongmao Chen and
Yujing Liu and
Qiaolin Hu},
editor = {Josef Pieprzyk and
Suriadi Suriadi},
title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {10343},
pages = {153--172},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59870-3\_9},
doi = {10.1007/978-3-319-59870-3\_9},
timestamp = {Sun, 02 Jun 2019 21:26:44 +0200},
biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XingWW17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang},
editor = {Bhavani Thuraisingham and
David Evans and
Tal Malkin and
Dongyan Xu},
title = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management
Solution for {BGP} Security},
booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
pages = {2591--2593},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3133956.3138828},
doi = {10.1145/3133956.3138828},
timestamp = {Wed, 29 Jun 2022 15:37:41 +0200},
biburl = {https://dblp.org/rec/conf/ccs/XingWW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
author = {Jie Li and
Jinshu Su and
Xiaofeng Wang and
Hao Sun and
Shuhui Chen},
editor = {Sheng Wen and
Wei Wu and
Aniello Castiglione},
title = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
Reversible Sketch},
booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
2017, Xi'an, China, October 23-25, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10581},
pages = {119--134},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-69471-9\_9},
doi = {10.1007/978-3-319-69471-9\_9},
timestamp = {Fri, 13 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/css/LiSWSC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XingWWTW17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Yong Tang and
Yi Wang},
title = {Deja {Q} Encore {RIBE:} Anonymous Revocable Identity-Based Encryption
with Short Parameters},
booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
December 4-8, 2017},
pages = {1--6},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/GLOCOM.2017.8253992},
doi = {10.1109/GLOCOM.2017.8253992},
timestamp = {Wed, 24 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/globecom/XingWWTW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingWWTL17,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Jing Tao and
Liu Liu},
title = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive
Key Agreement for Wireless Networks},
booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
2017},
pages = {89--95},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224},
doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.224},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/XingWWTL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenWSW16,
author = {Peixin Chen and
Yilun Wu and
Jinshu Su and
Xiaofeng Wang},
title = {Comparing Performance of Hierarchical Identity-Based Signature Schemes},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {99-D},
number = {12},
pages = {3181--3184},
year = {2016},
url = {https://doi.org/10.1587/transinf.2016EDL8136},
doi = {10.1587/TRANSINF.2016EDL8136},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/ChenWSW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenSZWY16,
author = {Peixin Chen and
Jinshu Su and
Baokang Zhao and
Xiaofeng Wang and
Ilsun You},
title = {An escrow-free online/offline {HIBS} scheme for privacy protection
of people-centric sensing},
journal = {Secur. Commun. Networks},
volume = {9},
number = {14},
pages = {2302--2312},
year = {2016},
url = {https://doi.org/10.1002/sec.1492},
doi = {10.1002/SEC.1492},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scn/ChenSZWY16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XingWWCYTG16,
author = {Qianqian Xing and
Baosheng Wang and
Xiaofeng Wang and
Peixin Chen and
Bo Yu and
Yong Tang and
Xianming Gao},
editor = {Jinjun Chen and
Laurence T. Yang},
title = {Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID
Security},
booktitle = {18th {IEEE} International Conference on High Performance Computing
and Communications; 14th {IEEE} International Conference on Smart
City; 2nd {IEEE} International Conference on Data Science and Systems,
HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
pages = {430--437},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0068},
doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0068},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hpcc/XingWWCYTG16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangSWWL15,
author = {Xiaofeng Wang and
Jinshu Su and
Baosheng Wang and
Guojun Wang and
Ho{-}fung Leung},
title = {Trust Description and Propagation System: Semantics and axiomatization},
journal = {Knowl. Based Syst.},
volume = {90},
pages = {81--91},
year = {2015},
url = {https://doi.org/10.1016/j.knosys.2015.09.030},
doi = {10.1016/J.KNOSYS.2015.09.030},
timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/kbs/WangSWWL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuWSR15,
author = {Jinshu Su and
Xiaofeng Wang and
Weisong Shi and
Indrakshi Ray},
title = {Security, trust, and resilience of distributed networks and systems},
journal = {Secur. Commun. Networks},
volume = {8},
number = {10},
pages = {1829--1830},
year = {2015},
url = {https://doi.org/10.1002/sec.1276},
doi = {10.1002/SEC.1276},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scn/SuWSR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
author = {Peixin Chen and
Xiaofeng Wang and
Baokang Zhao and
Hao Sun and
Jinshu Su and
Ilsun You},
editor = {Leonard Barolli and
Fatos Xhafa and
Marek R. Ogiela and
Lidia Ogiela},
title = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
Order Bilinear Groups},
booktitle = {10th International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
4-6, 2015},
pages = {364--369},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/BWCCA.2015.9},
doi = {10.1109/BWCCA.2015.9},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenWWSZ15,
author = {Peixin Chen and
Xiaofeng Wang and
Yilun Wu and
Jinshu Su and
Huan Zhou},
editor = {Indrajit Ray and
Ninghui Li and
Christopher Kruegel},
title = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing
{BGP} Protocol},
booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
Communications Security, Denver, CO, USA, October 12-16, 2015},
pages = {1632--1634},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2810103.2810116},
doi = {10.1145/2810103.2810116},
timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccs/ChenWWSZ15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
editor = {Guojun Wang and
Albert Y. Zomaya and
Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
Kenli Li},
title = {A Hierarchical Identity-Based Signature from Composite Order Bilinear
Groups},
booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {46--56},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-27161-3\_5},
doi = {10.1007/978-3-319-27161-3\_5},
timestamp = {Sat, 06 Aug 2022 22:05:44 +0200},
biburl = {https://dblp.org/rec/conf/ica3pp/ChenWS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuCWS15,
author = {Chengcheng Xu and
Shuhui Chen and
Xiaofeng Wang and
Jinshu Su},
editor = {Guojun Wang and
Albert Y. Zomaya and
Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
Kenli Li},
title = {An Efficient Pre-filter to Accelerate Regular Expression Matching},
booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {111--119},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-27161-3\_10},
doi = {10.1007/978-3-319-27161-3\_10},
timestamp = {Wed, 14 Mar 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ica3pp/XuCWS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15,
author = {Peixin Chen and
Xiaofeng Wang and
Baokang Zhao and
Jinshu Su and
Ilsun You},
editor = {Guojun Wang and
Albert Y. Zomaya and
Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
Kenli Li},
title = {Removing Key Escrow from the {LW-HIBE} Scheme},
booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {593--605},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-27161-3\_54},
doi = {10.1007/978-3-319-27161-3\_54},
timestamp = {Wed, 14 Mar 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ica3pp/ChenWZSY15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15a,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
editor = {Guojun Wang and
Albert Y. Zomaya and
Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
Kenli Li},
title = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud
Storage},
booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9532},
pages = {633--647},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-27161-3\_58},
doi = {10.1007/978-3-319-27161-3\_58},
timestamp = {Wed, 14 Mar 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ica3pp/ChenWS15a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15,
author = {Peige Ren and
Xiaofeng Wang and
Hao Sun and
Fen Xu and
Baokang Zhao and
Chunqing Wu},
editor = {Ismail Khalil and
Erich J. Neuhold and
A Min Tjoa and
Li Da Xu and
Ilsun You},
title = {An Efficient Unsavory Data Detection Method for Internet Big Data},
booktitle = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International
Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference,
{CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October
4-7, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9357},
pages = {213--220},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-24315-3\_21},
doi = {10.1007/978-3-319-24315-3\_21},
timestamp = {Tue, 29 Dec 2020 18:35:00 +0100},
biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWSXZW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RenWZWS15,
author = {Peige Ren and
Xiaofeng Wang and
Baokang Zhao and
Chunqing Wu and
Hao Sun},
title = {OpenSRN: {A} software-defined semantic routing network architecture},
booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
Workshops, Hong Kong, China, April 26 - May 1, 2015},
pages = {101--102},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/INFCOMW.2015.7179363},
doi = {10.1109/INFCOMW.2015.7179363},
timestamp = {Wed, 27 Jul 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/infocom/RenWZWS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
author = {Hao Sun and
Xiaofeng Wang and
Jinshu Su and
Peixin Chen},
editor = {Bhavani Thuraisingham and
XiaoFeng Wang and
Vinod Yegneswaran},
title = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
booktitle = {Security and Privacy in Communication Networks - 11th International
Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
Revised Selected Papers},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {164},
pages = {157--174},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-28865-9\_9},
doi = {10.1007/978-3-319-28865-9\_9},
timestamp = {Wed, 29 Jun 2022 15:37:43 +0200},
biburl = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/Chen0S15,
author = {Peixin Chen and
Xiaofeng Wang and
Jinshu Su},
title = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection},
booktitle = {International Symposium on Security and Privacy in Social Networks
and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
pages = {72--79},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/SocialSec2015.11},
doi = {10.1109/SOCIALSEC2015.11},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/socialsec/Chen0S15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15,
author = {Yue{-}Bin Luo and
Baosheng Wang and
Xiaofeng Wang and
Xiao{-}Feng Hu and
Gui{-}Lin Cai and
Hao Sun},
title = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and
External Adversaries},
booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
2015, Volume 1},
pages = {263--270},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/Trustcom.2015.383},
doi = {10.1109/TRUSTCOM.2015.383},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/LuoWWHCS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SuCZWY14,
author = {Jinshu Su and
Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Ilsun You},
title = {ePASS: An expressive attribute-based signature scheme with privacy
and an unforgeability guarantee for the Internet of Things},
journal = {Future Gener. Comput. Syst.},
volume = {33},
pages = {11--18},
year = {2014},
url = {https://doi.org/10.1016/j.future.2013.10.016},
doi = {10.1016/J.FUTURE.2013.10.016},
timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/SuCZWY14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
author = {Yanpeng Ma and
Xiaofeng Wang and
Jinshu Su and
Chunqing Wu and
Wanrong Yu and
Baokang Zhao},
title = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
Satellite Constellation Networks},
journal = {J. Networks},
volume = {9},
number = {4},
pages = {896--907},
year = {2014},
url = {https://doi.org/10.4304/jnw.9.4.896-907},
doi = {10.4304/JNW.9.4.896-907},
timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jnw/MaWSWYZ14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangZSZY14,
author = {Xiaofeng Wang and
Huan Zhou and
Jinshu Su and
Bofeng Zhang and
Fan Yang},
editor = {Gail{-}Joon Ahn and
Moti Yung and
Ninghui Li},
title = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol
with Full Compliance to {TCP/IP}},
booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
pages = {1520--1522},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2660267.2662371},
doi = {10.1145/2660267.2662371},
timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccs/WangZSZY14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14,
author = {Peige Ren and
Xiaofeng Wang and
Chunqing Wu and
Baokang Zhao and
Hao Sun},
editor = {Linawati and
Made Sudiana Mahendra and
Erich J. Neuhold and
A Min Tjoa and
Ilsun You},
title = {A Semantic-Based Malware Detection System Design Based on Channels},
booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International
Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8407},
pages = {653--662},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-642-55032-4\_67},
doi = {10.1007/978-3-642-55032-4\_67},
timestamp = {Tue, 14 May 2019 10:00:38 +0200},
biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWWZS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14,
author = {Peige Ren and
Xiaofeng Wang and
Hao Sun and
Baokang Zhao and
Chunqing Wu},
editor = {Linawati and
Made Sudiana Mahendra and
Erich J. Neuhold and
A Min Tjoa and
Ilsun You},
title = {An Efficient Semantic-Based Organization and Similarity Search Method
for Internet Data Resources},
booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International
Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8407},
pages = {663--673},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-642-55032-4\_68},
doi = {10.1007/978-3-642-55032-4\_68},
timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWSZW14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LuWZWS13,
author = {Huabiao Lu and
Xiaofeng Wang and
Baokang Zhao and
Fei Wang and
Jinshu Su},
title = {ENDMal: An anti-obfuscation and collaborative malware detection system
using syscall sequences},
journal = {Math. Comput. Model.},
volume = {58},
number = {5-6},
pages = {1140--1154},
year = {2013},
url = {https://doi.org/10.1016/j.mcm.2013.03.008},
doi = {10.1016/J.MCM.2013.03.008},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/mcm/LuWZWS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/CaoZSWW13,
author = {Dan Cao and
Baokang Zhao and
Jinshu Su and
Baosheng Wang and
Xiaofeng Wang},
title = {A privacy preserving authentication scheme with flexible identity
revocation in people-centric sensing},
journal = {Math. Comput. Model.},
volume = {58},
number = {5-6},
pages = {1175--1188},
year = {2013},
url = {https://doi.org/10.1016/j.mcm.2013.02.007},
doi = {10.1016/J.MCM.2013.02.007},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/mcm/CaoZSWW13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
author = {Huabiao Lu and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su},
editor = {Khabib Mustofa and
Erich J. Neuhold and
A Min Tjoa and
Edgar R. Weippl and
Ilsun You},
title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
Signature Generation},
booktitle = {Information and Communicatiaon Technology - International Conference,
ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7804},
pages = {271--284},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-36818-9\_28},
doi = {10.1007/978-3-642-36818-9\_28},
timestamp = {Sun, 02 Nov 2025 21:27:51 +0100},
biburl = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWHWZ13,
author = {Dan Zhao and
Chunqing Wu and
Xiaofeng Hu and
Xiaofeng Wang and
Baokang Zhao},
title = {Characterization of {OSPF} Convergence with Correlated Failures},
booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
Symposium on Parallel and Distributed Processing with Applications,
{ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
pages = {1351--1356},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/TrustCom.2013.162},
doi = {10.1109/TRUSTCOM.2013.162},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/ZhaoWHWZ13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaPWZSW13,
author = {Yanpeng Ma and
Wei Peng and
Xiaofeng Wang and
Baokang Zhao and
Jinshu Su and
Chunqing Wu},
title = {A Location Management Algorithm for {LEO} Satellite Networks},
booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
Symposium on Parallel and Distributed Processing with Applications,
{ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
pages = {1362--1366},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/TrustCom.2013.164},
doi = {10.1109/TRUSTCOM.2013.164},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/MaPWZSW13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icoc/2013,
editor = {Jinshu Su and
Baokang Zhao and
Zhigang Sun and
Xiaofeng Wang and
Fei Wang and
Ke Xu},
title = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
Papers},
series = {Communications in Computer and Information Science},
volume = {401},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-53959-6},
doi = {10.1007/978-3-642-53959-6},
isbn = {978-3-642-53958-9},
timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icoc/2013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/WangWWS12,
author = {Fei Wang and
Hailong Wang and
Xiaofeng Wang and
Jinshu Su},
title = {A new multistage approach to detect subtle DDoS attacks},
journal = {Math. Comput. Model.},
volume = {55},
number = {1-2},
pages = {198--213},
year = {2012},
url = {https://doi.org/10.1016/j.mcm.2011.02.025},
doi = {10.1016/J.MCM.2011.02.025},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/mcm/WangWWS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/CaoZWS12,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su},
title = {Flexible multi-authority attribute-based signature schemes for expressive
policy},
journal = {Mob. Inf. Syst.},
volume = {8},
number = {3},
pages = {255--274},
year = {2012},
url = {https://doi.org/10.3233/MIS-2012-0142},
doi = {10.3233/MIS-2012-0142},
timestamp = {Wed, 06 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/mis/CaoZWS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangLS12,
author = {Xiaofeng Wang and
Ling Liu and
Jinshu Su},
title = {{RLM:} {A} General Model for Trust Representation and Aggregation},
journal = {{IEEE} Trans. Serv. Comput.},
volume = {5},
number = {1},
pages = {131--143},
year = {2012},
url = {https://doi.org/10.1109/TSC.2010.56},
doi = {10.1109/TSC.2010.56},
timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tsc/WangLS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MaSWSWYZH12,
author = {Yanpeng Ma and
Jinshu Su and
Chunqing Wu and
Xiaofeng Wang and
Wanrong Yu and
Baokang Zhao and
Xiaofeng Hu},
editor = {Ilsun You and
Leonard Barolli and
Antonio Gentile and
Hae{-}Duck Joshua Jeong and
Marek R. Ogiela and
Fatos Xhafa},
title = {A Distribute and Geographic Information Based Routing Algorithm for
{LEO} Satellite Constellation Networks},
booktitle = {Sixth International Conference on Innovative Mobile and Internet Services
in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
pages = {433--438},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/IMIS.2012.74},
doi = {10.1109/IMIS.2012.74},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/imis/MaSWSWYZH12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HanWWW12,
author = {Zilong Han and
Xiaofeng Wang and
Fei Wang and
Yongjun Wang},
title = {Collaborative detection of DDoS attacks based on chord protocol},
booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
{MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
/ Workshops},
pages = {1--4},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/MASS.2012.6708531},
doi = {10.1109/MASS.2012.6708531},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mass/HanWWW12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
author = {Fei Wang and
Xiaofeng Wang and
Xiaofeng Hu and
Jinshu Su},
title = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
anomaly detection},
booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
{MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
/ Workshops},
pages = {1--4},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/MASS.2012.6708530},
doi = {10.1109/MASS.2012.6708530},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mass/WangWHS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/music/MaSWWYZH12,
author = {Yanpeng Ma and
Jinshu Su and
Chunqing Wu and
Xiaofeng Wang and
Wanrong Yu and
Baokang Zhao and
Xiaofeng Hu},
title = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation
Networks},
booktitle = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent
Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012},
pages = {240--245},
publisher = {{IEEE}},
year = {2012},
url = {https://doi.org/10.1109/MUSIC.2012.49},
doi = {10.1109/MUSIC.2012.49},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/music/MaSWWYZH12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
author = {Fei Wang and
Xiaofeng Wang and
Jinshu Su and
Bin Xiao},
editor = {Geyong Min and
Yulei Wu and
Lei (Chris) Liu and
Xiaolong Jin and
Stephen A. Jarvis and
Ahmed Yassin Al{-}Dubai},
title = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
Victim Identification},
booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2012, Liverpool, United
Kingdom, June 25-27, 2012},
pages = {215--222},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/TrustCom.2012.295},
doi = {10.1109/TRUSTCOM.2012.295},
timestamp = {Tue, 25 Feb 2025 09:21:51 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/0007WSX12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangYBS11,
author = {Xiaofeng Wang and
Chee Shin Yeo and
Rajkumar Buyya and
Jinshu Su},
title = {Optimizing the makespan and reliability for workflow applications
with reputation and a look-ahead genetic algorithm},
journal = {Future Gener. Comput. Syst.},
volume = {27},
number = {8},
pages = {1124--1134},
year = {2011},
url = {https://doi.org/10.1016/j.future.2011.03.008},
doi = {10.1016/J.FUTURE.2011.03.008},
timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/WangYBS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/CaoZWSJ11,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su and
Guofei Ji},
editor = {Fatos Xhafa and
Leonard Barolli and
Mario K{\"{o}}ppen},
title = {Multi-authority Attribute-Based Signature},
booktitle = {2011 Third International Conference on Intelligent Networking and
Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
2, 2011},
pages = {668--672},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/INCoS.2011.122},
doi = {10.1109/INCOS.2011.122},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/incos/CaoZWSJ11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/CaoZWSC11,
author = {Dan Cao and
Baokang Zhao and
Xiaofeng Wang and
Jinshu Su and
Yijiao Chen},
editor = {Leonard Barolli and
Fatos Xhafa and
Makoto Takizawa},
title = {Authenticating with Attributes in Online Social Networks},
booktitle = {The 14th International Conference on Network-Based Information Systems,
NBiS 2011, Tirana, Albania, September 7-9, 2011},
pages = {607--611},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/NBiS.2011.102},
doi = {10.1109/NBIS.2011.102},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nbis/CaoZWSC11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/YuLLWS10,
author = {Jie Yu and
Liming Lu and
Zhoujun Li and
Xiaofeng Wang and
Jinshu Su},
title = {A Simple Effective Scheme to Enhance the Capability of Web Servers
Using {P2P} Networks},
booktitle = {39th International Conference on Parallel Processing, {ICPP} 2010,
San Diego, California, USA, 13-16 September 2010},
pages = {680--689},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/ICPP.2010.76},
doi = {10.1109/ICPP.2010.76},
timestamp = {Fri, 14 Apr 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icpp/YuLLWS10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/WangYBS09,
author = {Xiaofeng Wang and
Chee Shin Yeo and
Rajkumar Buyya and
Jinshu Su},
editor = {Irfan Awan and
Muhammad Younas and
Takahiro Hara and
Arjan Durresi},
title = {Reliability-Driven Reputation Based Scheduling for Public-Resource
Computing Using {GA}},
booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking
and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
2009},
pages = {411--418},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/AINA.2009.21},
doi = {10.1109/AINA.2009.21},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/aina/WangYBS09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/WangBS09,
author = {Xiaofeng Wang and
Rajkumar Buyya and
Jinshu Su},
editor = {Franck Cappello and
Cho{-}Li Wang and
Rajkumar Buyya},
title = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using
Max-Min Strategy},
booktitle = {9th {IEEE/ACM} International Symposium on Cluster Computing and the
Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009},
pages = {108--115},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/CCGRID.2009.14},
doi = {10.1109/CCGRID.2009.14},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccgrid/WangBS09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/OuWHW09,
author = {Wei Ou and
Xiaofeng Wang and
Wenbao Han and
Yongjun Wang},
title = {Research on Trust Evaluation Model Based on {TPM}},
booktitle = {Fourth International Conference on Frontier of Computer Science and
Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
pages = {593--597},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/FCST.2009.10},
doi = {10.1109/FCST.2009.10},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/fcst/OuWHW09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.