Changxiang Shen

Orcid: 0009-0007-7840-0337

According to our database1, Changxiang Shen authored at least 28 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Efficient privacy-preserving federated logistic regression with poor-quality users.
Peer Peer Netw. Appl., February, 2025

2024
Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion.
Comput. Secur., 2024

2023
A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
A dual-system trusted computing node construction method based on ARM multi-core CPU architecture.
Concurr. Comput. Pract. Exp., 2022

2020
Establish a scientific concept of network security and build a strong defense line of network security.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

2019
New Algorithms for Counting Temporal Graph Pattern.
Symmetry, 2019

TM-Miner: TFS-Based Algorithm for Mining Temporal Motifs in Large Temporal Network.
IEEE Access, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

Video Subtitle Location and Recognition Based on Edge Features.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

2014
Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay.
Appl. Math. Comput., 2014

2012
Equivalent Inner Key Recovery Attack to NMAC.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
Edge Self-Monitoring for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Beyond rigidity: obtain localisability with noisy ranging measurement.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Breaking H<sup>2</sup>-MAC Using Birthday Paradox.
IACR Cryptol. ePrint Arch., 2011

On the Security of NMAC and Its Variants.
IACR Cryptol. ePrint Arch., 2011

2010
Research on trusted computing and its development.
Sci. China Inf. Sci., 2010

Formal Definitions for Trust in Trusted Computing.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

2009
A Feather-Weight Application Isolation Model.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
Barrier Coverage with Mobile Sensors.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

The Banknote Anti-forgery System Based on Digital Signature Algorithms.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Survey of information security.
Sci. China Ser. F Inf. Sci., 2007

Design of secure operating systems with high security levels.
Sci. China Ser. F Inf. Sci., 2007

Analysis of Electronic Voting with Different Stage.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Trust Extended Dynamic Security Model and Its Application in Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Research on Applying Java Card to Database Encryption Systems.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006


  Loading...