Gongxuan Zhang

Orcid: 0000-0003-2925-5624

According to our database1, Gongxuan Zhang authored at least 101 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning.
Knowl. Based Syst., 2024

A gene-inspired metaheuristic for scheduling workflow tasks in mobile edge computing-supported cyber-physical systems.
J. Syst. Archit., 2024

2023
Hypergraph-Based Joint Channel and Power Resource Allocation for Cross-Cell M2M Communication in IIoT.
IEEE Internet Things J., September, 2023

LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV.
IEEE Trans Autom. Sci. Eng., April, 2023

APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks.
IEEE Trans. Netw. Sci. Eng., 2023

Traffic-Driven Epidemic Spreading in Networks: Considering the Transition of Infection From Being Mild to Severe.
IEEE Trans. Cybern., 2023

Epidemic spreading in wireless sensor networks with node sleep scheduling.
CoRR, 2023

2022
Deadline and Reliability Aware Multiserver Configuration Optimization for Maximizing Profit.
IEEE Trans. Parallel Distributed Syst., 2022

IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Multiserver Configuration and Request Distribution Framework for Profit Maximization in a Three-Tier Cloud Service Architecture.
J. Circuits Syst. Comput., 2022

A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services.
J. Circuits Syst. Comput., 2022

An approach for unsupervised contextual anomaly detection and characterization.
Intell. Data Anal., 2022

Hypergraph-Based Resource Allocation for Ultra-Dense Wireless Network in Industrial IoT.
IEEE Commun. Lett., 2022

QoE and Reliability-Aware Task Scheduling for Multi-user Mobile-Edge Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
A Distributed Load Balancing Clustering Algorithm for Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics.
Vis. Comput., 2021

EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles.
J. Syst. Archit., 2021

An intelligent and blind dual color image watermarking for authentication and copyright protection.
Appl. Intell., 2021

Security and trust in ubiquitous systems.
Ann. des Télécommunications, 2021

A modified LOF-based approach for outlier characterization in IoT.
Ann. des Télécommunications, 2021

A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks.
Proceedings of the 2021 International Conference on Security, 2021

Lifetime-Driven Scheduling of Security-Critical Internet-of-Things Applications on Real-Time Heterogeneous Multicore Systems.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Power-Efficient Layer Mapping for CNNs on Integrated CPU and GPU Platforms: A Case Study.
Proceedings of the ASPDAC '21: 26th Asia and South Pacific Design Automation Conference, 2021

2020
Customer Perceived Value- and Risk-Aware Multiserver Configuration for Profit Maximization.
IEEE Trans. Parallel Distributed Syst., 2020

A Robust Image Watermarking Approach Using Cycle Variational Autoencoder.
Secur. Commun. Networks, 2020

Robust and hybrid SVD-based image watermarking schemes.
Multim. Tools Appl., 2020

Makespan-Cost-Reliability-Optimized Workflow Scheduling Using Evolutionary Techniques in Clouds.
J. Circuits Syst. Comput., 2020

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020

An outlier ensemble for unsupervised anomaly detection in honeypots data.
Intell. Data Anal., 2020

A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems.
IEEE Access, 2020

Improvements Based on JWT and RBAC for Spring Security Framework.
Proceedings of the Security and Privacy in Digital Economy, 2020

Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing.
Proceedings of the IEEE Global Communications Conference, 2020

Side Channel Leakage Alignment Based on Longest Common Subsequence.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
A trust enhancement scheme for cluster-based wireless sensor networks.
J. Supercomput., 2019

A Participation Degree-Based Fault Detection Method for Wireless Sensor Networks.
Sensors, 2019

DHC: A Distributed Hierarchical Clustering Algorithm for Large Datasets.
J. Circuits Syst. Comput., 2019

A Review of Cost and Makespan-Aware Workflow Scheduling in Clouds.
J. Circuits Syst. Comput., 2019

A Short Review of Security-Aware Techniques in Real-Time Embedded Systems.
J. Circuits Syst. Comput., 2019

A Review of Recent Techniques in Mixed-Criticality Systems.
J. Circuits Syst. Comput., 2019

Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT.
Future Gener. Comput. Syst., 2019

Privacy-aware cross-cloud service recommendations based on Boolean historical invocation records.
EURASIP J. Wirel. Commun. Netw., 2019

Traffic-driven epidemic spreading and its control strategies.
Digit. Commun. Networks, 2019

SeShare: Secure cloud data sharing based on blockchain and public auditing.
Concurr. Comput. Pract. Exp., 2019

Power allocation algorithm based on mixed integer nonlinear programming in WSN.
Clust. Comput., 2019

Game Theoretic Fund Allocation for Maximizing Throughput of Multiserver Systems in Cloud.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
Wirel. Pers. Commun., 2018

Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment.
Wirel. Commun. Mob. Comput., 2018

Cost-Constrained QoS Optimization for Approximate Computation Real-Time Tasks in Heterogeneous MPSoCs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

A New Path-Constrained Rendezvous Planning Approach for Large-Scale Event-Driven Wireless Sensor Networks.
Sensors, 2018

Genetic algorithm for energy-efficient clustering and routing in wireless sensor networks.
J. Syst. Softw., 2018

基于改进支持向量机的无线传感器网络路由优化算法 (Routing Optimization Algorithm of Wireless Sensor Network Based on Improved SVM).
计算机科学, 2018

Thermal-aware correlated two-level scheduling of real-time tasks with reduced processor energy on heterogeneous MPSoCs.
J. Syst. Archit., 2018

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018

Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage.
J. Circuits Syst. Comput., 2018

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code.
KSII Trans. Internet Inf. Syst., 2018

Transmission power control of wireless sensor networks based on optimal connectivity.
Comput. Electr. Eng., 2018

Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.
Proceedings of the IEEE Global Communications Conference, 2018

Variation-aware task allocation and scheduling for improving reliability of real-time MPSoCs.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017

Reliability and temperature constrained task scheduling for makespan minimization on heterogeneous multi-core platforms.
J. Syst. Softw., 2017

A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes.
Int. J. Inf. Secur. Priv., 2017

IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-preserving public auditing for non-manager group.
Proceedings of the IEEE International Conference on Communications, 2017

Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Evolutionary Multi-Objective Workflow Scheduling in Cloud.
IEEE Trans. Parallel Distributed Syst., 2016

A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016

A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

2015
On Further Reduction of Constraints in "Nonpure Petri Net Supervisors for Optimal Deadlock Control of Flexible Manufacturing Systems".
IEEE Trans. Syst. Man Cybern. Syst., 2015

Lexicographic Multiobjective Integer Programming for Optimal and Structurally Minimal Petri Net Supervisors of Automated Manufacturing Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2015

NBC: An Efficient Hierarchical Clustering Algorithm for Large Datasets.
Int. J. Semantic Comput., 2015

Synthesis of Petri net supervisors for FMS via redundant constraint elimination.
Autom., 2015

NNB: An efficient nearest neighbor search method for hierarchical clustering on large datasets.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014

A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol.
J. Networks, 2014

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
KSII Trans. Internet Inf. Syst., 2014

Comments on "Heuristic search for scheduling flexible manufacturing systems using lower bound reachability matrix".
Comput. Ind. Eng., 2014

Search strategy for scheduling flexible manufacturing systems simultaneously using admissible heuristic functions and nonadmissible heuristic functions.
Comput. Ind. Eng., 2014

Heuristic Search for Scheduling Flexible Manufacturing Systems Using Multiple Heuristic Functions.
Proceedings of the Modern Advances in Applied Intelligence, 2014

A New Approach Based on Intelligent Water Drops Algorithm for Node Selection in Service-Oriented Wireless Sensor Networks.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013

Matrix Factorization for User Behavior Analysis of Location-Based Social Network.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013

A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Briareus: Accelerating Python Applications with Cloud.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

Study on dynamic services composition of web services based on BPEL.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Migration Validity of WS-BPEL Instances Revisited.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Hierarchical Clustering Routing Protocol Based on Optimal Load Balancing in Wireless Sensor Networks.
Proceedings of the Advanced Parallel Processing Technologies, 2013

A Cloud Computing System for Snore Signals Processing.
Proceedings of the Advanced Parallel Processing Technologies, 2013

Quantifying Consistency between Conceptual and Executable Business Processes.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Permission Assurance for Semantic Aspects of Design Patterns.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Towards Dynamic Evolution of Service Choreographies.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
ApproxCCA: An approximate correlation analysis algorithm for multidimensional data streams.
Knowl. Based Syst., 2011

A TCM-Enabled Access Control Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2009
Assuring Structural Parallel Programs based on Scoped Permissions.
J. Softw., 2009

2007
A Designing Method for High-Rate Serial Communication.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

2006
Simulation of Customers-flow Model Based-on Elevators Group Control Technique.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Apparatus Realizing Switch of Computing Device Status.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2004
A SOAP-Based Electronic Commerce Security Mechanism.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

2003
Dynamic E-commerce Security Based on the Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Study on CORBA-Based Load Balance Algorithm.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...