Guangquan Xu

Orcid: 0000-0001-8701-3944

According to our database1, Guangquan Xu authored at least 159 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing human-machine pair inspection with risk number and code inspection diagram.
Softw. Qual. J., September, 2024

ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI.
ACM Trans. Knowl. Discov. Data, August, 2024

An Online Robust Resource Allocation Algorithm for Mobile Edge Computing.
IEEE Wirel. Commun. Lett., July, 2024

Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks.
IEEE Internet Things J., July, 2024

MRFS: Mining Rating Fraud Subgraph in Bipartite Graph for Users and Products.
IEEE Trans. Comput. Soc. Syst., June, 2024

OFEI: A Semi-Black-Box Android Adversarial Sample Attack Framework Against DLaaS.
IEEE Trans. Computers, April, 2024

Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024

NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification.
Int. J. Softw. Eng. Knowl. Eng., February, 2024

Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi.
IEEE Trans. Inf. Forensics Secur., 2024

ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK.
IEEE Trans. Dependable Secur. Comput., 2024

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024

A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems.
IEEE Internet Things J., 2024

Towards privacy-preserving and efficient word vector learning for lightweight IoT devices.
Digit. Commun. Networks, 2024

The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024

Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

AEGAN: A Novel Machine Learning Model to Attribute Network Community Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024

Improving Distinguishability of Class for Graph Neural Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023

Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection.
Digit. Commun. Networks, October, 2023

GenDroid: A query-efficient black-box android adversarial attack framework.
Comput. Secur., September, 2023

PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.
Trans. Emerg. Telecommun. Technol., May, 2023

ASQ-FastBM3D: An Adaptive Denoising Framework for Defending Adversarial Attacks in Machine Learning Enabled Systems.
IEEE Trans. Reliab., March, 2023

A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain.
IEEE J. Biomed. Health Informatics, February, 2023

Local node feature modeling for edge computing based on network embedding in dynamic networks.
J. Parallel Distributed Comput., January, 2023

Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023

Utilizing Risk Number and Program Slicing to Improve Human-Machine Pair Inspection.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
CPFL: An Effective Secure Cognitive Personalized Federated Learning Mechanism for Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

A Feature Discretization Method Based on Fuzzy Rough Sets for High-Resolution Remote Sensing Big Data Under Linear Spectral Model.
IEEE Trans. Fuzzy Syst., 2022

JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers.
IEEE Trans. Dependable Secur. Comput., 2022

JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications.
Mob. Networks Appl., 2022

DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling.
IEEE J. Sel. Areas Commun., 2022

SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles.
J. Parallel Distributed Comput., 2022

Heterogeneous Information Network Representation Learning Incorporating Community Structure.
IEEE Access, 2022

Verifying and Improving Neural Networks Using Testing-Based Formal Verification.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2022

A Holistic Client Selection Scheme in Federated Mobile CrowdSensing Based on Reverse Auction.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.
IEEE Trans. Netw. Sci. Eng., 2021

Sparse Trust Data Mining.
IEEE Trans. Inf. Forensics Secur., 2021

Generalized Centered 2-D Principal Component Analysis.
IEEE Trans. Cybern., 2021

Dynamic Study of Intelligent Traffic Behaviour Based on Multiple Traffic Modes.
Sci. Program., 2021

FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services.
Secur. Commun. Networks, 2021

TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems.
IEEE Internet Things J., 2021

Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation.
Future Gener. Comput. Syst., 2021

Analysis of 5G academic Network based on graph representation learning method.
CoRR, 2021

SG-PBFT: a Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Internet of Vehicles.
CoRR, 2021

A network security situation assessment method based on adversarial deep learning.
Appl. Soft Comput., 2021

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

MFF-AMD: Multivariate Feature Fusion for Android Malware Detection.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks.
IEEE Wirel. Commun., 2020

SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation.
ACM Trans. Internet Techn., 2020

Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things.
IEEE Trans. Ind. Informatics, 2020

A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.
IEEE Trans. Ind. Informatics, 2020

An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.
IEEE Trans. Ind. Informatics, 2020

Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things.
Secur. Commun. Networks, 2020

A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020

An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems.
IEEE Netw., 2020

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020

Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020

SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020

Integrating NFV and ICN for Advanced Driver-Assistance Systems.
IEEE Internet Things J., 2020

Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing.
IEEE Internet Things J., 2020

Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies.
Enterp. Inf. Syst., 2020

SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020

Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Comput. Secur., 2020

Security analysis of indistinguishable obfuscation for internet of medical things applications.
Comput. Commun., 2020

BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs.
IEEE Commun. Mag., 2020

A Variational Generative Network Based Network Threat Situation Assessment.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Fuzzy Petri Nets Based Information System Security Situation Assessment Model.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Video Investigation Analysis System Enhanced by Explicable Model.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Analysis Model of Node Failures and Impact for AANET.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Defending Use-After-Free via Relationship Between Memory and Pointer.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Anonymous three-factor authenticated key agreement for wireless sensor networks.
Wirel. Networks, 2019

Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol., 2019

SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Syst. J., 2019

EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare.
IEEE Netw., 2019

Consumers Team Detection Model Based on Trust for Multi-Level.
Mob. Inf. Syst., 2019

A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model.
J. Organ. End User Comput., 2019

UAV-enabled friendly jamming scheme to secure industrial Internet of Things.
J. Commun. Networks, 2019

CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019

Spatio-temporal deep learning method for ADHD fMRI classification.
Inf. Sci., 2019

E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.
IEEE Internet Things J., 2019

Polynomial-based modifiable blockchain structure for removing fraud transactions.
Future Gener. Comput. Syst., 2019

One-round provably secure yoking-proof for RFID applications.
Concurr. Comput. Pract. Exp., 2019

DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.
IEEE Access, 2019

UAV Autonomous Target Search Based on Deep Reinforcement Learning in Complex Disaster Scene.
IEEE Access, 2019

Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access, 2019

Inferring Patterns for Taint-Style Vulnerabilities With Security Patches.
IEEE Access, 2019

A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.
IEEE Access, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019

Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019

Multi-Layer Network Local Community Detection Based on Influence Relation.
IEEE Access, 2019

Data Collection in Underwater Sensor Networks based on Mobile Edge Computing.
IEEE Access, 2019

An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.
Proceedings of the Network and System Security - 13th International Conference, 2019

SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Community detection for multi-layer social network based on local random walk.
J. Vis. Commun. Image Represent., 2018

Scalable platforms and advanced algorithms for IoT and cyber-enabled applications.
J. Parallel Distributed Comput., 2018

TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting.
J. Parallel Distributed Comput., 2018

A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks.
J. Netw. Comput. Appl., 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems.
CoRR, 2018

EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network.
Comput. Networks, 2018

A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid.
Proceedings of the 2018 IEEE SmartWorld, 2018

SoProtector: Securing Native C/C++ Libraries for Mobile Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multim. Tools Appl., 2017

Exploring Intracity Taxi Mobility during the Holidays for Location-Based Marketing.
Mob. Inf. Syst., 2017

Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks.
IEEE Multim., 2017

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Gener. Comput. Syst., 2017

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017

One-Round Provably Secure Yoking-Proof for RFID Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Automated Software Security Requirements Recommendation Based on FT-SR Model.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature.
Proceedings of the International Conference on Networking and Network Applications, 2017

An Efficient Critical Incident Propagation Model for Social Networks Based on Trust Factor.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
Int. J. Softw. Eng. Knowl. Eng., 2016

Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Trans. Inf. Syst., 2016

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Universal Analysis and Detection Framework for Location Aided Routing.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016

2015
HyCPK: Securing Identity Authentication in Ubiquitous Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

PEM4RFID: Privacy Enhancement Model for RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Towards Trustworthy Participants in Social Participatory Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Unified threat model for analyzing and evaluating software threats.
Secur. Commun. Networks, 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Appl. Math., 2014

An approach to facial expression analysis with multi-model interactions.
Int. J. Comput. Math., 2014

Attack Tree Based Android Malware Detection with Hybrid Analysis.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mining Specification of Insecure Browser Extension Behavior.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Hybrid Detection Using Permission Analysis for Android Malware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Pers. Ubiquitous Comput., 2013

On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Pers. Ubiquitous Comput., 2013

Data Interpolating over RFID Data Streams for Missed Readings.
Proceedings of the Web-Age Information Management, 2013

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013

2012
Facial Expressions Analysis Based on Cooperative Neuro-computing Interactions.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2009
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
On the Trust Decision in Virtual Society: Using the Least Point Principle in Dempster-Shafer Theory of Belief Functions.
Proceedings of the Fourth International Conference on Natural Computation, 2008

The Automatic Formation of Agent Societies: A Service-Driven Approach.
Proceedings of the ALPIT 2008, 2008

2007
Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions.
Int. J. Electron. Commer., 2007

An Improvement of Coleman Model of Trust: Using FNHMS to Manage Reputation in Multi-agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

A Fuzzy Extension of OWL for Vague Knowledge.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...