Guangquan Xu
Orcid: 0000-0001-8701-3944
According to our database1,
Guangquan Xu
authored at least 159 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing human-machine pair inspection with risk number and code inspection diagram.
Softw. Qual. J., September, 2024
ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI.
ACM Trans. Knowl. Discov. Data, August, 2024
IEEE Wirel. Commun. Lett., July, 2024
Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks.
IEEE Internet Things J., July, 2024
IEEE Trans. Comput. Soc. Syst., June, 2024
IEEE Trans. Computers, April, 2024
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification.
Int. J. Softw. Eng. Knowl. Eng., February, 2024
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi.
IEEE Trans. Inf. Forensics Secur., 2024
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK.
IEEE Trans. Dependable Secur. Comput., 2024
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024
IEEE Internet Things J., 2024
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices.
Digit. Commun. Networks, 2024
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection.
Digit. Commun. Networks, October, 2023
Comput. Secur., September, 2023
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.
Trans. Emerg. Telecommun. Technol., May, 2023
ASQ-FastBM3D: An Adaptive Denoising Framework for Defending Adversarial Attacks in Machine Learning Enabled Systems.
IEEE Trans. Reliab., March, 2023
IEEE J. Biomed. Health Informatics, February, 2023
Local node feature modeling for edge computing based on network embedding in dynamic networks.
J. Parallel Distributed Comput., January, 2023
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
CPFL: An Effective Secure Cognitive Personalized Federated Learning Mechanism for Industry 4.0.
IEEE Trans. Ind. Informatics, 2022
A Feature Discretization Method Based on Fuzzy Rough Sets for High-Resolution Remote Sensing Big Data Under Linear Spectral Model.
IEEE Trans. Fuzzy Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications.
Mob. Networks Appl., 2022
DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling.
IEEE J. Sel. Areas Commun., 2022
SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles.
J. Parallel Distributed Comput., 2022
Heterogeneous Information Network Representation Learning Incorporating Community Structure.
IEEE Access, 2022
Proceedings of the Structured Object-Oriented Formal Language and Method, 2022
A Holistic Client Selection Scheme in Federated Mobile CrowdSensing Based on Reverse Auction.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
Sci. Program., 2021
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services.
Secur. Commun. Networks, 2021
TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems.
IEEE Internet Things J., 2021
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation.
Future Gener. Comput. Syst., 2021
CoRR, 2021
SG-PBFT: a Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Internet of Vehicles.
CoRR, 2021
Appl. Soft Comput., 2021
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
2020
IEEE Wirel. Commun., 2020
ACM Trans. Internet Techn., 2020
Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things.
IEEE Trans. Ind. Informatics, 2020
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.
IEEE Trans. Ind. Informatics, 2020
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Comput. Soc. Syst., 2020
ACM Trans. Cyber Phys. Syst., 2020
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things.
Secur. Commun. Networks, 2020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020
An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems.
IEEE Netw., 2020
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020
Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies.
Enterp. Inf. Syst., 2020
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020
Comput. Secur., 2020
Security analysis of indistinguishable obfuscation for internet of medical things applications.
Comput. Commun., 2020
IEEE Commun. Mag., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Wirel. Networks, 2019
ACM Trans. Intell. Syst. Technol., 2019
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019
Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Syst. J., 2019
IEEE Netw., 2019
J. Organ. End User Comput., 2019
J. Commun. Networks, 2019
CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Access, 2019
UAV Autonomous Target Search Based on Deep Reinforcement Learning in Complex Disaster Scene.
IEEE Access, 2019
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access, 2019
IEEE Access, 2019
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.
IEEE Access, 2019
IEEE Access, 2019
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
J. Vis. Commun. Image Represent., 2018
J. Parallel Distributed Comput., 2018
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting.
J. Parallel Distributed Comput., 2018
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks.
J. Netw. Comput. Appl., 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems.
CoRR, 2018
EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network.
Comput. Networks, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multim. Tools Appl., 2017
Mob. Inf. Syst., 2017
IEEE Multim., 2017
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Gener. Comput. Syst., 2017
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017
POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017
HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature.
Proceedings of the International Conference on Networking and Network Applications, 2017
An Efficient Critical Incident Propagation Model for Social Networks Based on Trust Factor.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
Int. J. Softw. Eng. Knowl. Eng., 2016
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Trans. Inf. Syst., 2016
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
Proceedings of the Incentives and Trust in Electronic Communities, 2016
2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2014
Secur. Commun. Networks, 2014
J. Appl. Math., 2014
Int. J. Comput. Math., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Pers. Ubiquitous Comput., 2013
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Pers. Ubiquitous Comput., 2013
Proceedings of the Web-Age Information Management, 2013
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013
2012
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012
PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
On the Trust Decision in Virtual Society: Using the Least Point Principle in Dempster-Shafer Theory of Belief Functions.
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the ALPIT 2008, 2008
2007
Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions.
Int. J. Electron. Commer., 2007
An Improvement of Coleman Model of Trust: Using FNHMS to Manage Reputation in Multi-agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007