Guangxia Xu

Orcid: 0000-0002-9010-2443

According to our database1, Guangxia Xu authored at least 63 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext.
Frontiers Comput. Sci., February, 2025

2024
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS.
J. Signal Process. Syst., March, 2024

Blockchain-Based Certificate-Free Cross-Domain Authentication Mechanism for Industrial Internet.
IEEE Internet Things J., January, 2024

ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024

A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks.
Veh. Commun., 2024

An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2024

DID-HVC-based Web3 healthcare data security and privacy protection scheme.
Future Gener. Comput. Syst., 2024

A survey of the fusion of traditional data security technology and blockchain.
Expert Syst. Appl., 2024

2023
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network.
J. Cloud Comput., December, 2023

A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023

A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing.
IEEE Internet Things J., July, 2023

TS-REPLICA: A novel replica placement algorithm based on the entropy weight TOPSIS method in spark for multimedia data analysis.
Inf. Sci., May, 2023

FedGR: Federated Graph Neural Network for Recommendation Systems.
Axioms, February, 2023

A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

An improved efficient identity-based quantum signature scheme.
Quantum Inf. Process., 2023

A Blockchain-Based Federated Learning Scheme for Data Sharing in Industrial Internet of Things.
IEEE Internet Things J., 2023

Aliasing black box adversarial attack with joint self-attention distribution and confidence probability.
Expert Syst. Appl., 2023

Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption.
Int. J. Intell. Syst., December, 2022

An Advancing Temporal Convolutional Network for 5G Latency Services via Automatic Modulation Recognition.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A Novel Blind High-Order Modulation Classifier Using Accumulated Constellation Temporal Convolution for OSTBC-OFDM Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A novel logistics data privacy protection method based on blockchain.
Multim. Tools Appl., 2022

An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Contract Vulnerability Detection Model Based on Siamese Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User Credit.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention.
Secur. Commun. Networks, 2021

A certificateless encryption scheme based on blockchain.
Peer-to-Peer Netw. Appl., 2021

Cross-domain sentiment aware word embeddings for review sentiment analysis.
Int. J. Mach. Learn. Cybern., 2021

Towards link inference attack against network structure perturbation.
Knowl. Based Syst., 2021

Secure and smart autonomous multi-robot systems for opinion spammer detection.
Inf. Sci., 2021

DeepEC: Adversarial attacks against graph structure prediction models.
Neurocomputing, 2021

Fixed degree of decentralization DPoS consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value.
Comput. Networks, 2021

EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

EPSTO-ARIMA: Electric Power Stochastic Optimization Predicting Based on ARIMA.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

2020
Improvement of the DPoS Consensus Mechanism in Blockchain Based on Vague Sets.
IEEE Trans. Ind. Informatics, 2020

A Community Detection Method Based on Local Optimization in Social Networks.
IEEE Netw., 2020

A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification.
Inf. Sci., 2020

A social emotion classification approach using multi-model fusion.
Future Gener. Comput. Syst., 2020

A Novel Configuration Tuning Method Based on Feature Selection for Hadoop MapReduce.
IEEE Access, 2020

2019
A Collaborative Filtering Recommendation Algorithm Based on User Confidence and Time Context.
J. Electr. Comput. Eng., 2019

Structural Predictability Optimization Against Inference Attacks in Data Publishing.
IEEE Access, 2019

UAV's Agricultural Image Segmentation Predicated by Clifford Geometric Algebra.
IEEE Access, 2019

Document Context-Aware Social Recommendation Method.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Detecting review spammer groups in dynamic review networks.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
SDN-Based Data Transfer Security for Internet of Things.
IEEE Internet Things J., 2018

An Anomaly Detector Deployment Awareness Detection Framework Based on Multi-Dimensional Resources Balancing in Cloud Platform.
IEEE Access, 2018

A Focused Crawler Model Based on Mutation Improving Particle Swarm Optimization Algorithm.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVM.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
A Survey for Mobility Big Data Analytics for Geolocation Prediction.
IEEE Wirel. Commun., 2017

2016
Chaotic map-based time-aware multi-keyword search scheme with designated server.
Wirel. Commun. Mob. Comput., 2016

A data privacy protective mechanism for wireless body area networks.
Wirel. Commun. Mob. Comput., 2016

An improved social spammer detection based on tri-training.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Detecting spammers on social networks based on a hybrid model.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2014
Swap-aware garbage collection algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2014

CLRU: a new page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2014

A Secure Transmission Protocol for Wireless Body Sensor Networks.
J. Softw., 2014

An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks.
J. Networks, 2014

An Improved Mix Transmission Algorithm for Privacy-Preserving.
J. Networks, 2014

2013
A Metadata-driven Cloud Computing Application Virtualization Model.
J. Comput., 2013

A Secure Data Transmission Scheme for Body Sensor Network.
J. Commun., 2013

2012
Garbage collection policy to improve durability for flash memory.
IEEE Trans. Consumer Electron., 2012


  Loading...