Guoai Xu
Orcid: 0000-0002-9582-0698
According to our database1,
Guoai Xu
authored at least 104 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Comput. Commun., 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Intelligent Information Processing XII, 2024
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Syst. J., 2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things.
Pervasive Mob. Comput., 2022
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET.
KSII Trans. Internet Inf. Syst., 2022
J. Inf. Secur. Appl., 2022
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022
CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network.
IEEE Internet Things J., 2022
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
2021
Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre.
Wirel. Commun. Mob. Comput., 2021
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
Secur. Commun. Networks, 2021
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference.
Secur. Commun. Networks, 2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021
A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier.
Inf. Technol. Control., 2021
IEEE Internet Things J., 2021
Empir. Softw. Eng., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021
2020
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
Wirel. Commun. Mob. Comput., 2020
CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System.
IEEE Trans. Ind. Informatics, 2020
Secur. Commun. Networks, 2020
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
IACR Cryptol. ePrint Arch., 2020
Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2019
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
KSII Trans. Internet Inf. Syst., 2019
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map.
IEEE Access, 2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
Artificial Intelligence and Game Theory Based Security Strategies and Application Cases for Internet of Vehicles.
Proceedings of the Communications, Signal Processing, and Systems, 2019
2018
Wirel. Pers. Commun., 2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018
Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol.
Int. J. Commun. Syst., 2018
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the 15th International Conference on Mining Software Repositories, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017
Int. J. Commun. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2013
Int. J. Distributed Sens. Networks, 2013
2012
Construction of distributed LDoS attack based on one-dimensional random walk algorithm.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010