Guosheng Xu
Orcid: 0000-0002-3310-926XAffiliations:
- Beijing University of Posts and Telecommunications, Beijing, China
According to our database1,
Guosheng Xu
authored at least 45 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards.
CoRR, 2024
CoRR, 2024
Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Intelligent Information Processing XII, 2024
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT.
IEEE Internet Things J., August, 2023
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023
2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET.
KSII Trans. Internet Inf. Syst., 2022
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022
Proceedings of the Theoretical Aspects of Software Engineering, 2022
2021
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
Secur. Commun. Networks, 2021
A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier.
Inf. Technol. Control., 2021
Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
2020
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
Wirel. Commun. Mob. Comput., 2020
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
IACR Cryptol. ePrint Arch., 2020
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020
2019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
KSII Trans. Internet Inf. Syst., 2019
IEEE Access, 2019
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map.
IEEE Access, 2019
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
2018
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018
IEEE Access, 2018
2013
2012
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007