Hequn Xian

Orcid: 0000-0002-7538-338X

According to our database1, Hequn Xian authored at least 34 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage.
IEEE Trans. Ind. Informatics, October, 2024

MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification.
IEEE Internet Things J., September, 2024

pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework.
Future Internet, May, 2024

Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification.
IEEE Internet Things J., April, 2024

Biometric identification on the cloud: A more secure and faster construction.
Inf. Sci., 2024

Location Privacy Protection Method with Route Constraints.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

A Distortion Free Watermark Scheme for Relational Databases.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database.
World Wide Web (WWW), July, 2023

A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation.
IEEE Access, 2023

VDCNet: A Vulnerability Detection and Classification System in Cross-Project Scenarios.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

2022
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022

2021
A Graded Reversible Watermarking Scheme for Relational Data.
Mob. Networks Appl., 2021

Secure Encrypted Data Deduplication Based on Data Popularity.
Mob. Networks Appl., 2021

Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems.
Mob. Inf. Syst., 2021

Semantics aware adversarial malware examples generation for black-box attacks.
Appl. Soft Comput., 2021

2020
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation.
ACM Trans. Internet Techn., 2020

A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.
IEEE Trans. Ind. Informatics, 2020

CSNN: Password guessing method based on Chinese syllables and neural network.
Peer-to-Peer Netw. Appl., 2020

An efficient and secure data sharing scheme for mobile devices in cloud computing.
J. Cloud Comput., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020

SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment.
Int. J. Distributed Sens. Networks, 2020

An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices.
Comput. Secur., 2020

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating.
IEEE Access, 2020

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.
IEEE Access, 2020

Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

User Similarity-Aware Data Deduplication Scheme for IoT Applications.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access, 2019

Multi-Layer Network Local Community Detection Based on Influence Relation.
IEEE Access, 2019

Watermark Scheme of Database Based on Fuzzy C-Means.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Database Watermarking Scheme Based on Clustering with Size Constraint.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Accelerating Public Key Cryptography in Android Platforms.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2017
BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2017


  Loading...