Qixu Wang

Orcid: 0000-0002-3970-9290

According to our database1, Qixu Wang authored at least 22 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network.
Peer Peer Netw. Appl., July, 2024

Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks.
IEEE Internet Things J., June, 2024

UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing.
Comput. Commun., 2024

2023
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud.
Soft Comput., 2023

Chaotic Motion Planning for Mobile Robots: Progress, Challenges, and Opportunities.
IEEE Access, 2023

2022
ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform.
IEEE Trans. Ind. Informatics, 2022

Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach.
IEEE Internet Things J., 2022

Privacy-preserving Security Inference Towards Cloud-Edge Collaborative Using Differential Privacy.
CoRR, 2022

MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder.
Proceedings of the IEEE International Conference on Acoustics, 2022

Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions.
Proceedings of the IEEE Global Communications Conference, 2022

ApkClassiFy: Identification and Classification of packed Android Malicious Applications.
Proceedings of the IEEE Global Communications Conference, 2022

vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2019
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.
Secur. Commun. Networks, 2019

Flow Context and Host Behavior Based Shadowsocks's Traffic Identification.
IEEE Access, 2019

An Automatic Event Detection Method for Massive Wireless Access Prediction.
IEEE Access, 2019

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach.
IEEE Access, 2019

An Attack Vector Evaluation Method for Smart City Security Protection.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

2018
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-Based IoT Context.
Wirel. Commun. Mob. Comput., 2018

2017
LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context.
IEEE Access, 2017

PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing.
IEEE Access, 2017

MESA: An Efficient Matching Scheme in Content-Based Publish/Subscribe System with Simplified Bayesian Approach.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017


  Loading...