Sheng Xiao

Orcid: 0000-0003-1081-0739

According to our database1, Sheng Xiao authored at least 47 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Topology-aware Multi-task Learning Framework for Civil Case Judgment Prediction.
Expert Syst. Appl., March, 2024

2023
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics.
IEEE Trans. Cogn. Commun. Netw., December, 2023

Assessing the Spatiotemporal Evolution and Drivers of Ecological Environment Quality Using an Enhanced Remote Sensing Ecological Index in Lanzhou City, China.
Remote. Sens., October, 2023

PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN.
IEEE Trans. Netw. Serv. Manag., September, 2023

SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks.
J. Netw. Comput. Appl., April, 2023

A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm.
IEEE Trans. Netw. Sci. Eng., 2023

Read-Write Dependency Aware Register Allocation.
Comput. Syst. Sci. Eng., 2023

MixBCT: Towards Self-Adapting Backward-Compatible Training.
CoRR, 2023

ParaMET: A Parallel Framework for Efficient Medical Data Extraction on Tianhe-NG Supercomputer.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Timing Error Aware Register Allocation in TS.
Comput. Syst. Sci. Eng., 2022

Energy Reduction Method by Compiler Optimization.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

DDG-Based Optimization Metrics for Defect Prediction.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Privacy-preserving range query over multi-source electronic health records in public clouds.
J. Parallel Distributed Comput., 2020

WiRE: Security Bootstrapping for Wireless Device-to-Device Communication.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

2019
Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware.
ACM Trans. Sens. Networks, 2019

Keyword Analysis Visualization for Chinese Historical Texts.
Proceedings of the 12th International Symposium on Visual Information Communication and Interaction, 2019

Innovative Talent Cultivation Pattern of Software Engineering under Internet Plus.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Chatbot Application on Cryptocurrency.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

2018
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
Secur. Commun. Networks, 2018

3D face recognition: a survey.
Hum. centric Comput. Inf. Sci., 2018

DNA-X: Dynamic Network Authentication using SGX.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2017
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks.
IEEE/ACM Trans. Netw., 2017

MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
IEEE Trans. Computers, 2016

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Cooperative Data Reduction in Wireless Sensor Network.
ACM Trans. Embed. Comput. Syst., 2015

A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2015

嘀咕网用户领域影响力研究 (Research on Field Influence of Digu Users).
计算机科学, 2015

Big Data in Future Sensing.
Int. J. Distributed Sens. Networks, 2015

Emergent Technologies in Big Data Sensing: A Survey.
Int. J. Distributed Sens. Networks, 2015

Fingerprint-free tracking with dynamic enhanced field division.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Context-Centric Target Localization with Optimal Anchor Deployments.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication.
IEEE Trans. Smart Grid, 2014

Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Reliability analysis for cryptographic key management.
Proceedings of the IEEE International Conference on Communications, 2014

EEP2P: An energy-efficient and economy-efficient P2P network protocol.
Proceedings of the International Green Computing Conference, 2014

iDES: Incentive-driven distributed energy sharing in sustainable microgrids.
Proceedings of the International Green Computing Conference, 2014

Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

2011
A secure energy routing mechanism for sharing renewable energy in smart microgrid.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

2010
Mobility Can Help: Protect User Identity with Dynamic Credential.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A New Distributed Node Localization Scheme Using a Mobile Beacon.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010

Secure Wireless Communication with Dynamic Secrets.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2008
A Three-Stage Load-Balancing Switch.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

An Algorithm for Collocation of Relation Word Based on P/T System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Dense Parity Check Based Secrecy Sharing in Wireless Communications.
Proceedings of the Global Communications Conference, 2007


  Loading...