Shujiang Xu

Orcid: 0000-0001-9151-2834

According to our database1, Shujiang Xu authored at least 28 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A reputation-based dynamic reorganization scheme for blockchain network sharding.
Connect. Sci., December, 2024

RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
IEEE Trans. Inf. Forensics Secur., 2024

A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024

Relay network-based cross-chain data interaction protocol with integrity audit.
Comput. Electr. Eng., 2024

2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023

A Malware Detection Approach Based on Deep Learning and Memory Forensics.
Symmetry, February, 2023

An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
Symmetry, February, 2023

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023

Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
Symmetry, 2022

Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
Symmetry, 2022

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
Entropy, 2022

A Cross Data Center Access Control Model by Constructing GAS on Blockchain.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Method of Traceless File Deletion for NTFS File System.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
A privacy protection scheme for telemedicine diagnosis based on double blockchain.
J. Inf. Secur. Appl., 2021

A Scheme of Traceless File Deletion for Windows FAT32 File System.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

2020
Accurate Computation of Fractional-Order Exponential Moments.
Secur. Commun. Networks, 2020

Incentive mechanism for cooperative authentication: An evolutionary game approach.
Inf. Sci., 2020

2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019

Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2018
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Video forensics research based on authenticity and integrity.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2008
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...