Shujiang Xu
Orcid: 0000-0001-9151-2834
According to our database1,
Shujiang Xu
authored at least 28 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Connect. Sci., December, 2024
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024
Comput. Electr. Eng., 2024
2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023
Symmetry, February, 2023
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
Symmetry, February, 2023
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Circuits Syst. Video Technol., 2022
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
Symmetry, 2022
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
Symmetry, 2022
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
Entropy, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
J. Inf. Secur. Appl., 2021
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
2020
Secur. Commun. Networks, 2020
Inf. Sci., 2020
2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
2018
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Proceedings of the IEEE International Conference on Information and Automation, 2016
2008
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008