Xiangguo Cheng
Orcid: 0000-0002-1228-4894
According to our database1,
Xiangguo Cheng
authored at least 58 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cloud-Assisted Privacy-Preserving Spectral Clustering Algorithm Within a Multi-User Setting.
IEEE Access, 2024
2021
Wirel. Commun. Mob. Comput., 2021
Comput. Commun., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Netw. Sci. Eng., 2020
Mob. Inf. Syst., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020
Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage.
IEEE Access, 2020
IEEE Access, 2020
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
2019
Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations.
J. Cloud Comput., 2019
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019
An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Secur. Commun. Networks, 2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 International Conference on Identification, 2018
2017
J. Internet Serv. Inf. Secur., 2017
2016
Wirel. Pers. Commun., 2016
Wirel. Networks, 2016
2015
IEEE Trans. Smart Grid, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Int. J. Secur. Networks, 2013
2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
2010
J. Networks, 2010
A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
J. Softw., 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
2007
Int. J. Netw. Secur., 2007
2006
Int. J. Netw. Secur., 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005