Xiangguo Cheng

Orcid: 0000-0002-1228-4894

According to our database1, Xiangguo Cheng authored at least 58 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cloud-Assisted Privacy-Preserving Spectral Clustering Algorithm Within a Multi-User Setting.
IEEE Access, 2024

2021
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning.
Wirel. Commun. Mob. Comput., 2021

Optimization scheme for intrusion detection scheme GBDT in edge computing center.
Comput. Commun., 2021

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas.
IEEE/ACM Trans. Netw., 2020

A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

An Intrusion Detection Scheme Based on Repeated Game in Smart Home.
Mob. Inf. Syst., 2020

A Dynamic Virus Propagation Model Based on Social Attributes in City IoT.
IEEE Internet Things J., 2020

Modeling and Analysis Botnet Propagation in Social Internet of Things.
IEEE Internet Things J., 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage.
IEEE Access, 2020

A Secure and Lightweight Data Sharing Scheme for Internet of Medical Things.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations.
J. Cloud Comput., 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019

An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Towards a Novel Trust-Based Multicast Routing for VANETs.
Secur. Commun. Networks, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

2017
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

2015
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IEEE Trans. Smart Grid, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
An ID-Based Short Group Signature Scheme.
J. Softw., 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013

2012
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

A Practical ID-Based Group Signature Scheme.
J. Comput., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012

2011
ID-Based Sequential Aggregate Signatures.
J. Softw., 2011

New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

A New Approach to Group Signature Schemes.
J. Comput., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009

2008
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

2007
An Efficient Identity-based Signature Scheme and Its Applications.
Int. J. Netw. Secur., 2007

2006
An Identity-based Mediated Signature Scheme from Bilinear Pairing.
Int. J. Netw. Secur., 2006

A New ID-Based Broadcast Encryption Scheme.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Methods to Forge ElGamal Signatures and Determine Secret Key.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Practical Group Signatures from RSA.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Cryptanalysis of Rijndael S-box and improvement.
Appl. Math. Comput., 2005

Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing.
Proceedings of the Computational Science and Its Applications, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Cryptanalysis of a Cellular Automata Cryptosystem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Identity-Based Signature and Its Threshold Version.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...