Xiaochao Wei
Orcid: 0000-0002-3065-7578
According to our database1,
Xiaochao Wei
authored at least 36 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Internet Things J., 2025
2024
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing.
Ann. des Télécommunications, August, 2024
Comput. Stand. Interfaces, March, 2024
Qualitative Cusp Catastrophe Multi-Agent Simulation Model to Explore Abrupt Changes in Online Impulsive Buying Behavior.
J. Assoc. Inf. Syst., 2024
Modeling the evolution of collective overreaction in dynamic online product diffusion networks.
Decis. Support Syst., 2024
2023
Expert Syst. Appl., April, 2023
Quantitative cusp catastrophe model to explore abrupt changes in collaborative regulation behavior of e-commerce platforms.
Inf. Sci., 2023
Product diffusion in dynamic online social networks: A multi-agent simulation based on gravity theory.
Expert Syst. Appl., 2023
2022
Secure approximate pattern matching protocol via Boolean threshold private set intersection.
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Effect of Overconfidence on Product Diffusion in Online Social Networks: A Multiagent Simulation Based on Evolutionary Game and Overconfidence Theory.
Complex., 2022
SMTWM: Secure Multiple Types Wildcard Pattern Matching Protocol from Oblivious Transfer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
2021
Digit. Commun. Networks, 2021
Online Social Network Information Dissemination Integrating Overconfidence and Evolutionary Game Theory.
IEEE Access, 2021
2020
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.
Inf. Sci., 2020
Inf. Sci., 2020
2019
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.
Secur. Commun. Networks, 2019
QoS-aware cloud service composition: A systematic mapping study from the perspective of computational intelligence.
Expert Syst. Appl., 2019
IEEE Access, 2019
2018
Soft Comput., 2018
J. Inf. Secur. Appl., 2018
2017
k-out-of-n oblivious transfer protocol with security against malicious adversaries.
Comput. Syst. Sci. Eng., 2017
2016
A Decision Method to Maximize Service Quality under Budget Constraints: The Kano Study of a Chinese Machinery Manufacturer.
Sci. Program., 2016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
Int. J. Inf. Secur. Priv., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014
2013
Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption.
J. Artif. Soc. Soc. Simul., 2013
2005
Proceedings of the Entertainment Computing, 2005
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2005