Xiaofen Wang

Orcid: 0000-0002-6744-4752

According to our database1, Xiaofen Wang authored at least 63 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automatic Alignment of Ring-Grid Laser Images based on an Improved Classical Iterative Algorithm.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., June, 2024

A Dropout-Tolerated Privacy-Preserving Method for Decentralized Crowdsourced Federated Learning.
IEEE Internet Things J., January, 2024

MicEMD: Open-source toolbox for electromagnetic modeling, inversion, and classification in underground metal target detection.
SoftwareX, 2024

Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing.
IEEE Internet Things J., 2024

AIoT and VR-Based Technology for Robots Control in Critical Safety Environments: Challenges and Opportunities.
Proceedings of the IEEE International Conference on Industrial Technology, 2024

A Performance Study of Block Proposing Mechanism in Ethereum 2.0.
Proceedings of the IEEE International Conference on Blockchain, 2024

R-PPDFL: A Robust and Privacy-Preserving Decentralized Federated Learning System.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Efficient and robust Levenberg-Marquardt Algorithm based on damping parameters for parameter inversion in underground metal target detection.
Comput. Geosci., July, 2023

A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems.
IEEE Trans. Ind. Informatics, June, 2023

Learning Degradation for Real-World Face Super-Resolution.
Proceedings of the Advances in Computer Graphics, 2023

Low-overhead Privacy-preserving Location-based Skyline Query.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Real-Time Video Deraining via Global Motion Compensation and Hybrid Multi-Scale Temporal Correlations.
IEEE Signal Process. Lett., 2022

Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022

Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

An intrusion detection system based on multiple interpretation methods.
Proceedings of the IEEE Smartworld, 2022

Feedforward Neural Network Reconstructed from High-order Quantum Systems.
Proceedings of the International Joint Conference on Neural Networks, 2022

Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Lightweight Searchable Encryption Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Multi-Level Memory Compensation Network for Rain Removal via Divide-and-Conquer Strategy.
IEEE J. Sel. Top. Signal Process., 2021

Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities.
IEEE Internet Things J., 2021

Measuring and profiling the topical influence and sentiment contagion of public event stakeholders.
Int. J. Inf. Manag., 2021

2020
HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

Efficient Lattice CP-ABE AC Scheme Supporting Reduced-OBDD Structure for CCN/NDN.
Symmetry, 2020

Developing and Preliminary Validating an Automatic Cell Classification System for Bone Marrow Smears: a Pilot Study.
J. Medical Syst., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

Single image de-raining via clique recursive feedback mechanism.
Neurocomputing, 2020

UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things.
Comput. Commun., 2020

A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Construction of User Portrait Based on Alipay Big Data.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

Securing content-centric networks with content-based encryption.
J. Netw. Comput. Appl., 2019

Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things.
Inf. Sci., 2019

Provably Secure (Broadcast) Homomorphic Signcryption.
Int. J. Found. Comput. Sci., 2019

Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system.
Future Gener. Comput. Syst., 2019

Lightweight Distributed Attribute Based Keyword Search System for Internet of Things.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Rain Streak Removal via Multi-scale Mixture Exponential Power Model.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model.
Int. J. Netw. Secur., 2018

Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication.
Wirel. Pers. Commun., 2017

Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurr. Comput. Pract. Exp., 2017

Provably Secure Homomorphic Signcryption.
Proceedings of the Provable Security, 2017

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Inf. Forensics Secur., 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

An efficient privacy-preserving aggregation and billing protocol for smart grid.
Secur. Commun. Networks, 2016

Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

One-round secure fair meeting location determination based on homomorphic encryption.
Inf. Sci., 2016

Privacy-enhanced distance computation with applications.
Int. J. Electron. Secur. Digit. Forensics, 2016

Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem.
IACR Cryptol. ePrint Arch., 2016

SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Content-Based Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Study on Orthogonal Basis NN-Based Storage Modelling for Lake Hume of Upper Murray River, Australia.
Proceedings of the Machine Learning and Cybernetics, 2014

2013
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Somewhat HE scheme over Integers and Its Variation.
KSII Trans. Internet Inf. Syst., 2013


  Loading...