Xiaofeng Wang
Orcid: 0000-0002-3583-369XAffiliations:
- National University of Defense Technology, School of Computer Science, Changsha, China (PhD 2009)
According to our database1,
Xiaofeng Wang
authored at least 63 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
0
5
10
15
1
4
4
1
3
2
2
2
2
3
1
1
1
1
1
5
1
11
3
3
5
2
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
2021
Secur. Commun. Networks, 2021
2020
iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things.
IEEE Access, 2020
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019
Int. J. Distributed Sens. Networks, 2019
Concurr. Comput. Pract. Exp., 2019
Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services.
IEEE Access, 2019
iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
2018
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution.
Symmetry, 2018
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw. Pract. Exp., 2017
A keyed-hashing based self-synchronization mechanism for port address hopping communication.
Frontiers Inf. Technol. Electron. Eng., 2017
RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks.
IEICE Trans. Inf. Syst., 2017
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016
IEICE Trans. Inf. Syst., 2016
Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
Secur. Commun. Networks, 2015
Knowl. Based Syst., 2015
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
J. Networks, 2014
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014
Proceedings of the Information and Communication Technology, 2014
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources.
Proceedings of the Information and Communication Technology, 2014
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Math. Comput. Model., 2013
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Math. Comput. Model., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2012
IEEE Trans. Serv. Comput., 2012
Mob. Inf. Syst., 2012
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Gener. Comput. Syst., 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010
2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009