Xiaolin Chang
Orcid: 0000-0002-2975-8857
According to our database1,
Xiaolin Chang
authored at least 198 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur., December, 2024
IEEE Trans. Veh. Technol., November, 2024
PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning.
IEEE Internet Things J., May, 2024
Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
IEEE Trans. Netw. Serv. Manag., April, 2024
IEEE Trans. Computers, April, 2024
IEEE Trans. Netw. Serv. Manag., February, 2024
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
IEEE Internet Things J., January, 2024
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Netw. Sci. Eng., 2024
Towards Lightweight and Privacy-preserving Data Provision in Digital Forensics for Driverless Taxi.
CoRR, 2024
A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service.
CoRR, 2024
MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation.
CoRR, 2024
Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption.
CoRR, 2024
Can Migration-Based Dynamic Platform Technique Work Effectively: A Quantitative Analysis Perspective.
IEEE Access, 2024
Performance Assessment of Vehicular Cloud Systems: An Analytical Approach Using M/G/m Queueing Model.
Proceedings of the IEEE International Conference on Smart Mobility, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View.
Int. J. Comput. Intell. Syst., December, 2023
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis.
Cybersecur., December, 2023
Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm.
IEEE Trans. Intell. Transp. Syst., November, 2023
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
Comput. J., October, 2023
IEEE Internet Things J., July, 2023
Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading.
IEEE Trans. Netw. Serv. Manag., June, 2023
Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach.
IEEE Trans. Veh. Technol., April, 2023
Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
IEEE Trans. Veh. Technol., February, 2023
IEEE Trans. Veh. Technol., February, 2023
IEEE Trans. Serv. Comput., 2023
Impact of Service Function Aging on the Dependability for MEC Service Function Chain.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
IEEE Internet Things J., 2023
PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
CoRR, 2023
Understanding Container-based Services under Software Aging: Dependability and Performance Views.
CoRR, 2023
Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain.
CoRR, 2023
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
CoRR, 2023
CoRR, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
Proceedings of the IEEE Global Communications Conference, 2023
2022
IEEE Trans. Veh. Technol., 2022
Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
IEEE Trans. Netw. Serv. Manag., 2022
Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment.
IEEE Trans. Green Commun. Netw., 2022
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach.
IEEE Trans. Cloud Comput., 2022
Peer-to-Peer Netw. Appl., 2022
A high performance two-layer consensus architecture for blockchain-based IoT systems.
Peer-to-Peer Netw. Appl., 2022
Peer-to-Peer Netw. Appl., 2022
Peer-to-Peer Netw. Appl., 2022
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
Peer-to-Peer Netw. Appl., 2022
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples.
J. Inf. Secur. Appl., 2022
Inf. Sci., 2022
Int. J. Intell. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
An adaptive phase-field model based on bilinear elements for tensile-compressive-shear fracture.
Comput. Math. Appl., 2022
IEEE Access, 2022
Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment.
IEEE Access, 2022
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
TISM-CAE: A Fast Unsupervised Learning Method for Trajectory Similarity Measure via Convolutional Auto-Encoder.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
Cybersecur., 2021
CoRR, 2021
A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion.
CoRR, 2021
CoRR, 2021
CoRR, 2021
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X.
Ad Hoc Networks, 2021
IEEE Access, 2021
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System.
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
Mec<sup>2</sup>: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
2020
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., 2020
Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Cogn. Commun. Netw., 2020
Peer-to-Peer Netw. Appl., 2020
Peer-to-Peer Netw. Appl., 2020
Inf. Sci., 2020
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
Cybersecur., 2020
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.
Comput. Secur., 2020
Comput. J., 2020
Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification.
IEEE Access, 2020
Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives.
IEEE Access, 2020
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views.
IEEE Access, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
An adaptive orthogonal improved interpolating moving least-square method and a new boundary element-free method.
Appl. Math. Comput., July, 2019
Quantitative security analysis of a dynamic network system under lateral movement-based attacks.
Reliab. Eng. Syst. Saf., 2019
Open J. Internet Things, 2019
BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.
IEEE Internet Things J., 2019
NURBS-enhanced line integration boundary element method for 2D elasticity problems with body forces.
Comput. Math. Appl., 2019
IEEE Access, 2019
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Assessing transferability of adversarial examples against malware detection classifiers.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload.
IEEE Trans. Cloud Comput., 2018
Inf. Sci., 2018
Future Gener. Comput. Syst., 2018
Comput. J., 2018
Comput. J., 2018
Regularized moving least-square method and regularized improved interpolating moving least-square method with nonsingular moment matrices.
Appl. Math. Comput., 2018
NE-IIBEFM for problems with body forces: A seamless integration of the boundary type meshfree method and the NURBS boundary in CAD.
Adv. Eng. Softw., 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.
Proceedings of the IEEE Global Communications Conference, 2018
2017
IEEE Trans. Cloud Comput., 2017
The Boundary Element Method with a Fast Multipole Accelerated Integration Technique for 3D Elastostatic Problems with Arbitrary Body Forces.
J. Sci. Comput., 2017
Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking.
IEEE Access, 2017
Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric).
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017
Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017
2016
IEEE Trans. Serv. Comput., 2016
InSAR Observation and Numerical Modeling of the Earth-Dam Displacement of Shuibuya Dam (China).
Remote. Sens., 2016
Remote Sensing of Deformation of a High Concrete-Faced Rockfill Dam Using InSAR: A Study of the Shuibuya Dam, China.
Remote. Sens., 2016
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
2015
IEEE Commun. Lett., 2015
Concurr. Comput. Pract. Exp., 2015
2014
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
2013
Performance evaluation of artificial intelligence algorithms for virtual network embedding.
Eng. Appl. Artif. Intell., 2013
Proceedings of the 19th IEEE International Conference on Networks, 2013
Proceedings of the Genetic and Evolutionary Computation Conference, 2013
Proceedings of the Genetic and Evolutionary Computation Conference, 2013
2012
Appl. Math. Comput., 2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Proceedings of the 18th IEEE International Conference on Networks, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
2009
Proceedings of the 28th International Performance Computing and Communications Conference, 2009
2008
Appl. Math. Comput., 2008
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008
2007
A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
2006
Comput. Commun., 2006
Comput. Networks, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
On improving bandwidth assurance in AF-based DiffServ networks using a control theoretic approach.
Comput. Networks, 2005
An adaptive queue management mechanism for improving TCP fairness in the infrastructure WLAN.
Proceedings of the IEEE 16th International Symposium on Personal, 2005
VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Applying adaptive virtual queue to improve the performance of the assured forwarding service.
Proceedings of IEEE International Conference on Communications, 2005
2004
A robust PI controller for improving performance in the AF-based differentiated services network.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003
Adaptive marking threshold for improving bandwidth assurance in a differentiated services network.
Proceedings of the Global Telecommunications Conference, 2003