Xiaoling Tao

Orcid: 0000-0002-6573-2291

According to our database1, Xiaoling Tao authored at least 46 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
User Behavior Threat Detection Based on Adaptive Sliding Window GAN.
IEEE Trans. Netw. Serv. Manag., April, 2024

A new SM2-based ring signature scheme with revocability and anonymity.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
An SSA-LC-DAE Method for Extracting Network Security Elements.
IEEE Trans. Netw. Sci. Eng., 2023

2022
An Effective Insider Threat Detection Apporoach Based on BPNN.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Efficient Authentication for Internet of Things Devices in Information Management Systems.
Wirel. Commun. Mob. Comput., 2021

A Hybrid Alarm Association Method Based on AP Clustering and Causality.
Wirel. Commun. Mob. Comput., 2021

An Efficient Network Security Situation Assessment Method Based on AE and PMU.
Wirel. Commun. Mob. Comput., 2021

Publicly verifiable outsourced data migration scheme supporting efficient integrity checking.
J. Netw. Comput. Appl., 2021

Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles.
Ad Hoc Networks, 2021

2020
New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage.
Int. J. Netw. Secur., 2020

Assure deletion supporting dynamic insertion for outsourced data in cloud computing.
Int. J. Distributed Sens. Networks, 2020

An efficient method for network security situation assessment.
Int. J. Distributed Sens. Networks, 2020

SLA-aware resource scheduling algorithm for cloud storage.
EURASIP J. Wirel. Commun. Netw., 2020

Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing.
IEEE Access, 2020

Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method.
J. Univers. Comput. Sci., 2019

HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

A new revocable reputation evaluation system based on blockchain.
Int. J. High Perform. Comput. Netw., 2019

An efficient privacy-preserving friendship-based recommendation system.
Int. J. Embed. Syst., 2019

Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing.
Int. J. Embed. Syst., 2019

A new scheme for improving the utilisation of nested-cloud resources.
Int. J. Embed. Syst., 2019

A result correctness verification mechanism for cloud computing based on MapReduce.
Int. J. Embed. Syst., 2019

Efficient public integrity auditing with secure deduplication in cloud computing.
Int. J. Embed. Syst., 2019

A new efficient privacy-preserving data publish-subscribe scheme.
Int. J. Embed. Syst., 2019

Publicly verifiable data transfer and deletion scheme for cloud storage.
Int. J. Distributed Sens. Networks, 2019

New efficient constructions of verifiable data streaming with accountability.
Ann. des Télécommunications, 2019

A New Outsourced Data Deletion Scheme with Public Verifiability.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
Blockchain-Based Data Preservation System for Medical Data.
J. Medical Syst., 2018

EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018

Data integrity checking with reliable data transfer for secure cloud storage.
Int. J. Web Grid Serv., 2018

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption.
Int. J. Embed. Syst., 2018

A parallel algorithm for network traffic anomaly detection based on Isolation Forest.
Int. J. Distributed Sens. Networks, 2018

Graph database-based network security situation awareness data storage method.
EURASIP J. Wirel. Commun. Netw., 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

An Associated Deletion Scheme for Multi-copy in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Improved dynamic remote data auditing protocol for smart city security.
Pers. Ubiquitous Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

2016
A parallelized network traffic classification framework based on selective ensemble and diversity measures.
J. High Speed Networks, 2016

A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark.
Inf., 2016

A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder.
Inf., 2016

Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurr. Comput. Pract. Exp., 2016

2015
An FPGA Based High-speed Network Performance Measurement for RFC 2544.
EURASIP J. Wirel. Commun. Netw., 2015

2009
Localization in Wireless Sensor Networks via Support Vector Regression.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

An Ant Colony Clustering Routing Algorithm for Wireless Sensor Networks.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Application of Grid Technologies in Linux Host Intrusion Detection System.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009


  Loading...