Xingwen Zhao

Orcid: 0000-0002-7620-227X

According to our database1, Xingwen Zhao authored at least 36 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing.
IEEE Internet Things J., December, 2024

A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
IEEE Internet Things J., September, 2024

Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments.
IEEE Internet Things J., April, 2024

FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024

Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2024

Open set identification of malicious encrypted traffic based on multi-feature fusion.
Comput. Networks, 2024

A Novel Method for Measuring the Attitude Angles of the Artillery Barrel Based on Monocular Vision.
IEEE Access, 2024

A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing.
IEEE Access, 2024

2023
A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem.
IEEE Access, 2023

2022
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
Sensors, 2022

Blockchain-assisted searchable attribute-based encryption for e-health systems.
J. Syst. Archit., 2022

MARS: Automated Protocol Analysis Framework for Internet of Things.
IEEE Internet Things J., 2022

Certificate-based Enterprise Privacy Analysis and Anomaly Discovery.
Proceedings of the IEEE Smartworld, 2022

Research on Range Profile Target Detection Algorithm of Stepped-Frequency Ground Penetrating Radar.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2019
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Continuous leakage-resilient IBE in cloud computing.
Int. J. Commun. Syst., 2018

2017
Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles.
Mob. Inf. Syst., 2017

Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks.
IEEE Access, 2017

Research on the remote assistance system of through-the-wall radar based on wireless network security communication.
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017

Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Target: category-based android malware detection revisited.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Efficient multi-party concurrent signature from lattices.
Inf. Process. Lett., 2016

2014
Achieving dynamic privileges in secure data sharing on cloud storage.
Secur. Commun. Networks, 2014

Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2012
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority.
J. Syst. Softw., 2012

Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier <i>k</i>-times Group Signature.
Informatica (Slovenia), 2012

Amendment to Trace and Revoke Systems with Short Ciphertexts.
Int. J. Netw. Secur., 2012

Tracing and revoking scheme for dynamic privileges against pirate rebroadcast.
Comput. Secur., 2012

Codes Based Tracing and Revoking Scheme with Constant Ciphertext.
Proceedings of the Provable Security - 6th International Conference, 2012

2011
Analysis on Hu et al.'s Identity-based Broadcast Encryption.
Int. J. Netw. Secur., 2011

A New Type of ID-based Encryption System and Its Application to Pay-TV Systems.
Int. J. Netw. Secur., 2011

Traitor Tracing against Public Collaboration (Full Version).
IACR Cryptol. ePrint Arch., 2011

Dynamic asymmetric group key agreement for ad hoc networks.
Ad Hoc Networks, 2011

Traitor Tracing against Public Collaboration.
Proceedings of the Information Security Practice and Experience, 2011

2009
ID-Based Adaptive Oblivious Transfer.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Heuristic Optimization Algorithm for Task Assignment in Collaborative Project Based on CITIS.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009


  Loading...