Xingwen Zhao
Orcid: 0000-0002-7620-227X
According to our database1,
Xingwen Zhao
authored at least 36 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing.
IEEE Internet Things J., December, 2024
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
IEEE Internet Things J., September, 2024
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments.
IEEE Internet Things J., April, 2024
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Open set identification of malicious encrypted traffic based on multi-feature fusion.
Comput. Networks, 2024
A Novel Method for Measuring the Attitude Angles of the Artillery Barrel Based on Monocular Vision.
IEEE Access, 2024
A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing.
IEEE Access, 2024
2023
A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem.
IEEE Access, 2023
2022
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.
Sensors, 2022
J. Syst. Archit., 2022
IEEE Internet Things J., 2022
Proceedings of the IEEE Smartworld, 2022
Research on Range Profile Target Detection Algorithm of Stepped-Frequency Ground Penetrating Radar.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
2019
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
2017
Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles.
Mob. Inf. Syst., 2017
Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks.
IEEE Access, 2017
Research on the remote assistance system of through-the-wall radar based on wireless network security communication.
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
2014
Secur. Commun. Networks, 2014
Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2012
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority.
J. Syst. Softw., 2012
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier <i>k</i>-times Group Signature.
Informatica (Slovenia), 2012
Int. J. Netw. Secur., 2012
Comput. Secur., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
2011
Int. J. Netw. Secur., 2011
Int. J. Netw. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security Practice and Experience, 2011
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Heuristic Optimization Algorithm for Task Assignment in Collaborative Project Based on CITIS.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009