Xinwen Zhang
Orcid: 0009-0002-1981-7523
According to our database1,
Xinwen Zhang
authored at least 140 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Mach. Vis. Appl., November, 2024
Development and Application of a Novel Tsunami Monitoring System Based on Submerged Mooring.
Sensors, September, 2024
A 430-μA 68.2-dB-SNR 133-dBSPL-AOP CMOS-MEMS Digital Microphone Based on Electrostatic Force Feedback Control.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits 2024, 2024
A Federated Stochastic Multi-level Compositional Minimax Algorithm for Deep AUC Maximization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Outage performance analysis for relay-assisted UWOC systems over GGD weak turbulence with nonzero boresight pointing errors.
Phys. Commun., June, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
A Compressive Sensing and Denoising RCAN-Based Channel Estimation Scheme for OTFS System.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023
2022
CoRR, 2022
CycleResume: A Cycle Learning Framework with Hybrid Attention for Fine-Grained Talent-Job Fit.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022
Proceedings of the 33rd British Machine Vision Conference 2022, 2022
2021
The Impact of Macroeconomic Uncertainty on China's Stock Market - - Take the Shanghai Composite Index as an Example.
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021
Research on the Impact of Work Flexibility on Employee Happiness - Based on the Perspective of Ecological Balance Theory.
Proceedings of the ICEME 2021: The 12th International Conference on E-business, Management and Economics, Beijing, China, July 17, 2021
2019
Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with Markovian Switching.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
ResumeGAN: An Optimized Deep Representation Learning Framework for Talent-Job Fit via Adversarial Learning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection.
IEEE Trans. Emerg. Top. Comput., 2018
IEEE Access, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes.
Scientometrics, 2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014
ACM Trans. Auton. Adapt. Syst., 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Multim. Tools Appl., 2013
Comput. Math. Appl., 2013
IEEE Access, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Pers. Ubiquitous Comput., 2012
White organic light-emitting devices with a solution-processed small molecular emission layer.
Displays, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012
2011
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing.
Mob. Networks Appl., 2011
Comput. Secur., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Proceedings of the Security and Privacy in Communication Networks, 2011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011
2010
Int. J. Web Serv. Res., 2010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers.
Proceedings of the POLICY 2010, 2010
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Computer Security, 2010
Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Comput. Secur., 2009
Proceedings of the Trusted Computing, 2009
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007
Proceedings of the Data and Applications Security XXI, 2007
SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
J. High Speed Networks, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
IEEE Internet Comput., 2005
Electron. Commer. Res. Appl., 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003