Xinwen Zhang

Orcid: 0009-0002-1981-7523

According to our database1, Xinwen Zhang authored at least 140 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Underwater image object detection based on multi-scale feature fusion.
Mach. Vis. Appl., November, 2024

Development and Application of a Novel Tsunami Monitoring System Based on Submerged Mooring.
Sensors, September, 2024

A 430-μA 68.2-dB-SNR 133-dBSPL-AOP CMOS-MEMS Digital Microphone Based on Electrostatic Force Feedback Control.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits 2024, 2024

A Federated Stochastic Multi-level Compositional Minimax Algorithm for Deep AUC Maximization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Outage performance analysis for relay-assisted UWOC systems over GGD weak turbulence with nonzero boresight pointing errors.
Phys. Commun., June, 2023

Federated Compositional Deep AUC Maximization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Distributed Optimization for Big Data Analytics: Beyond Minimization.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

A Compressive Sensing and Denoising RCAN-Based Channel Estimation Scheme for OTFS System.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023

SynthMix: Mixing Up Aligned Synthesis for Medical Cross-Modality Domain Adaptation.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023

2022
Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window Denoise PPO.
CoRR, 2022

CycleResume: A Cycle Learning Framework with Hybrid Attention for Fine-Grained Talent-Job Fit.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022

Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled Source Data.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022

2021
The Impact of Macroeconomic Uncertainty on China's Stock Market - - Take the Shanghai Composite Index as an Example.
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021

Research on the Impact of Work Flexibility on Employee Happiness - Based on the Perspective of Ecological Balance Theory.
Proceedings of the ICEME 2021: The 12th International Conference on E-business, Management and Economics, Beijing, China, July 17, 2021

2019
Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with Markovian Switching.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

ResumeGAN: An Optimized Deep Representation Learning Framework for Talent-Job Fit via Adversarial Learning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection.
IEEE Trans. Emerg. Top. Comput., 2018

How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach.
IEEE Access, 2018

ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment.
Proceedings of the IEEE International Conference on Data Mining, 2018

2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017

2016
Direct Resource Hijacking in Android.
IEEE Internet Comput., 2016

LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes.
Scientometrics, 2015

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

Assessing Attack Surface with Component-Based Package Dependency.
Proceedings of the Network and System Security - 9th International Conference, 2015

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment.
ACM Trans. Auton. Adapt. Syst., 2014

Improved anonymous proxy re-encryption with CCA security.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013

Cherub: Fine-grained application protection with on-demand virtualization.
Comput. Math. Appl., 2013

A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids.
IEEE Access, 2013

ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Contextualized information-centric home network.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Lattice-Based Multi-party Concurrent Signatures Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Information-centric networking based homenet.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Towards software defined ICN based edge-cloud services.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

AppInk: watermarking android apps for repackaging deterrence.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
IEEE Trans. Inf. Forensics Secur., 2012

Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

An Android runtime security policy enforcement framework.
Pers. Ubiquitous Comput., 2012

White organic light-emitting devices with a solution-processed small molecular emission layer.
Displays, 2012

Multiparty Cloud Computation
CoRR, 2012

VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

On-demand security service.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012

Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Supporting seamless mobility in named data networking.
Proceedings of IEEE International Conference on Communications, 2012

Towards end-to-end secure content storage and delivery with public cloud.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012

STC 2012: the seventh ACM workshop on scalable trusted computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Supporting dual-mode forwarding in content-centric network.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Runtime Administration of an RBAC Profile for XACML.
IEEE Trans. Serv. Comput., 2011

Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing.
Mob. Networks Appl., 2011

Unleashing the Power of Mobile Cloud Computing using ThinkAir
CoRR, 2011

Patient-centric authorization framework for electronic healthcare services.
Comput. Secur., 2011

Taming Information-Stealing Smartphone Applications (on Android).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Botnet with Browser Extensions.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Proceedings of the Security and Privacy in Communication Networks, 2011

xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Towards name-based trust and security for content-centric network.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Towards Secure Mobile Virtual Group in information-centric network.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Serv. Res., 2010

Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010

pBMDS: a behavior-based malware detection system for cellphone devices.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010

DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers.
Proceedings of the POLICY 2010, 2010

Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

On Leveraging Stochastic Models for Remote Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Towards secure dynamic collaborations with group-based RBAC model.
Comput. Secur., 2009

Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009

Designing System-Level Defenses against Cellphone Malware.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Towards Session-Aware RBAC Administration and Enforcement with XACML.
Proceedings of the POLICY 2009, 2009

Towards a Usage Control Policy Specification with Petri Nets.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Towards System Integrity Protection with Graph-Based Policy Analysis.
Proceedings of the Data and Applications Security XXIII, 2009

A usage control policy specification with Petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Building a stateful reference monitor with coloured petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Securing elastic applications on mobile devices for cloud computing.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

A Secure DVB Set-Top Box via Trusting Computing Technologies.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Toward a Usage-Based Security Framework for Collaborative Computing Systems.
ACM Trans. Inf. Syst. Secur., 2008

Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security Enforcement Model for Distributed Usage Control.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Systematic Policy Analysis for High-Assurance Services in SELinux.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Access control in Group Communication Systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Towards a Group-Based RBAC Model and Decentralized User-Role Administration.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008

Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

A Trusted Mobile Phone Prototype.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Towards a VMM-based usage control framework for OS kernel integrity protection.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Flexible Authorization with Decentralized Access Control Model for Grid Computing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Model-Driven Framework for Trusted Computing Based Systems.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Towards a Times-Based Usage Control Model.
Proceedings of the Data and Applications Security XXI, 2007

SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A trusted mobile phone reference architecturevia secure kernel.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
An effective role administration model using organization structure.
ACM Trans. Inf. Syst. Secur., 2006

Client-side access control enforcement using trusted computing and PEI models.
J. High Speed Networks, 2006

A usage-based authorization framework for collaborative computing systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Proceedings of the Advances in Information and Computer Security, 2006

ROBAC: Scalable Role and Organization Based Access Control Models.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Safety analysis of usage control authorization models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Secure information sharing enabled by Trusted Computing and PEI models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

A general design towards secure ad-hoc collaboration.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

2005
Formal model and policy specification of usage control.
ACM Trans. Inf. Syst. Secur., 2005

Enhancing Data Authenticity and Integrity in P2P Systems.
IEEE Internet Comput., 2005

Securing credit card transactions with one-time payment scheme.
Electron. Commer. Res. Appl., 2005

Peer-to-peer access control architecture using trusted computing technology.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

An attribute-based access matrix model.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
A logical specification for usage control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

A Security-Enhanced One-Time Payment Scheme for Credit Card.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Attribute Mutability in Usage Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
PBDM: a flexible delegation model in RBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Schema Based XML Security: RBAC Approach.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003


  Loading...