Xu Wang

Orcid: 0000-0001-9439-6437

Affiliations:
  • Beijing University of Posts and Telecommunications, School of Cyberspace Security, China


According to our database1, Xu Wang authored at least 52 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ByCAN: Reverse Engineering Controller Area Network (CAN) Messages From Bit to Byte Level.
IEEE Internet Things J., November, 2024

Toward Web3 Applications: Easing the Access and Transition.
IEEE Trans. Comput. Soc. Syst., October, 2024

Blockchained Federated Learning for Internet of Things: A Comprehensive Survey.
ACM Comput. Surv., October, 2024

Preventing harm to the rare in combating the malicious: A filtering-and-voting framework with adaptive aggregation in federated learning.
Neurocomputing, 2024

ByCAN: Reverse Engineering Controller Area Network (CAN) Messages from Bit to Byte Level.
CoRR, 2024

Fishers Harvest Parallel Unlearning in Inherited Model Networks.
CoRR, 2024

Decentralized Federated Unlearning on Blockchain.
CoRR, 2024

TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT.
Comput. Networks, 2024

2023
Adaptive Resource Scheduling in Permissionless Sharded-Blockchains: A Decentralized Multiagent Deep Reinforcement Learning Approach.
IEEE Trans. Syst. Man Cybern. Syst., November, 2023

Obfuscating the Dataset: Impacts and Applications.
ACM Trans. Intell. Syst. Technol., October, 2023

A new concatenated Multigraph Neural Network for IoT intrusion detection.
Internet Things, July, 2023

Split Unlearning.
CoRR, 2023

A Secure Aggregation for Federated Learning on Long-Tailed Data.
CoRR, 2023

Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review.
CoRR, 2023

IronForge: An Open, Secure, Fair, Decentralized Federated Learning.
CoRR, 2023

NE-GConv: A lightweight node edge graph convolutional network for intrusion detection.
Comput. Secur., 2023

A Generative Adversarial Networks-Based Integer Overflow Detection Model for Smart Contracts.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023

A Novel Weights-less Watermark Embedding Method for Neural Network Models.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023

Predicting NFT Classification with GNN: A Recommender System for Web3 Assets.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Community-based Strategy for Blockchain Sharding: Enabling More Budget-friendly Transactions.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Personalized Location Privacy With Road Network-Indistinguishability.
IEEE Trans. Intell. Transp. Syst., 2022

A Review on Security Issues and Solutions of the Internet of Drones.
IEEE Open J. Comput. Soc., 2022

Blockchain-Enabled Fish Provenance and Quality Tracking System.
IEEE Internet Things J., 2022

Towards Web3 Applications: Easing the Access and Transition.
CoRR, 2022

Cross-chain between a Parent Chain and Multiple Side Chains.
CoRR, 2022

Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning.
CoRR, 2022

New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A Community Detection-Based Blockchain Sharding Scheme.
Proceedings of the Blockchain - ICBC 2022, 2022

Leveraging Byte-Level Features for LSTM-based Anomaly Detection in Controller Area Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Multi-layer Reverse Engineering System for Vehicular Controller Area Network Messages.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Modeling and Analysis of Advanced Persistent Threats in Cyber Space
PhD thesis, 2021

Game Theoretic Suppression of Forged Messages in Online Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems.
Inf. Process. Manag., 2021

Capacity analysis of public blockchain.
Comput. Commun., 2021

2020
Reliability Analysis of Large-Scale Adaptive Weighted Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems.
IEEE Trans. Engineering Management, 2020

A Unified Analytical model for proof-of-X schemes.
Comput. Secur., 2020

Survey: Sharding in Blockchains.
IEEE Access, 2020

Scaling-out blockchains with sharding: an extensive survey.
Proceedings of the Blockchains for Network Security: Principles, 2020

Blockchain for Internet of Things.
Proceedings of the Blockchains for Network Security: Principles, 2020

2019
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.
Secur. Commun. Networks, 2019

Capacity of blockchain based Internet-of-Things: Testbed and analysis.
Internet Things, 2019

Survey on blockchain for Internet of Things.
Comput. Commun., 2019

A High-Performance Hybrid Blockchain System for Traceable IoT Applications.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
The Impact of Link Duration on the Integrity of Distributed Mobile Networks.
IEEE Trans. Inf. Forensics Secur., 2018

An Optimized Round-Robin Scheduling of Speakers for Peers-to-Peers-Based Byzantine Faulty Tolerance.
Proceedings of the IEEE Globecom Workshops, 2018

Attack and Defence of Ethereum Remote APIs.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection.
Secur. Commun. Networks, 2017

WORM-HUNTER: A Worm Guard System using Software-defined Networking.
KSII Trans. Internet Inf. Syst., 2017

Analytic model on data security in VANETs.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016


  Loading...