Xuechao Yang

Orcid: 0000-0001-5621-767X

According to our database1, Xuechao Yang authored at least 30 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries.
Wirel. Networks, August, 2024

An efficient privacy-preserving recommender system in wireless networks.
Wirel. Networks, August, 2024

A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing.
IEEE Internet Things J., April, 2024

Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
IEEE Trans. Sustain. Comput., 2024

Estimation of realized volatility of cryptocurrencies using CEEMDAN-RF-LSTM.
Future Gener. Comput. Syst., 2024

Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences.
Array, 2024

2023
Privacy-preserving recommendation system based on user classification.
J. Inf. Secur. Appl., December, 2023

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023

A Comparative Study on Design and Usability of Cryptographic Libraries.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022

Protecting Private Information for Two Classes of Aggregated Database Queries.
Informatics, 2022

An Efficient Clustering-Based Privacy-Preserving Recommender System.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
A distributed networked system for secure publicly verifiable self-tallying online voting.
Inf. Sci., 2021

Secure Ranked Choice Online Voting System via Intel SGX and Blockchain.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Usability Study of Cryptographic API Design.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Efficient Privacy-Preserving User Matching with Intel SGX.
Proceedings of the Broadband Communications, Networks, and Systems, 2021

2020
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities.
Future Gener. Comput. Syst., 2020

SGX-based Users Matching with Privacy Protection.
Proceedings of the Australasian Computer Science Week, 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

A multistage protocol for aggregated queries in distributed cloud databases with privacy protection.
Future Gener. Comput. Syst., 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

2018
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018

Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

2017
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation.
Future Gener. Comput. Syst., 2017

A Verifiable Ranked Choice Internet Voting System.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

2016
Securing Body Sensor Network with ECG.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014


  Loading...