Xuewen Dong

Orcid: 0000-0001-5745-0545

According to our database1, Xuewen Dong authored at least 62 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol., June, 2024

Federated and Online Dynamic Spectrum Access for Mobile Secondary Users.
IEEE Trans. Wirel. Commun., January, 2024

Non-Subjective Trust Mechanism for Online Ride-Hailing Services.
Proceedings of the IEEE International Conference on Web Services, 2024

Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023

A Two-Dimensional Sybil-Proof Mechanism for Dynamic Spectrum Access.
IEEE Trans. Mob. Comput., November, 2023

Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process.
J. Inf. Sci. Eng., November, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023

Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

Fair Outsourcing Paid in Fiat Money Using Blockchain.
IEEE Trans. Serv. Comput., 2023

PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023

VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023

Testing Automated Driving Systems by Breaking Many Laws Efficiently.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing.
IEEE Trans. Serv. Comput., 2022

Optimizing Task Location Privacy in Mobile Crowdsensing Systems.
IEEE Trans. Ind. Informatics, 2022

DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

Privacy-Preserving Asynchronous Grouped Federated Learning for IoT.
IEEE Internet Things J., 2022

CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain.
Future Gener. Comput. Syst., 2022

A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022

A Study of Service Registration and Discovery Techniques in Microservice Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2022

Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process.
Proceedings of the International Conference on Networking and Network Applications, 2022

Dual Adversarial Federated Learning on Non-IID Data.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices.
IEEE J. Sel. Areas Commun., 2021

Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy.
IEEE Internet Things J., 2021

On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach.
Proceedings of the IEEE Global Communications Conference, 2021

Dual-Target Cross-Domain Bundle Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation.
IEEE Trans. Wirel. Commun., 2020

CryptSQLite: SQLite With High Data Security.
IEEE Trans. Computers, 2020

Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT.
J. Inf. Sci. Eng., 2020

A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

BC-RAN: Cloud radio access network enabled by blockchain for 5G.
Comput. Commun., 2020

Secure Off-chain Payment in Consortium Blockchain System.
Proceedings of the International Conference on Networking and Network Applications, 2020

B-SDN: A Novel Blockchain-based Software Defined Network Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2020

Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.
J. Medical Syst., 2019

Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019

An Abnormal Transaction Detection Mechanim on Bitcoin.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Partial-Equivalence: A Semantic Strategy in Service Composition and Modeling.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

QoS-Aware Path Finding and Load Balancing in Service-Composition.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
Proceedings of the IEEE INFOCOM 2019, 2019

A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Blockchain-based secure digital asset exchange scheme with QoS-aware incentive mechanism.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019

2018
Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Veh. Technol., 2018

MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing.
Proceedings of the International Conference on Networking and Network Applications, 2018

A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing.
Proceedings of the International Conference on Networking and Network Applications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
A new method to deduce counterexamples in secure routing protocols based on strand space model.
Secur. Commun. Networks, 2016

2011
A New Evaluation Model for Security Protocols.
J. Commun., 2011

2009
Towards Provably Secure On-demand Source Routing in MANET.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...