Xuewen Dong
Orcid: 0000-0001-5745-0545
According to our database1,
Xuewen Dong
authored at least 62 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol., June, 2024
IEEE Trans. Wirel. Commun., January, 2024
Proceedings of the IEEE International Conference on Web Services, 2024
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Mob. Comput., November, 2023
Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process.
J. Inf. Sci. Eng., November, 2023
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023
IEEE Internet Things J., May, 2023
IEEE Trans. Serv. Comput., 2023
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
2022
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Ind. Informatics, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022
A Study of Service Registration and Discovery Techniques in Microservice Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2022
Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process.
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the Knowledge Science, Engineering and Management, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE J. Sel. Areas Commun., 2021
IEEE Internet Things J., 2021
On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE International Conference on Services Computing, 2021
2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020
IEEE Trans. Wirel. Commun., 2020
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT.
J. Inf. Sci. Eng., 2020
A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020
Comput. Commun., 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
IEEE Trans. Veh. Technol., 2019
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.
J. Medical Syst., 2019
Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Blockchain-based secure digital asset exchange scheme with QoS-aware incentive mechanism.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019
2018
Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Veh. Technol., 2018
MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing.
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018
2017
Proceedings of the International Conference on Networking and Network Applications, 2017
2016
A new method to deduce counterexamples in secure routing protocols based on strand space model.
Secur. Commun. Networks, 2016
2011
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009