Xukai Zou
Orcid: 0000-0001-5762-8876
According to our database1,
Xukai Zou
authored at least 94 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.iupui.edu
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
DSSP: A Distributed, SLO-aware, Sensing-domain-privacy-Preserving Architecture for Sensing-as-a-Service.
CoRR, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective.
IEEE Trans. Veh. Technol., 2022
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022
An Experimental Evaluation of a Privacy-Preserving Authentication and Authorization Scheme.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education.
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Usability and Security of Different Authentication Methods for an Electronic Health Records System.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
2020
IEEE Access, 2020
AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization.
Proceedings of the Second IEEE International Conference on Trust, 2020
Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020
Continuous Security through Integration Testing in an Electronic Health Records System.
Proceedings of the International Conference on Software Security and Assurance, 2020
User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control.
Proceedings of the First IEEE International Conference on Trust, 2019
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018
2017
Int. J. Secur. Networks, 2017
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
2016
Secur. Commun. Networks, 2016
A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016
2015
Comput. Geosci., 2015
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method.
IEEE Trans. Computers, 2014
IEEE Trans. Computers, 2014
Int. J. Secur. Networks, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014
2013
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
2011
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011
2010
An efficient scheme for removing compromised sensor nodes from wireless sensor networks.
Secur. Commun. Networks, 2010
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
2009
Int. J. Secur. Networks, 2009
Proceedings of the MSN 2009, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks.
Wirel. Commun. Mob. Comput., 2008
Int. J. Secur. Networks, 2008
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Computer and Network Security 2, World Scientific, ISBN: 978-981-4476-62-1, 2008
2007
IEEE Trans. Computers, 2007
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups.
Future Gener. Comput. Syst., 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007
2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Comput. Geosci., 2005
KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005
2004
A block-free TGDH key agreement protocol for secure group communications.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
2002
Efficient Key Management for Secure Group Communications with Bursty Behavior.
Proceedings of the IASTED International Conference on Communications, 2002
2001
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the IEEE International Conference on Communications, 2001