Xiaofeng Wang
Geciteerd door
Geciteerd door
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm
X Wang, CS Yeo, R Buyya, J Su
Future Generation Computer Systems 27 (8), 1124-1134, 2011
RLM: A general model for trust representation and aggregation
X Wang, L Liu, J Su
IEEE Transactions on Services Computing 5 (1), 131-143, 2010
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
H Sun, X Wang, R Buyya, J Su
Software: Practice and Experience 47 (3), 421-441, 2017
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
J Su, D Cao, B Zhao, X Wang, I You
Future Generation Computer Systems 33, 11-18, 2014
Attribute-based encryption schemes
JS Su, D Cao, XF Wang, YP Sun, QL Hu
Journal of Software 22 (6), 1299-1315, 2011
A new multistage approach to detect subtle DDoS attacks
F Wang, H Wang, X Wang, J Su
Mathematical and Computer Modelling 55 (1-2), 198-213, 2012
RPAH: Random port and address hopping for thwarting internal and external adversaries
YB Luo, BS Wang, XF Wang, XF Hu, GL Cai, H Sun
2015 IEEE Trustcom/BigDataSE/ISPA 1, 263-270, 2015
A PSO-optimized minimum spanning tree-based topology control scheme for wireless sensor networks
W Guo, B Zhang, G Chen, X Wang, N Xiong
International Journal of Distributed Sensor Networks 9 (4), 985410, 2013
DiffSig: Resource differentiation based malware behavioral concise signature generation
H Lu, B Zhao, X Wang, J Su
Information and Communication Technology-EurAsia Conference, 271-284, 2013
Bgpcoin: Blockchain-based internet number resource authority and bgp security solution
Q Xing, B Wang, X Wang
Symmetry 10 (9), 408, 2018
Reliability-oriented genetic algorithm for workflow applications using max-min strategy
X Wang, R Buyya, J Su
2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid …, 2009
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences
H Lu, X Wang, B Zhao, F Wang, J Su
Mathematical and Computer Modelling 58 (5-6), 1140-1154, 2013
Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things
W Liu, X Wang, W Peng
IEEE Access 8, 8754-8767, 2019
ITLS: lightweight transport-layer security protocol for IOT with minimal latency and perfect forward secrecy
P Li, J Su, X Wang
IEEE Internet of Things Journal 7 (8), 6828-6841, 2020
An introduction to network address shuffling
G Cai, B Wang, X Wang, Y Yuan, S Li
2016 18th international conference on advanced communication technology …, 2016
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties
L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung
Australasian Conference on Information Security and Privacy, 431-451, 2018
Sa-ibe: A secure and accountable identity-based encryption scheme
D Cao, XF Wang, F Wang, QL Hu, JS Su
电子与信息学报 33 (12), 2922-2928, 2011
Multi-authority attribute-based signature
D Cao, B Zhao, X Wang, J Su, G Ji
2011 Third International Conference on Intelligent Networking and …, 2011
A keyed-hashing based self-synchronization mechanism for port address hopping communication
Y Luo, B Wang, X Wang, B Zhang
Frontiers of Information Technology & Electronic Engineering 18 (5), 719-728, 2017
Poster: Bgpcoin: a trustworthy blockchain-based resource management solution for bgp security
Q Xing, B Wang, X Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20