Changxiang Shen

Orcid: 0009-0007-7840-0337

According to our database1, Changxiang Shen authored at least 26 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

A dual-system trusted computing node construction method based on ARM multi-core CPU architecture.
Concurr. Comput. Pract. Exp., 2022

Establish a scientific concept of network security and build a strong defense line of network security.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

New Algorithms for Counting Temporal Graph Pattern.
Symmetry, 2019

TM-Miner: TFS-Based Algorithm for Mining Temporal Motifs in Large Temporal Network.
IEEE Access, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

Video Subtitle Location and Recognition Based on Edge Features.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay.
Appl. Math. Comput., 2014

Equivalent Inner Key Recovery Attack to NMAC.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Edge Self-Monitoring for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Beyond rigidity: obtain localisability with noisy ranging measurement.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Breaking H<sup>2</sup>-MAC Using Birthday Paradox.
IACR Cryptol. ePrint Arch., 2011

On the Security of NMAC and Its Variants.
IACR Cryptol. ePrint Arch., 2011

Research on trusted computing and its development.
Sci. China Inf. Sci., 2010

Formal Definitions for Trust in Trusted Computing.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

A Feather-Weight Application Isolation Model.
Proceedings of the Trusted Systems, First International Conference, 2009

Barrier Coverage with Mobile Sensors.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

The Banknote Anti-forgery System Based on Digital Signature Algorithms.
Proceedings of the Intelligence and Security Informatics, 2008

Survey of information security.
Sci. China Ser. F Inf. Sci., 2007

Design of secure operating systems with high security levels.
Sci. China Ser. F Inf. Sci., 2007

Analysis of Electronic Voting with Different Stage.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Trust Extended Dynamic Security Model and Its Application in Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Research on Applying Java Card to Database Encryption Systems.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006