Guangquan Xu

According to our database1, Guangquan Xu authored at least 50 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Scalable platforms and advanced algorithms for IoT and cyber-enabled applications.
J. Parallel Distrib. Comput., 2018

TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting.
J. Parallel Distrib. Comput., 2018

A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks.
J. Network and Computer Applications, 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Generation Comp. Syst., 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems.
CoRR, 2018

EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network.
Computer Networks, 2018

2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multimedia Tools Appl., 2017

Exploring Intracity Taxi Mobility during the Holidays for Location-Based Marketing.
Mobile Information Systems, 2017

Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks.
IEEE MultiMedia, 2017

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Generation Comp. Syst., 2017

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017

One-Round Provably Secure Yoking-Proof for RFID Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Automated Software Security Requirements Recommendation Based on FT-SR Model.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
International Journal of Software Engineering and Knowledge Engineering, 2016

Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Transactions, 2016

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Universal Analysis and Detection Framework for Location Aided Routing.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016

2015
HyCPK: Securing Identity Authentication in Ubiquitous Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

PEM4RFID: Privacy Enhancement Model for RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Towards Trustworthy Participants in Social Participatory Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Unified threat model for analyzing and evaluating software threats.
Security and Communication Networks, 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Applied Mathematics, 2014

An approach to facial expression analysis with multi-model interactions.
Int. J. Comput. Math., 2014

Attack Tree Based Android Malware Detection with Hybrid Analysis.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mining Specification of Insecure Browser Extension Behavior.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Hybrid Detection Using Permission Analysis for Android Malware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Personal and Ubiquitous Computing, 2013

On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Personal and Ubiquitous Computing, 2013

Data Interpolating over RFID Data Streams for Missed Readings.
Proceedings of the Web-Age Information Management, 2013

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013

2012
Facial Expressions Analysis Based on Cooperative Neuro-computing Interactions.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2009
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
On the Trust Decision in Virtual Society: Using the Least Point Principle in Dempster-Shafer Theory of Belief Functions.
Proceedings of the Fourth International Conference on Natural Computation, 2008

The Automatic Formation of Agent Societies: A Service-Driven Approach.
Proceedings of the ALPIT 2008, 2008

2007
Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions.
Int. J. Electronic Commerce, 2007

An Improvement of Coleman Model of Trust: Using FNHMS to Manage Reputation in Multi-agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

A Fuzzy Extension of OWL for Vague Knowledge.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...