Guangquan Xu

According to our database1, Guangquan Xu
  • authored at least 43 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks.
J. Network and Computer Applications, 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Generation Comp. Syst., 2018

A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multimedia Tools Appl., 2017

Exploring Intracity Taxi Mobility during the Holidays for Location-Based Marketing.
Mobile Information Systems, 2017

Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks.
IEEE MultiMedia, 2017

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Generation Comp. Syst., 2017

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017

One-Round Provably Secure Yoking-Proof for RFID Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Automated Software Security Requirements Recommendation Based on FT-SR Model.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
International Journal of Software Engineering and Knowledge Engineering, 2016

Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Transactions, 2016

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Universal Analysis and Detection Framework for Location Aided Routing.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016

HyCPK: Securing Identity Authentication in Ubiquitous Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

PEM4RFID: Privacy Enhancement Model for RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Towards Trustworthy Participants in Social Participatory Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

Unified threat model for analyzing and evaluating software threats.
Security and Communication Networks, 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Applied Mathematics, 2014

An approach to facial expression analysis with multi-model interactions.
Int. J. Comput. Math., 2014

Attack Tree Based Android Malware Detection with Hybrid Analysis.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mining Specification of Insecure Browser Extension Behavior.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Hybrid Detection Using Permission Analysis for Android Malware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Personal and Ubiquitous Computing, 2013

On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Personal and Ubiquitous Computing, 2013

Data Interpolating over RFID Data Streams for Missed Readings.
Proceedings of the Web-Age Information Management, 2013

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013

Facial Expressions Analysis Based on Cooperative Neuro-computing Interactions.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

The Automatic Formation of Agent Societies: A Service-Driven Approach.
Proceedings of the ALPIT 2008, 2008

Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions.
Int. J. Electronic Commerce, 2007

An Improvement of Coleman Model of Trust: Using FNHMS to Manage Reputation in Multi-agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

A Fuzzy Extension of OWL for Vague Knowledge.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007