Guoai Xu

According to our database1, Guoai Xu authored at least 28 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Defect Prediction in Android Binary Executables Using Deep Neural Network.
Wireless Personal Communications, 2018

An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wireless Communications and Mobile Computing, 2018

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Security and Communication Networks, 2018

Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol.
Int. J. Communication Systems, 2018

A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018

Multi-Byte Power Analysis: A Generic Approach Based on Linear Regression.
IEEE Access, 2018

How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Differential Fault Attack on ITUbee Block Cipher.
ACM Trans. Embedded Comput. Syst., 2017

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Security and Communication Networks, 2017

A lightweight password-based authentication protocol using smart card.
Int. J. Communication Systems, 2017

Linear Regression Side Channel Attack Applied on Constant XOR.
IACR Cryptology ePrint Archive, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Malware detection method for the industrial control systems.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2013
A Novel Element Detection Method in Audio Sensor Networks.
IJDSN, 2013

2012
The Design of SMS Based Heterogeneous Mobile Botnet.
JCP, 2012

Construction of distributed LDoS attack based on one-dimensional random walk algorithm.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2010
A method for topology conformance tests under logical constraints.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A color image watermarking algorithm resistant to print-scan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010


  Loading...