Guosheng Xu
Orcid: 0000-0002-3310-926XAffiliations:
- Beijing University of Posts and Telecommunications, Beijing, China
  According to our database1,
  Guosheng Xu
  authored at least 52 papers
  between 2007 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
    IEEE Internet Things J., October, 2025
    
  
Quantum circuit mapping based on discrete particle swarm optimization and deep reinforcement learning.
    
  
    Swarm Evol. Comput., 2025
    
  
RIS/IRS-assisted physical layer security enhancement scheme and its application to SCMA systems.
    
  
    Phys. Commun., 2025
    
  
Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection.
    
  
    Proc. ACM Softw. Eng., 2025
    
  
    Proc. ACM Softw. Eng., 2025
    
  
    Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
    
  
  2024
    CoRR, 2024
    
  
    CoRR, 2024
    
  
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards.
    
  
    CoRR, 2024
    
  
    CoRR, 2024
    
  
Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
    
  
    Proceedings of the 33rd USENIX Security Symposium, 2024
    
  
    Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024
    
  
    Proceedings of the Intelligent Information Processing XII, 2024
    
  
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
    
  
    Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
    
  
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
    
  
    Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
    
  
  2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
    
  
    IEEE Syst. J., December, 2023
    
  
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
    
  
    Sensors, November, 2023
    
  
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT.
    
  
    IEEE Internet Things J., August, 2023
    
  
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
    
  
    Sensors, February, 2023
    
  
    Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
    
  
    Proceedings of the IEEE Symposium on Computers and Communications, 2023
    
  
    Proceedings of the 15th International Conference on Machine Learning and Computing, 2023
    
  
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
    
  
    Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023
    
  
  2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
    
  
    Sensors, 2022
    
  
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET.
    
  
    KSII Trans. Internet Inf. Syst., 2022
    
  
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
    
  
    Int. J. Distributed Sens. Networks, 2022
    
  
    Intell. Autom. Soft Comput., 2022
    
  
    Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
    
  
    Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022
    
  
    Proceedings of the Theoretical Aspects of Software Engineering, 2022
    
  
  2021
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
    
  
    Secur. Commun. Networks, 2021
    
  
A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier.
    
  
    Inf. Technol. Control., 2021
    
  
Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning.
    
  
    Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
    
  
An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment.
    
  
    Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
    
  
    Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
    
  
  2020
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
    
  
    Wirel. Commun. Mob. Comput., 2020
    
  
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
    
  
    IACR Cryptol. ePrint Arch., 2020
    
  
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
    
  
    Proceedings of the 19th IEEE International Conference on Trust, 2020
    
  
    Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020
    
  
  2019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
    
  
    KSII Trans. Internet Inf. Syst., 2019
    
  
    IEEE Access, 2019
    
  
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map.
    
  
    IEEE Access, 2019
    
  
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching.
    
  
    Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
    
  
Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network.
    
  
    Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
    
  
  2018
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
    
  
    Sensors, 2018
    
  
    IEEE Access, 2018
    
  
  2013
  2012
    Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
    
  
  2007
    Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007