Guosheng Xu

Orcid: 0000-0002-3310-926X

Affiliations:
  • Beijing University of Posts and Telecommunications, Beijing, China


According to our database1, Guosheng Xu authored at least 39 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV.
Proceedings of the Intelligent Information Processing XII, 2024

2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023

A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023

A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT.
IEEE Internet Things J., August, 2023

Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023

Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

WELID: A Weighted Ensemble Learning Method for Network Intrusion Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Using A CNN to Solve the Problem of Asphalt Pavement Crack Detection.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET.
KSII Trans. Internet Inf. Syst., 2022

Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

MSDetector: A Static PHP Webshell Detection System Based on Deep-Learning.
Proceedings of the Theoretical Aspects of Software Engineering, 2022

2021
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
Secur. Commun. Networks, 2021

A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier.
Inf. Technol. Control., 2021

Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

An Efficient Method for Analyzing Widget Intent of Android System.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

2020
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
Wirel. Commun. Mob. Comput., 2020

An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
IACR Cryptol. ePrint Arch., 2020

Robust App Clone Detection Based on Similarity of UI Structure.
IEEE Access, 2020

Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Recognition Method of Road Cracks with Lane Lines Based on Deep Learning.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

2019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
KSII Trans. Internet Inf. Syst., 2019

Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System.
IEEE Access, 2019

A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map.
IEEE Access, 2019

Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018

Power Modulation System and Experiments of Lower Hybrid Wave on EAST.
IEEE Access, 2018

2013
A Reconfigurable FIR Filter System.
J. Comput., 2013

The Hardware Design of Parameter-Adjustable FIR Filter System.
J. Comput., 2013

A Semi-supervised Ensemble Approach for Mining Data Streams.
J. Comput., 2013

2012
A correlation analysis method of network security events based on rough set theory.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2007
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007


  Loading...