Qi Xia

Orcid: 0000-0003-2245-2588

Affiliations:
  • University of Electronic Science and Technology of China (UESTC), School of Cyber Security, Chengdu, China
  • University of Pennsylvania, Philadelphia, PA, USA (2013-2014)
  • University of Electronic Science and Technology of China, School of computer science, Chengdu, China (PhD 2010)


According to our database1, Qi Xia authored at least 55 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cloud-Service-Based Blockchain Infrastructure for ML Data Incentives.
IEEE Internet Things J., April, 2025

A Scalable and Memory-Efficient Architecture for Blockchain-Based IoT Privacy and Security.
IEEE Internet Things J., 2025

MGGPT: A Multi-Graph GPT-enhanced framework for dynamic fraud detection in cryptocurrency networks.
Comput. Networks, 2025

A Secure and Efficient Account Migration Protocol in Blockchain Sharding Systems.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

Advanced Temporal Graph Embedding for Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Blockchain-Based EV Constant Function Pricer and Oraclized State of Charge Estimator.
IEEE Trans. Intell. Transp. Syst., December, 2024

PRIDN: A Privacy Preserving Data Sharing on Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2024

A Secure and Lightweight NDN-Based Vehicular Network Using Edge Computing and Certificateless Signcryption.
IEEE Internet Things J., 2024

A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

2023
A Blockchain Peer-to-Peer Energy Trading System for Microgrids.
IEEE Trans. Smart Grid, September, 2023

An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023

Blockchain for IoT Scenarios: Lightweight Three-Tier Architecture with GH-PBFT Consensus.
Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications, 2023

2022
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem.
IEEE Syst. J., 2022

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain.
IEEE Syst. J., 2022

Supply chain equilibrium on a game theory-incentivized blockchain network.
J. Ind. Inf. Integr., 2022

Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable.
J. Comput. Secur., 2022

A blockchain-adaptive contractual approach for multi-contracting organizational entities.
Future Gener. Comput. Syst., 2022

Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Selective Sharing of Outsourced Encrypted Data in Cloud Environments.
IEEE Internet Things J., 2021

An Efficient and Secure Blockchain-Based SVM Classification for a COVID-19 Healthcare System.
Proceedings of the ICMAI 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19, 2021

Complementary Blockchain-Based Privacy Protection for Covid-19 Contact Tracing.
Proceedings of the 21st International Conference on Communication Technology, 2021

2020
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.
Secur. Commun. Networks, 2020

A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data.
Pervasive Mob. Comput., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks.
IEEE Internet Things J., 2020

Zero-Chain: A Blockchain-Based Identity for Digital City Operating System.
IEEE Internet Things J., 2020

BEMPAS: A Decentralized Employee Performance Assessment System Based on Blockchain for Smart City Governance.
IEEE Access, 2020

Training Machine Learning Models Through Preserved Decentralization.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Blockchain-Based Outsourced Privacy-Preserving Support Vector Machine Classification on IoT Data.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

2019
Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
Sensors, 2019

Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments.
IEEE Internet Things J., 2019

Digital Media Copyright and Content Protection Using IPFS and Blockchain.
Proceedings of the Image and Graphics - 10th International Conference, 2019

2018
Chain-based big data access control infrastructure.
J. Supercomput., 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

V-Chain: A Blockchain-Based Car Lease Platform.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Payment Routing Protocol for Economic Systems Based on Blockchain.
Proceedings of the 2018 International Conference on Computing, 2018

A Blockchain-based Architecture Framework for Secure Sharing of Personal Health Data.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

2017
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments.
Inf., 2017

MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.
IEEE Access, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

Dual-anonymous reward distribution for mobile crowdsensing.
Proceedings of the IEEE International Conference on Communications, 2017

2016
SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

2015
Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage.
J. Univers. Comput. Sci., 2015

Advanced security analysis of a signature scheme with message recovery.
Int. J. Inf. Comput. Secur., 2015

2014
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

A Novel Blind Separation Method in Magnetic Resonance Images.
Comput. Math. Methods Medicine, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

2013
A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Improved certificateless signature scheme provably secure in the standard model.
IET Inf. Secur., 2012

A Strong Designated Verifier Signature Scheme with Secure Disavowability.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition.
Int. J. Comput. Intell. Syst., 2011

2009
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...