Shichang Xuan

Orcid: 0000-0003-0332-0686

According to our database1, Shichang Xuan authored at least 21 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AI-based Intrusion Detection for Intelligence Internet of Vehicles.
IEEE Consumer Electron. Mag., 2023

2021
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems.
Secur. Commun. Networks, 2021

Early Rumor Detection Based on Deep Recurrent Q-Learning.
Secur. Commun. Networks, 2021

ECBCM: A prestige-based edge computing blockchain security consensus model.
Trans. Emerg. Telecommun. Technol., 2021

2020
HCDA: Efficient Pairing-Free Homographic Key Management for Dynamic Cross-Domain Authentication in VANETs.
Symmetry, 2020

An incentive mechanism for data sharing based on blockchain with smart contracts.
Comput. Electr. Eng., 2020

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection.
IEEE Access, 2020

Application of Block Chain Technology in Constructing Network Threat Intelligence System.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis.
Symmetry, 2019

Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks.
IEEE Access, 2019

Location-Aware Targeted Influence Blocking Maximization in Social Networks.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

User Credibility Assessment Based on Trust Propagation in Microblog.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

User anchor link identification based on integrated similarity decision in multiple heterogeneous social networks.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Network Penetration Identification Method Based on Interactive Behavior Analysis.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing.
Wirel. Commun. Mob. Comput., 2018

Identification of unknown operating system type of Internet of Things terminal device based on RIPPER.
Int. J. Distributed Sens. Networks, 2018

Location-Aware Influence Blocking Maximization in Social Networks.
IEEE Access, 2018

Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters.
Secur. Commun. Networks, 2017

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2012
A Webpage Deletion Algorithm Based on Hierarchical Filtering.
Proceedings of the Web Information Systems and Mining - International Conference, 2012


  Loading...