Shiwei Xu

Orcid: 0000-0002-8385-0988

According to our database1, Shiwei Xu authored at least 33 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain.
J. Comb. Optim., April, 2024

Enhance Reasoning for Large Language Models in the Game Werewolf.
CoRR, 2024

2023
A new analysis of small S-boxes based on a new notion of algebraic immunity.
J. Inf. Secur. Appl., September, 2023

Electric Vehicle Trip Information Inference Based on Time-Series Residential Electricity Consumption.
IEEE Internet Things J., September, 2023

A Data-Driven Control-Policy-Based Driving Safety Analysis System for Autonomous Vehicles.
IEEE Internet Things J., August, 2023

Thin-Film-Shaped Flexible Actuators.
Adv. Intell. Syst., August, 2023

The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function.
Des. Codes Cryptogr., March, 2023

Minimal key set of binary key-derivation tree in cloud storage.
Soft Comput., 2023

Research on Composite Braking Control Strategy of Four-Wheel-Drive Electric Vehicles With Multiple Motors Based on Braking Energy Recovery Optimization.
IEEE Access, 2023

2022
Intelligent Decision Method of Multi-Agricultural Commodity Model Based on Machine Learning.
Int. J. Pattern Recognit. Artif. Intell., 2022

zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs.
Future Gener. Comput. Syst., 2022

Event-Triggered Adaptive Neural Tracking Control of Flexible-Joint Robot Systems With Input Saturation.
IEEE Access, 2022

RAS2P: Remote Attestation via Self-Measurement for SGX-based Platforms.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

An Improved Faster RCNN based on Swin Transformer for Surface Defect Detection of Metal Workpieces.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Proof of Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

Secure Polar Coding with Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

Restricting the Number of Times That Data Can Be Accessed in Cloud Storage Using TrustZone.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
Crashworthiness design of 3D lattice-structure filled thin-walled tubes based on data mining.
CoRR, 2021

Limited Times of Data Access Based on SGX in Cloud Storage.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Research on Robot-assisted Accurate Location of Local Craniocerebral Cooling Method.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Symbolic Model for Systematically Analyzing TEE-Based Protocols.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
Fast algorithm for HEVC intra-coding implemented by preprocessing.
IET Image Process., 2019

Encrypted secure polar coding scheme for general two-way wiretap channel.
IET Inf. Secur., 2019

Composite braking AMT shift strategy for extended-range heavy commercial electric vehicle based on LHMM/ANFIS braking intention identification.
Clust. Comput., 2019

2017
Automated verification of dynamic root of trust protocols (long version).
CoRR, 2017

Automated Verification of Dynamic Root of Trust Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

2015
Regenerative Braking Control Strategy of Electric Truck Based on Braking Security.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

2013
New abstractions in applied pi-calculus and automated verification of protected executions.
IACR Cryptol. ePrint Arch., 2013

Dynamic Measurement and Protected Execution: Model and Analysis.
Proceedings of the Trustworthy Global Computing - 8th International Symposium, 2013


  Loading...